TypeSan: Practical type confusion detection I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 111 | 2016 |
Hextype: Efficient detection of type confusion errors for c++ Y Jeon, P Biswas, S Carr, B Lee, M Payer Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 69 | 2017 |
{FuZZan}: Efficient sanitizer metadata design for fuzzing Y Jeon, WH Han, N Burow, M Payer 2020 USENIX Annual Technical Conference (USENIX ATC 20), 249-263, 2020 | 38 | 2020 |
LT-OLSR: Attack-tolerant OLSR against link spoofing Y Jeon, TH Kim, Y Kim, J Kim 37th Annual IEEE Conference on Local Computer Networks, 216-219, 2012 | 19 | 2012 |
Drivefuzz: Discovering autonomous driving bugs through driving quality-guided fuzzing S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 14 | 2022 |
Swarmflawfinder: Discovering and exploiting logic flaws of swarm algorithms C Jung, A Ahad, Y Jeon, Y Kwon 2022 IEEE Symposium on Security and Privacy (SP), 1808-1825, 2022 | 9 | 2022 |
Shadowauth: Backward-compatible automatic can authentication for legacy ecus S Kim, G Yeo, T Kim, JJ Rhee, Y Jeon, A Bianchi, D Xu, D Tian Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 7 | 2022 |
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem B Kwon, S Hong, Y Jeon, D Kim Information and Communications Security: 23rd International Conference …, 2021 | 7 | 2021 |
Polper: Process-aware restriction of over-privileged setuid calls in legacy applications Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | 6 | 2019 |
Pspray: Timing {Side-Channel} based Linux Kernel Heap Exploitation Technique Y Lee, J Kwak, J Kang, Y Jeon, B Lee 32nd USENIX Security Symposium (USENIX Security 23), 6825-6842, 2023 | 3 | 2023 |
Automated blackbox inference of external origin user behavior Z Wu, J Rhee, J Yuseok, LI Zhichun, K Jee, G Jiang US Patent 10,572,661, 2020 | 2 | 2020 |
Blackbox program privilege flow analysis with inferred program behavior context J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang US Patent 10,505,962, 2019 | 2 | 2019 |
A distributed monitoring architecture for AMIs: Minimizing the number of monitoring nodes and enabling collided packet recovery I Shin, JH Huh, Y Jeon, DM Nicol Proceedings of the first ACM workshop on Smart energy grid security, 35-40, 2013 | 2 | 2013 |
Apparatus and method for analyzing vulnerability of zigbee network J Yuseok, S Incheol, J Choi, LEE Gunhee, KIM SinKyu, SEO Jungtaek US Patent 9,294,496, 2016 | 1 | 2016 |
Apparatus and method for collecting network data traffic IC Shin, YS Jeon, SK Kim, JT Seo US Patent App. 14/401,364, 2015 | 1 | 2015 |
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective L Yu, M Han, Y Li, C Lin, Y Zhang, M Zhang, Y Liu, H Weng, Y Jeon, ... arXiv preprint arXiv:2402.03688, 2024 | | 2024 |
소프트웨어 타입 및 메모리 안전 강화 연구 Y Jeon Review of KIISC 31 (2), 53-58, 2021 | | 2021 |
Practical Type and Memory Safety Violation Detection Mechanisms Y Jeon Purdue University, 2020 | | 2020 |
Fine-grained analysis and prevention of invalid privilege transitions J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang US Patent 10,402,564, 2019 | | 2019 |
PoLPer Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | | 2019 |