Yeongjin Jang
Yeongjin Jang
Home
News
Publications
Teaching
Advising
CV
Light
Dark
Automatic
1
VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks
Most modern software attacks are rooted in memory corruption vulnerabilities, which are capable of altering security-sensitive data …
Mohannad Ismail
,
Jinwoo Yom
,
Christopher Jelesnianski
,
Yeongjin Jang
,
Changwoo Min
PDF
Slides
Source Document
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds
To evaluate Internet of Things device security, researchers have attempted to emulate and dynamically analyze firmware. However, this …
Dongkwan Kim
,
Eunsoo Kim
,
Mingeun Kim
,
Yeongjin Jang
,
Yongdae Kim
PDF
Source Document
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
One approach to assess the security of embedded IoT devices is applying dynamic analysis such as fuzz testing to their firmware in …
Mingeun Kim
,
Dongkwan Kim
,
Eunsoo Kim
,
Suryeon Kim
,
Yeongjin Jang
,
Yongdae Kim
PDF
Slides
Source Document
CrFuzz: Fuzzing Multi-purpose Programs through Input Validation
Fuzz testing has been proved its effectiveness in discovering software vulnerabilities. Empowered its randomness nature along with a …
Suhwan Song
,
Chengyu Song
,
Yeongjin Jang
,
Byoungyoung Lee
PDF
Video
MARDU : Efficient and Scalable Code Re-randomization
Defense techniques such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) were role models in preventing …
Christopher Jelesnianski
,
Jinwoo Yom
,
Changwoo Min
,
Yeongjin Jang
PDF
Slides
Video
MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves
Multi-user oblivious storage allows users to access their shared data on the cloud while retaining access pattern obliviousness and …
Thang Hoang
,
Rouzbeh Behnia
,
Yeongjin Jang
,
Attila Yavuz
PDF
Video
HFL: Hybrid Fuzzing on the Linux Kernel
Hybrid fuzzing, combining symbolic execution and fuzzing, is a promising approach for vulnerability discovery because each approach can …
Kyungtae Kim
,
Dae R. Jeong
,
Chung Hwan Kim
,
Yeongjin Jang
,
Insik Shin
,
Byoungyoung Lee
PDF
Slides
Video
Source Document
BlueMaster: Bypassing and Fixing Bluetooth-based Proximity Authentication
Bluetooth enabled devices can indirectly check the proximity of other connected devices, and this proximity check can be used as an …
Youngman Jung
,
Junbum Shin
,
Yeongjin Jang
PDF
Slides
Video
Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit
The Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, allowing users to remotely control Windows systems …
Chun Sung Park
,
Yeongjin Jang
,
Seungjoo Kim
,
Ki Taek Lee
Slides
Video
Making Code Re-randomization Practical with MARDU
Christopher Jelesnianski
,
Jinwoo Yom
,
Changwoo Min
,
Yeongjin Jang
PDF
«
»
Cite
×