Daegyeong Kim
×
Daegyeong Kim

Daegyeong Kim

Ph. D. Candidate

Korean, English

Background


About

About

Daegyeong Kim is a Ph. D. candidate in School of Computing, KAIST. My research interests are kernel integrity, trust execution environment, and exploitation. I received BS from Dankook University and MS from KAIST. I am currently persuing Ph. D. under the supervision of prof. Brent Byunghoon Kang.

Work Experience

Work Experience

  • Jan, 2017 - May, 20192 years 4 months

Projects Experience

Projects Experience

  • Research on Security of 5G-data-intensive computing platforms based on disaggregated architecture, IITP

    Apr, 2020 - Present

  • Virtual Private IoT Network Framework, SK Telecom

    Jun, 2015 - Dec, 20156 months

  • Process Monitoring HW/SW Modules for Detecting System Intrusions, IITP

    Jun, 2015 - Dec, 20161 year 6 months

  • OS Kernel Behavior Modeling for Introspection, ADD

    Mar, 2014 - May, 20151 year 2 months

Education

Education

  • Information Security, Ph. D., KAIST

    Mar, 2015 - Present

  • Information Security, Master, KAIST

    Mar, 2013 - Feb, 2015

  • Computer Science and Engineering, Bachelor, Dankook University

    Mar, 2006 - Feb, 2013

Awards

Awards

  • SecuInside 2011 CTF (4th prize) , HARU & Korea University

    Awarded on: Oct 25, 2011

  • National Portfolio Award (Bronze prize) , ABEEK (Accreditation Board for Engineering Education of Korea)

    Awarded on: Oct 01, 2012

  • Dankook University Portfolio Award (Silver prize) , ABEEK Center in Dankook Univsersity

    Awarded on: Jun 04, 2012

  • Best Project Award (1th prize) , Korea Internet & Security Agency (KISA)

    Awarded on: Dec 16, 2011

    Software Analysis using Memory Tracking

Publications

Publications

  • AA Monitor: an Efficient Scheme to Defend against Address Translation Redirection Attack, KAIST

    Published on: undefined

  • SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment, 2015 Network and Distributed System Security Symposium (NDSS 2015)

    Published on: undefined

  • ATRA: Address Translation Redirection Attack against Hardware-based External Monitors, 21th ACM Conference on Computer and Communications Security (CCS 2014)

    Published on: undefined

Interests

Interests

  • Kernel Integrity

    Virtual Machine Introspection (VMI)External Hardware Monitor
  • Trust Execution Environment

    ARM TrustZoneIntel SGX
  • Exploitation

    Return-oriented Programming (ROP)Heap OverflowUse-After-Free
  • Mobile Security

    Android