Follow
Yuseok Jeon
Yuseok Jeon
Assistant Professor, UNIST
Verified email at unist.ac.kr - Homepage
Title
Cited by
Cited by
Year
TypeSan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1122016
Hextype: Efficient detection of type confusion errors for c++
Y Jeon, P Biswas, S Carr, B Lee, M Payer
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
702017
{FuZZan}: Efficient sanitizer metadata design for fuzzing
Y Jeon, WH Han, N Burow, M Payer
2020 USENIX Annual Technical Conference (USENIX ATC 20), 249-263, 2020
412020
LT-OLSR: Attack-tolerant OLSR against link spoofing
Y Jeon, TH Kim, Y Kim, J Kim
37th Annual IEEE Conference on Local Computer Networks, 216-219, 2012
192012
Drivefuzz: Discovering autonomous driving bugs through driving quality-guided fuzzing
S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
152022
Swarmflawfinder: Discovering and exploiting logic flaws of swarm algorithms
C Jung, A Ahad, Y Jeon, Y Kwon
2022 IEEE Symposium on Security and Privacy (SP), 1808-1825, 2022
92022
Shadowauth: Backward-compatible automatic can authentication for legacy ecus
S Kim, G Yeo, T Kim, JJ Rhee, Y Jeon, A Bianchi, D Xu, D Tian
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
72022
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem
B Kwon, S Hong, Y Jeon, D Kim
Information and Communications Security: 23rd International Conference …, 2021
72021
Polper: Process-aware restriction of over-privileged setuid calls in legacy applications
Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
62019
Pspray: Timing {Side-Channel} based Linux Kernel Heap Exploitation Technique
Y Lee, J Kwak, J Kang, Y Jeon, B Lee
32nd USENIX Security Symposium (USENIX Security 23), 6825-6842, 2023
32023
Automated blackbox inference of external origin user behavior
Z Wu, J Rhee, J Yuseok, LI Zhichun, K Jee, G Jiang
US Patent 10,572,661, 2020
22020
Blackbox program privilege flow analysis with inferred program behavior context
J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
US Patent 10,505,962, 2019
22019
A distributed monitoring architecture for AMIs: Minimizing the number of monitoring nodes and enabling collided packet recovery
I Shin, JH Huh, Y Jeon, DM Nicol
Proceedings of the first ACM workshop on Smart energy grid security, 35-40, 2013
22013
Apparatus and method for analyzing vulnerability of zigbee network
J Yuseok, S Incheol, J Choi, LEE Gunhee, KIM SinKyu, SEO Jungtaek
US Patent 9,294,496, 2016
12016
Apparatus and method for collecting network data traffic
IC Shin, YS Jeon, SK Kim, JT Seo
US Patent App. 14/401,364, 2015
12015
ERASAN: Efficient Rust Address Sanitizer
J Min, D Yu, S Jeong, D Song, Y Jeon
2024 IEEE Symposium on Security and Privacy (SP), 239-239, 2024
2024
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective
L Yu, M Han, Y Li, C Lin, Y Zhang, M Zhang, Y Liu, H Weng, Y Jeon, ...
arXiv preprint arXiv:2402.03688, 2024
2024
효율적인 안드로이드 악성코드 동적 분석 도구 설계
S Jeong, M Choi, Y Jeon
정보보호학회, 국가정보원, 2023
2023
UAF 탐지를 위한 효율적인 퍼징 도구 설계
Y Jeon
정보보호학회, 국가정보원, 2023
2023
소프트웨어 타입 및 메모리 안전 강화 연구
Y Jeon
Review of KIISC 31 (2), 53-58, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20