TypeSan: Practical type confusion detection I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 120 | 2016 |
Hextype: Efficient detection of type confusion errors for c++ Y Jeon, P Biswas, S Carr, B Lee, M Payer Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 82 | 2017 |
{FuZZan}: Efficient sanitizer metadata design for fuzzing Y Jeon, WH Han, N Burow, M Payer 2020 USENIX Annual Technical Conference (USENIX ATC 20), 249-263, 2020 | 47 | 2020 |
Drivefuzz: Discovering autonomous driving bugs through driving quality-guided fuzzing S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 28 | 2022 |
LT-OLSR: Attack-tolerant OLSR against link spoofing Y Jeon, TH Kim, Y Kim, J Kim 37th Annual IEEE Conference on Local Computer Networks, 216-219, 2012 | 20 | 2012 |
Swarmflawfinder: Discovering and exploiting logic flaws of swarm algorithms C Jung, A Ahad, Y Jeon, Y Kwon 2022 IEEE Symposium on Security and Privacy (SP), 1808-1825, 2022 | 15 | 2022 |
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem B Kwon, S Hong, Y Jeon, D Kim Information and Communications Security: 23rd International Conference …, 2021 | 11 | 2021 |
Shadowauth: Backward-compatible automatic can authentication for legacy ecus S Kim, G Yeo, T Kim, JJ Rhee, Y Jeon, A Bianchi, D Xu, D Tian Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 8 | 2022 |
Polper: Process-aware restriction of over-privileged setuid calls in legacy applications Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | 8 | 2019 |
Pspray: Timing {Side-Channel} based linux kernel heap exploitation technique Y Lee, J Kwak, J Kang, Y Jeon, B Lee 32nd USENIX Security Symposium (USENIX Security 23), 6825-6842, 2023 | 7 | 2023 |
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective L Yu, M Han, Y Li, C Lin, Y Zhang, M Zhang, Y Liu, H Weng, Y Jeon, ... arXiv preprint arXiv:2402.03688, 2024 | 3 | 2024 |
ERASAN: Efficient Rust Address Sanitizer J Min, D Yu, S Jeong, D Song, Y Jeon 2024 IEEE Symposium on Security and Privacy (SP), 239-239, 2024 | 2 | 2024 |
Automated blackbox inference of external origin user behavior Z Wu, J Rhee, J Yuseok, LI Zhichun, K Jee, G Jiang US Patent 10,572,661, 2020 | 2 | 2020 |
Blackbox program privilege flow analysis with inferred program behavior context J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang US Patent 10,505,962, 2019 | 2 | 2019 |
A distributed monitoring architecture for AMIs: Minimizing the number of monitoring nodes and enabling collided packet recovery I Shin, JH Huh, Y Jeon, DM Nicol Proceedings of the first ACM workshop on Smart energy grid security, 35-40, 2013 | 2 | 2013 |
type++: Prohibiting Type Confusion With Inline Type Information N Badoux, F Toffalini, Y Jeon, M Payer | 1 | 2023 |
Practical Type and Memory Safety Violation Detection Mechanisms Y Jeon Purdue University, 2020 | 1 | 2020 |
Apparatus and method for collecting network data traffic IC Shin, YS Jeon, SK Kim, JT Seo US Patent App. 14/401,364, 2015 | 1 | 2015 |
On the Robustness of Graph Reduction Against GNN Backdoor Y Zhu, M Mandulak, K Wu, G Slota, Y Jeon, KH Chow, L Yu Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 65-76, 2024 | | 2024 |
CMASan: Custom Memory Allocator-aware Address Sanitizer J Hong, W Jang, M Kim, L Yu, Y Kwon, Y Jeon 2025 IEEE Symposium on Security and Privacy (SP), 74-74, 2024 | | 2024 |