Follow
Yuseok Jeon
Yuseok Jeon
Assistant Professor, UNIST
Verified email at unist.ac.kr - Homepage
Title
Cited by
Cited by
Year
TypeSan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1122016
Hextype: Efficient detection of type confusion errors for c++
Y Jeon, P Biswas, S Carr, B Lee, M Payer
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
752017
{FuZZan}: Efficient sanitizer metadata design for fuzzing
Y Jeon, WH Han, N Burow, M Payer
2020 USENIX Annual Technical Conference (USENIX ATC 20), 249-263, 2020
432020
LT-OLSR: Attack-tolerant OLSR against link spoofing
Y Jeon, TH Kim, Y Kim, J Kim
37th Annual IEEE Conference on Local Computer Networks, 216-219, 2012
202012
Drivefuzz: Discovering autonomous driving bugs through driving quality-guided fuzzing
S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
182022
Swarmflawfinder: Discovering and exploiting logic flaws of swarm algorithms
C Jung, A Ahad, Y Jeon, Y Kwon
2022 IEEE Symposium on Security and Privacy (SP), 1808-1825, 2022
92022
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem
B Kwon, S Hong, Y Jeon, D Kim
Information and Communications Security: 23rd International Conference …, 2021
92021
Shadowauth: Backward-compatible automatic can authentication for legacy ecus
S Kim, G Yeo, T Kim, JJ Rhee, Y Jeon, A Bianchi, D Xu, D Tian
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
72022
Polper: Process-aware restriction of over-privileged setuid calls in legacy applications
Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
72019
Pspray: Timing {Side-Channel} based linux kernel heap exploitation technique
Y Lee, J Kwak, J Kang, Y Jeon, B Lee
32nd USENIX Security Symposium (USENIX Security 23), 6825-6842, 2023
42023
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective
L Yu, M Han, Y Li, C Lin, Y Zhang, M Zhang, Y Liu, H Weng, Y Jeon, ...
arXiv preprint arXiv:2402.03688, 2024
22024
Automated blackbox inference of external origin user behavior
Z Wu, J Rhee, J Yuseok, LI Zhichun, K Jee, G Jiang
US Patent 10,572,661, 2020
22020
Blackbox program privilege flow analysis with inferred program behavior context
J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
US Patent 10,505,962, 2019
22019
A distributed monitoring architecture for AMIs: Minimizing the number of monitoring nodes and enabling collided packet recovery
I Shin, JH Huh, Y Jeon, DM Nicol
Proceedings of the first ACM workshop on Smart energy grid security, 35-40, 2013
22013
Apparatus and method for collecting network data traffic
IC Shin, YS Jeon, SK Kim, JT Seo
US Patent App. 14/401,364, 2015
12015
On the Robustness of Graph Reduction Against GNN Backdoor
Y Zhu, M Mandulak, K Wu, G Slota, Y Jeon, KH Chow, L Yu
arXiv preprint arXiv:2407.02431, 2024
2024
ERASAN: Efficient Rust Address Sanitizer
J Min, D Yu, S Jeong, D Song, Y Jeon
2024 IEEE Symposium on Security and Privacy (SP), 239-239, 2024
2024
효율적인 안드로이드 악성코드 동적 분석 도구 설계
S Jeong, M Choi, Y Jeon
정보보호학회, 국가정보원, 2023
2023
UAF 탐지를 위한 효율적인 퍼징 도구 설계
Y Jeon
정보보호학회, 국가정보원, 2023
2023
소프트웨어 타입 및 메모리 안전 강화 연구
Y Jeon
Review of KIISC 31 (2), 53-58, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20