ÆÈ·Î¿ì
Yeongjin Jang
Yeongjin Jang
oregonstate.eduÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
I Yun, S Lee, M Xu, Y Jang, T Kim
27th USENIX Security Symposium (USENIX Security 18), 2018
3902018
Breaking kernel address space layout randomization with Intel TSX
Y Jang, S Lee, T Kim
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications ¡¦, 2016
1972016
Hacking in darkness: Return-oriented programming against secure enclaves
J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ...
26th USENIX Security Symposium (USENIX Security 17), 523-539, 2017
182*2017
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
NDSS, 2015
1692015
SGX-Bomb: Locking down the processor via Rowhammer attack
Y Jang, J Lee, S Lee, T Kim
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-6, 2017
1362017
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
972016
Mimesis aegis: A mimicry privacy shield–a system¡¯s approach to data privacy on public cloud
B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva
The 23rd USENIX Security Symposium (USENIX Security '14), 33-48, 2014
962014
A11y attacks: Exploiting accessibility in operating systems
Y Jang, C Song, SP Chung, T Wang, W Lee
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications ¡¦, 2014
922014
Breaking and fixing VoLTE: Exploiting hidden data channels and mis-implementations
H Kim, D Kim, M Kwon, H Han, Y Jang, D Han, T Kim, Y Kim
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications ¡¦, 2015
762015
HFL: Hybrid Fuzzing on the Linux Kernel.
K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee
NDSS, 2020
702020
APISan: Sanitizing API Usages through Semantic Cross-Checking
I Yun, C Min, X Si, Y Jang, T Kim, M Naik
The 25th USENIX Security Symposium, 362-378, 2016
652016
Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications.
Y Jang, SP Chung, BD Payne, W Lee
NDSS, 2014
572014
Mactans: Injecting malware into iOS devices via malicious chargers
B Lau, Y Jang, C Song, T Wang, PH Chung, P Royal
Black Hat USA 92, 2013
532013
Firmae: Towards large-scale emulation of iot firmware for dynamic analysis
M Kim, D Kim, E Kim, S Kim, Y Jang, Y Kim
Annual computer security applications conference, 733-745, 2020
462020
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
T Hoang, MO Ozmen, Y Jang, AA Yavuz
Proceedings on Privacy Enhancing Technologies 2019 (1), 172-191, 2019
382019
Ucognito: Private browsing without tears
M Xu, Y Jang, X Xing, T Kim, W Lee
Proceedings of the 22nd acm sigsac conference on computer and communications ¡¦, 2015
252015
Systems and Methods for Using Video for User and Message Authentication
SPH Chung, W Lee, Y Jang
US Patent US15,467,023, 2017
242017
On the feasibility of large-scale infections of ios devices
T Wang, Y Jang, Y Chen, S Chung, B Lau, W Lee
The 23rd USENIX Security Symposium (USENIX Security '14), 79-93, 2014
242014
Multik: A framework for orchestrating multiple specialized kernels
HC Kuo, A Gunasekaran, Y Jang, S Mohan, RB Bobba, D Lie, J Walker
arXiv preprint arXiv:1903.06889, 2019
142019
MOSE: Practical multi-user oblivious storage via secure enclaves
T Hoang, R Behnia, Y Jang, AA Yavuz
Proceedings of the Tenth ACM Conference on Data and Application Security and ¡¦, 2020
112020
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20