Follow
Yuseok Jeon
Yuseok Jeon
Associate Professor, KOREA University
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
TypeSan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1212016
Hextype: Efficient detection of type confusion errors for c++
Y Jeon, P Biswas, S Carr, B Lee, M Payer
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
832017
{FuZZan}: Efficient sanitizer metadata design for fuzzing
Y Jeon, WH Han, N Burow, M Payer
2020 USENIX Annual Technical Conference (USENIX ATC 20), 249-263, 2020
532020
Drivefuzz: Discovering autonomous driving bugs through driving quality-guided fuzzing
S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
402022
LT-OLSR: Attack-tolerant OLSR against link spoofing
Y Jeon, TH Kim, Y Kim, J Kim
37th Annual IEEE Conference on Local Computer Networks, 216-219, 2012
222012
Swarmflawfinder: Discovering and exploiting logic flaws of swarm algorithms
C Jung, A Ahad, Y Jeon, Y Kwon
2022 IEEE Symposium on Security and Privacy (SP), 1808-1825, 2022
162022
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem
B Kwon, S Hong, Y Jeon, D Kim
Information and Communications Security: 23rd International Conference …, 2021
112021
Pspray: Timing {Side-Channel} based linux kernel heap exploitation technique
Y Lee, J Kwak, J Kang, Y Jeon, B Lee
32nd USENIX Security Symposium (USENIX Security 23), 6825-6842, 2023
102023
Shadowauth: Backward-compatible automatic can authentication for legacy ecus
S Kim, G Yeo, T Kim, JJ Rhee, Y Jeon, A Bianchi, D Xu, D Tian
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
102022
Polper: Process-aware restriction of over-privileged setuid calls in legacy applications
Y Jeon, J Rhee, CH Kim, Z Li, M Payer, B Lee, Z Wu
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
82019
On the robustness of graph reduction against GNN backdoor
Y Zhu, M Mandulak, K Wu, G Slota, Y Jeon, KH Chow, L Yu
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 65-76, 2024
52024
A survey of privacy threats and defense in vertical federated learning: From model life cycle perspective
L Yu, M Han, Y Li, C Lin, Y Zhang, M Zhang, Y Liu, H Weng, Y Jeon, ...
arXiv preprint arXiv:2402.03688, 2024
42024
Type++: prohibiting type confusion with inline type information
N Badoux, F Toffalini, Y Jeon, M Payer
NDSS, 2025
22025
Erasan: Efficient rust address sanitizer
J Min, D Yu, S Jeong, D Song, Y Jeon
2024 IEEE Symposium on Security and Privacy (SP), 4053-4068, 2024
22024
Automated blackbox inference of external origin user behavior
Z Wu, J Rhee, J Yuseok, LI Zhichun, K Jee, G Jiang
US Patent 10,572,661, 2020
22020
Blackbox program privilege flow analysis with inferred program behavior context
J Rhee, J Yuseok, LI Zhichun, K Jee, Z Wu, G Jiang
US Patent 10,505,962, 2019
22019
A distributed monitoring architecture for AMIs: Minimizing the number of monitoring nodes and enabling collided packet recovery
I Shin, JH Huh, Y Jeon, DM Nicol
Proceedings of the first ACM workshop on Smart energy grid security, 35-40, 2013
22013
Practical type and memory safety violation detection mechanisms
Y Jeon
Purdue University, 2020
12020
Apparatus and method for analyzing vulnerability of zigbee network
J Yuseok, S Incheol, J Choi, LEE Gunhee, KIM SinKyu, SEO Jungtaek
US Patent 9,294,496, 2016
12016
Apparatus and method for collecting network data traffic
IC Shin, YS Jeon, SK Kim, JT Seo
US Patent App. 14/401,364, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20