Yeongjin Jang
Yeongjin Jang
Home
News
Publications
Teaching
Advising
CV
1
APISAN: Sanitizing API Usages through Semantic Cross-checking
API misuse is a well-known source of bugs. Some of them (e.g., incorrect use of SSL API, and integer overflow of memory allocation …
Insu Yun
,
Changwoo Min
,
Xujie Si
,
Yeongjin Jang
,
Taesoo Kim
,
Mayur Naik
PDF
Slides
Video
Source Document
Breaking Kernel Address Space Layout Randomization with Intel TSX
Kernel hardening has been an important topic, as many applications and security mechanisms often consider the kernel as part of their …
Yeongjin Jang
,
Sangho Lee
,
Taesoo Kim
PDF
Slides
Video
Source Document
Towards Engineering a Secure Android Ecosystem: A Survey of Existing Techniques
The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the …
Meng Xu
,
Chengyu Song
,
Yang Ji
,
Ming-Wei Shih an
PDF
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its …
Hongil Kim
,
Dongkwan Kim
,
Minhee Kwon
,
Hyungseok Han
,
Yeongjin Jang
,
Dongsu Han
,
Taesoo Kim
,
Yongdae Kim
PDF
Slides
UCognito: Private Browsing without Tears
While private browsing is a standard feature, its implementation has been inconsistent among the major browsers. More seriously, it …
Meng Xu
,
Yeongjin Jang
,
Xinyu Xing
,
Taesoo Kim
,
Wenke Lee
PDF
Slides
Source Document
Preventing Use-after-free with Dangling Pointers Nullification
Many system components and network applications are written in languages that are prone to memory corruption vulnerabilities. There …
Byoungyoung Lee
,
Chengyu Song
,
Yeongjin Jang
,
Tielei Wang
,
Taesoo Kim
,
Long Lu
,
Wenke Lee
PDF
Slides
A11y Attacks: Exploiting Accessibility in Operating Systems
Driven in part by federal law, accessibility (a11y) support for disabled users is becoming ubiquitous in commodity OSs. Some assistive …
Yeongjin Jang
,
Chengyu Song
,
Simon P. Chung
,
Tielei Wang
,
Wenke Lee
PDF
Slides
Mimesis Aegis: A Mimicry Privacy Shield
Users are increasingly storing, accessing, and exchanging data through public cloud services such as those provided by Google, …
Billy Lau
,
Pak Ho Chung
,
Chengyu Song
,
Yeongjin Jang
,
Wenke Lee
,
Alexandra Boldyreva
PDF
Slides
Video
On the Feasibility of Large-Scale Infections of iOS Devices
While Apple iOS has gained increasing attention from attackers due to its rising popularity, very few large scale infections of iOS …
Tielei Wang
,
Yeongjin Jang
,
Yizheng Chen
,
Pak Ho Chung
,
Billy Lau
,
Wenke Lee
PDF
Slides
Video
Abusing Performance Optimization Weaknesses to Bypass ASLR
The primary goal of ASLR is to effectively randomize a program"s memory layout so that adversaries cannot easily infer such …
Byoungyoung Lee
,
Yeongjin Jang
,
Tielei Wang
,
Chengyu Song
,
Long Lu
,
Taesoo Kim
,
Wenke Lee
Slides
Video
«
»
Cite
×