Yuseok Jeon
Yuseok Jeon
Assistant Professor, UNIST
Verified email at - Homepage
Cited by
Cited by
TypeSan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Hextype: Efficient detection of type confusion errors for c++
Y Jeon, P Biswas, S Carr, B Lee, M Payer
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
{FuZZan}: Efficient Sanitizer Metadata Design for Fuzzing
Y Jeon, WH Han, N Burow, M Payer
2020 USENIX Annual Technical Conference (USENIX ATC 20), 249-263, 2020
LT-OLSR: Attack-tolerant OLSR against link spoofing
Y Jeon, TH Kim, Y Kim, J Kim
37th Annual IEEE Conference on Local Computer Networks, 216-219, 2012
Polper: Process-aware restriction of over-privileged setuid calls in legacy applications
Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem
B Kwon, S Hong, Y Jeon, D Kim
International Conference on Information and Communications Security, 59-77, 2021
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs
S Kim, G Yeo, T Kim, JJ Rhee, Y Jeon, A Bianchi, D Xu, D Tian
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms
C Jung, A Ahad, Y Jeon, Y Kwon
2022 IEEE Symposium on Security and Privacy (SP), 1808-1825, 2022
Blackbox program privilege flow analysis with inferred program behavior context
J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
US Patent 10,505,962, 2019
A distributed monitoring architecture for AMIs: Minimizing the number of monitoring nodes and enabling collided packet recovery
I Shin, JH Huh, Y Jeon, DM Nicol
Proceedings of the first ACM workshop on Smart energy grid security, 35-40, 2013
Characteristics of pathogenic bacteria in meats
SC Jung, BY Jung, YS Jeon, JY Kim, JC Rhee, YH Park
Korean Journal of Veterinary Public Health (Korea Republic), 1997
Automated blackbox inference of external origin user behavior
Z Wu, J Rhee, J Yuseok, LI Zhichun, K Jee, G Jiang
US Patent 10,572,661, 2020
Apparatus and method for collecting network data traffic
IC Shin, YS Jeon, SK Kim, JT Seo
US Patent App. 14/401,364, 2015
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing
S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Practical Type and Memory Safety Violation Detection Mechanisms
Y Jeon
Purdue University Graduate School, 2020
Fine-grained analysis and prevention of invalid privilege transitions
J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
US Patent 10,402,564, 2019
HexType: fast type safety for C++ programs
Y Jeon, H Peng, M Payer
Greater Chicago Area Systems Research Workshop, 2016
Apparatus and method for analyzing vulnerability of zigbee network
J Yuseok, S Incheol, J Choi, LEE Gunhee, KIM SinKyu, SEO Jungtaek
US Patent 9,294,496, 2016
HunterBee: An Advanced ZigBee Vulnerability Analysis System
Y Jeon, I Shin, S Kim, S Kim, J Seo
USENIX Security Symposium, 2013
PSPRAY: Timing Side-Channel based Linux Kernel Heap Exploitation Technique
Y Lee, J Kwak, J Kang, Y Jeon, B Lee
The system can't perform the operation now. Try again later.
Articles 1–20