Follow
Yuseok Jeon
Yuseok Jeon
Assistant Professor, UNIST
Verified email at unist.ac.kr - Homepage
Title
Cited by
Cited by
Year
TypeSan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1202016
Hextype: Efficient detection of type confusion errors for c++
Y Jeon, P Biswas, S Carr, B Lee, M Payer
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
822017
{FuZZan}: Efficient sanitizer metadata design for fuzzing
Y Jeon, WH Han, N Burow, M Payer
2020 USENIX Annual Technical Conference (USENIX ATC 20), 249-263, 2020
472020
Drivefuzz: Discovering autonomous driving bugs through driving quality-guided fuzzing
S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
282022
LT-OLSR: Attack-tolerant OLSR against link spoofing
Y Jeon, TH Kim, Y Kim, J Kim
37th Annual IEEE Conference on Local Computer Networks, 216-219, 2012
202012
Swarmflawfinder: Discovering and exploiting logic flaws of swarm algorithms
C Jung, A Ahad, Y Jeon, Y Kwon
2022 IEEE Symposium on Security and Privacy (SP), 1808-1825, 2022
152022
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem
B Kwon, S Hong, Y Jeon, D Kim
Information and Communications Security: 23rd International Conference …, 2021
112021
Shadowauth: Backward-compatible automatic can authentication for legacy ecus
S Kim, G Yeo, T Kim, JJ Rhee, Y Jeon, A Bianchi, D Xu, D Tian
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
82022
Polper: Process-aware restriction of over-privileged setuid calls in legacy applications
Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
82019
Pspray: Timing {Side-Channel} based linux kernel heap exploitation technique
Y Lee, J Kwak, J Kang, Y Jeon, B Lee
32nd USENIX Security Symposium (USENIX Security 23), 6825-6842, 2023
72023
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective
L Yu, M Han, Y Li, C Lin, Y Zhang, M Zhang, Y Liu, H Weng, Y Jeon, ...
arXiv preprint arXiv:2402.03688, 2024
32024
ERASAN: Efficient Rust Address Sanitizer
J Min, D Yu, S Jeong, D Song, Y Jeon
2024 IEEE Symposium on Security and Privacy (SP), 239-239, 2024
22024
Automated blackbox inference of external origin user behavior
Z Wu, J Rhee, J Yuseok, LI Zhichun, K Jee, G Jiang
US Patent 10,572,661, 2020
22020
Blackbox program privilege flow analysis with inferred program behavior context
J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
US Patent 10,505,962, 2019
22019
A distributed monitoring architecture for AMIs: Minimizing the number of monitoring nodes and enabling collided packet recovery
I Shin, JH Huh, Y Jeon, DM Nicol
Proceedings of the first ACM workshop on Smart energy grid security, 35-40, 2013
22013
type++: Prohibiting Type Confusion With Inline Type Information
N Badoux, F Toffalini, Y Jeon, M Payer
12023
Practical Type and Memory Safety Violation Detection Mechanisms
Y Jeon
Purdue University, 2020
12020
Apparatus and method for collecting network data traffic
IC Shin, YS Jeon, SK Kim, JT Seo
US Patent App. 14/401,364, 2015
12015
On the Robustness of Graph Reduction Against GNN Backdoor
Y Zhu, M Mandulak, K Wu, G Slota, Y Jeon, KH Chow, L Yu
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 65-76, 2024
2024
CMASan: Custom Memory Allocator-aware Address Sanitizer
J Hong, W Jang, M Kim, L Yu, Y Kwon, Y Jeon
2025 IEEE Symposium on Security and Privacy (SP), 74-74, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20