Yeongjin Jang
Yeongjin Jang
Home
News
Publications
Teaching
Advising
CV
1
Enforcing C/C++ Type and Scope at Runtime for Control-Flow and Data-Flow Integrity
Mohannad Ismail
,
Christopher Jelesnianski
,
Yeongjin Jang
,
Changwoo Min
,
Wenjie Xiong
PDF
Source Document
GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation
Seongman Lee
,
Seoye Kim
,
Chihyun Song
,
Byeongsu Woo
,
Eunyeong Ahn
,
Junsu Lee
,
Yeongjin Jang
,
Jinsoo Jang
,
Hojoon Lee
,
Brent ByungHoon Kang
SGX-USB: Secure USB I/O Path for Secure Enclaves
User input plays an essential role in computer security because it can control system behavior and make security decisions. Output from …
Yeongjin Jang
,
Sejin Keem
PDF
Protect the System Call, Protect (most of) the World with BASTION
System calls are a critical building block in many serious security attacks, such as control-flow hijacking and privilege escalation …
Christopher Jelesnianski
,
Mohannad Ismail
,
Yeongjin Jang
,
Dan Williams
,
Changwoo Min
PDF
Practical Privacy-Preserving Authentication for SSH
Public-key authentication in SSH reveals more information about the participants" keys than is necessary. (1) The server can learn …
Lawrence Roy
,
Stan Lyakhov
,
Yeongjin Jang
,
Mike Rosulek
PDF
Slides
Video
Tightly Seal Your Sensitive Pointers with PACTIGHT
ARM is becoming more popular in desktops and data centers, opening a new realm in terms of security attacks against ARM. ARM has …
Mohannad Ismail
,
Andrew Quach
,
Christopher Jelesnianski
,
Yeongjin Jang
,
Changwoo Min
PDF
Slides
Video
Source Document
A Survey on Sensor False Data Injection Attacks and Countermeasures in Cyber-physical and Embedded Systems
Jinhong Choi
,
Yeongjin Jang
Practical Privacy-Preserving Authentication for SSH
Public-key authentication in SSH reveals more information about the participants" keys than is necessary. (1) The server can learn …
Lawrence Roy
,
Stanislav Lyakhov
,
Yeongjin Jang
,
Mike Rosulek
PDF
Tightly Seal Your Sensitive Pointers with PACTight
Mohannad Ismail
,
Andrew Quach
,
Christopher Jelesnianski
,
Yeongjin Jang
,
Changwoo Min
PDF
Securely Sharing Randomized Code that Flies
Address space layout randomization was a great role model, being a light-weight defense technique that could prevent early …
Christopher Jelesnianski
,
Jinwoo Yom
,
Changwoo Min
,
Yeongjin Jang
PDF
»
Cite
×