Follow
Yuseok Jeon
Yuseok Jeon
Assistant Professor, UNIST
Verified email at unist.ac.kr - Homepage
Title
Cited by
Cited by
Year
TypeSan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1072016
Hextype: Efficient detection of type confusion errors for c++
Y Jeon, P Biswas, S Carr, B Lee, M Payer
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
692017
{FuZZan}: Efficient sanitizer metadata design for fuzzing
Y Jeon, WH Han, N Burow, M Payer
2020 USENIX Annual Technical Conference (USENIX ATC 20), 249-263, 2020
352020
LT-OLSR: Attack-tolerant OLSR against link spoofing
Y Jeon, TH Kim, Y Kim, J Kim
37th Annual IEEE Conference on Local Computer Networks, 216-219, 2012
192012
Drivefuzz: Discovering autonomous driving bugs through driving quality-guided fuzzing
S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
112022
Swarmflawfinder: Discovering and exploiting logic flaws of swarm algorithms
C Jung, A Ahad, Y Jeon, Y Kwon
2022 IEEE Symposium on Security and Privacy (SP), 1808-1825, 2022
82022
Shadowauth: Backward-compatible automatic can authentication for legacy ecus
S Kim, G Yeo, T Kim, JJ Rhee, Y Jeon, A Bianchi, D Xu, D Tian
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
62022
Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem
B Kwon, S Hong, Y Jeon, D Kim
Information and Communications Security: 23rd International Conference …, 2021
62021
Polper: Process-aware restriction of over-privileged setuid calls in legacy applications
Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
62019
Automated blackbox inference of external origin user behavior
Z Wu, J Rhee, J Yuseok, LI Zhichun, K Jee, G Jiang
US Patent 10,572,661, 2020
22020
Blackbox program privilege flow analysis with inferred program behavior context
J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
US Patent 10,505,962, 2019
22019
Fine-grained analysis and prevention of invalid privilege transitions
J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
US Patent 10,402,564, 2019
22019
A distributed monitoring architecture for AMIs: Minimizing the number of monitoring nodes and enabling collided packet recovery
I Shin, JH Huh, Y Jeon, DM Nicol
Proceedings of the first ACM workshop on Smart energy grid security, 35-40, 2013
22013
Pspray: Timing {Side-Channel} based Linux Kernel Heap Exploitation Technique
Y Lee, J Kwak, J Kang, Y Jeon, B Lee
32nd USENIX Security Symposium (USENIX Security 23), 6825-6842, 2023
12023
Apparatus and method for analyzing vulnerability of zigbee network
J Yuseok, S Incheol, J Choi, LEE Gunhee, KIM SinKyu, SEO Jungtaek
US Patent 9,294,496, 2016
12016
Apparatus and method for collecting network data traffic
IC Shin, YS Jeon, SK Kim, JT Seo
US Patent App. 14/401,364, 2015
12015
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective
L Yu, M Han, Y Li, C Lin, Y Zhang, M Zhang, Y Liu, H Weng, Y Jeon, ...
arXiv preprint arXiv:2402.03688, 2024
2024
소프트웨어 타입 및 메모리 안전 강화 연구
Y Jeon
Review of KIISC 31 (2), 53-58, 2021
2021
Practical Type and Memory Safety Violation Detection Mechanisms
Y Jeon
Purdue University Graduate School, 2020
2020
PoLPer
Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20