The search functionality is under construction.

Author Search Result

[Author] Youngjoo SHIN(4hit)

1-4hit
  • Cross-VM Cache Timing Attacks on Virtualized Network Functions

    Youngjoo SHIN  

     
    LETTER-Information Network

      Pubricized:
    2019/05/27
      Vol:
    E102-D No:9
      Page(s):
    1874-1877

    Network function virtualization (NFV) achieves the flexibility of network service provisioning by using virtualization technology. However, NFV is exposed to a serious security threat known as cross-VM cache timing attacks. In this letter, we look into real security impacts on network virtualization. Specifically, we present two kinds of practical cache timing attacks on virtualized firewalls and routers. We also propose some countermeasures to mitigate such attacks on virtualized network functions.

  • DCUIP Poisoning Attack in Intel x86 Processors

    Youngjoo SHIN  

     
    LETTER-Dependable Computing

      Pubricized:
    2021/05/13
      Vol:
    E104-D No:8
      Page(s):
    1386-1390

    Cache prefetching technique brings huge benefits to performance improvement, but it comes at the cost of microarchitectural security in processors. In this letter, we deep dive into internal workings of a DCUIP prefetcher, which is one of prefetchers equipped in Intel processors. We discover that a DCUIP table is shared among different execution contexts in hyperthreading-enabled processors, which leads to another microarchitectural vulnerability. By exploiting the vulnerability, we propose a DCUIP poisoning attack. We demonstrate an AES encryption key can be extracted from an AES-NI implementation by mounting the proposed attack.

  • CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware

    Joobeom YUN  Junbeom HUR  Youngjoo SHIN  Dongyoung KOO  

     
    LETTER-Dependable Computing

      Pubricized:
    2017/06/12
      Vol:
    E100-D No:9
      Page(s):
    2228-2231

    Ransomware becomes more and more threatening nowadays. In this paper, we propose CLDSafe, a novel and efficient file backup system against ransomware. It keeps shadow copies of files and provides secure restoration using cloud storage when a computer is infected by ransomware. After our system measures file similarities between a new file on the client and an old file on the server, the old file on the server is backed up securely when the new file is changed substantially. And then, only authenticated users can restore the backup files by using challenge-response mechanism. As a result, our proposed solution will be helpful in recovering systems from ransomware damage.

  • Efficient and Secure File Deduplication in Cloud Storage

    Youngjoo SHIN  Kwangjo KIM  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E97-D No:2
      Page(s):
    184-197

    Outsourcing to a cloud storage brings forth new challenges for the efficient utilization of computing resources as well as simultaneously maintaining privacy and security for the outsourced data. Data deduplication refers to a technique that eliminates redundant data on the storage and the network, and is considered to be one of the most-promising technologies that offers efficient resource utilization in the cloud computing. In terms of data security, however, deduplication obstructs applying encryption on the outsourced data and even causes a side channel through which information can be leaked. Achieving both efficient resource utilization and data security still remains open. This paper addresses this challenging issue and proposes a novel solution that enables data deduplication while also providing the required data security and privacy. We achieve this goal by constructing and utilizing equality predicate encryption schemes which allow to know only equivalence relations between encrypted data. We also utilize a hybrid approach for data deduplication to prevent information leakage due to the side channel. The performance and security analyses indicate that the proposed scheme is efficient to securely manage the outsourced data in the cloud computing.