Dr. Kang is currently an associate professor at the GSIS (Graduate School of Information Security) at KAIST. He has also been with George Mason University as an associate professor in the Volgenau School of Engineering. Dr. Kang received his Ph.D. in Computer Science from the University of California at Berkeley, and M.S. from the University of Maryland at College Park, and B.S. from Seoul National University. Dr. Kang has been working on systems security including OS kernel integrity monitors (http://breakthroughs.kaist.ac.kr/?post_no=163), HW-based trusted execution environment, VM Introspection, Memory address translation integrity, Code-Reuse-Attack defenses, invisible server, anti-spam, and botnet malware analysis.
He has been advising and educating the next-generation cyber security researchers, managers, the federal workforce and policy makers. He has created a series of NSF-funded hands-on Information Assurance (IA) education program, and his research efforts has been sponsored by IARPA, ARO, NSF, ADD, ETRI, NIPA (Brain Scouting Program), TIAA-CREF Faculty Fellowship, Bank of America, SK Telecom and Samsung.
“SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment” J. Jang, S. Kong, M. Kim, D. Kim and B. Kang (Corresponding Author) Network and Distributed System Security (NDSS) Symposium, 2015 (Acceptance rate 18.6% (55/293))
“ATRA: Address Translation Redirection Attack against Hardware-based External Monitors” D. Jang, H. Lee, M. Kim, D. H. Kim, D. G. Kim and B. Kang (Corresponding Author) ACM Conference on Computer and Communications Security (ACM CCS), 2014 (Acceptance rate 19.5% (114/585))
“Rosemary: A Robust, Secure, and High-performance Network Operating System” S. Shin, Y. Song, T. Lee, S. Lee, J. Chung, P. Porras, V. Yegneswaran, J. Noh, and B. Kang ACM Conference on Computer and Communications Security (ACM CCS), 2014 (Acceptance rate 19.5% (114/585))
“KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object" H. Lee, H. Moon, D. Jang, K. Kim, J. Lee, Y. Paek, and B. Kang (Corresponding Author) USENIX Security 2013 (Acceptance rate: 15.9%(44/277) A top-ranked publication venue in computer security.
“Vigilare: Toward Snoop-based Kernel Integrity Monitor”
H. Moon, H. Lee, J. Lee, K. Kim, Y. Paek, and B. Kang (Corresponding Author) ACM Conference on Computer and Communications Security (ACM CCS), 2012. http://dl.acm.org/citation.cfm?id=2382196.2382202
(Acceptance rates: 17.2%, 14%, 18.9%) A top-ranked publication venue in computer security.
Analytics on Malware and Anti-Spam
“Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure” C. Nunnery, G. Sinclair, B. Kang (Corresponding Author) Proceedings of the 3rd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More (USENIX LEET), 2010 http://dl.acm.org/citation.cfm?id=1855687
(Acceptance rates: 31.4% [11/35])
“The Waledac Protocol: The How and Why”
G. Sinclair, C. Nunnery, and B. Kang (Corresponding Author)
Proceeding of 4th IEEE International Conference on Malicious and Unwanted Software (IEEE Malware), 2009. (Nominated for best paper award)
The technical details described in Section 3.3 of this paper guided Microsoft’s successful take-down of this highly resilient advanced botnet in Feb. 2010. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5403015
Invited Talks (Selected)
Moderator, Session for “International cooperation to prevent cyber terrorism,” 2014 United Nations Public Service Forum, Day and Awards Ceremony, June 2014
NIPA Brain Scouting Program Seminar with NSHC, Inc and iHEART, Inc, 2013
Samsung DMC Research Division Seminar, “Hardware-Assisted Kernel Integrity Monitors”, 2013
Samsung Software Research Center Talk, “KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object”, 2013
KISA Seminar, “Kernel Monitors, Cloud Botnets, Host Logs and Big Data Security”, June 2013
Courses Taught (* Newly developed)
*KAIST IS632: Hypervisor System Security (Spring 2014)
*KAIST IS631: Kernel System Security (Fall 2013, 2014)
*GMU AIT 673 Cyber Incident Handling and Response, Graduate course. (Fall 2011, Spring/Fall 2012)
*GMU AIT 671 Security Systems Life Cycle Management, Graduate course (Fall 2012)
ICDCS Security and Privacy Track 2015 Program Committee
Tutorial co-chair for ACM CCS (Computer Communication Security) 2011, 2012.
ACM Transactions on Information and System Security 2013, 2014
IEEE Transactions on Forensics and Information Security 2012
Area for Security Technology, Journal of Systems and Software (JSS) 2012
IEEE Communications Letters 2011
IEEE Transactions on Parallel and Distributed Systems 2010