Yeongjin Jang

Orcid: 0000-0003-4368-9736

According to our database1, Yeongjin Jang authored at least 31 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

SGX-USB: Secure USB I/O Path for Secure Enclaves.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Enforcing C/C++ Type and Scope at Runtime for Control-Flow and Data-Flow Integrity.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
Protect the System Call, Protect (Most of) the World with BASTION.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Practical Privacy-Preserving Authentication for SSH.
IACR Cryptol. ePrint Arch., 2022

Securely Sharing Randomized Code That Flies.
DTRAP, 2022

A Survey on Sensor False Data Injection Attacks and Countermeasures in Cyber-Physical and Embedded Systems.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Tightly Seal Your Sensitive Pointers with PACTight.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds.
IEEE Secur. Priv., 2021

VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
MARDU: Efficient and Scalable Code Re-randomization.
Proceedings of the SYSTOR 2020: The 13th ACM International Systems and Storage Conference, 2020

CrFuzz: fuzzing multi-purpose programs through input validation.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

HFL: Hybrid Fuzzing on the Linux Kernel.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset.
Proc. Priv. Enhancing Technol., 2019

Making Code Re-randomization Practical with MARDU.
CoRR, 2019

MultiK: A Framework for Orchestrating Multiple Specialized Kernels.
CoRR, 2019

2018
QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Hacking in Darkness: Return-oriented Programming against Secure Enclaves.
Proceedings of the 26th USENIX Security Symposium, 2017

SGX-Bomb: Locking Down the Processor via Rowhammer Attack.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

2016
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques.
ACM Comput. Surv., 2016

APISan: Sanitizing API Usages through Semantic Cross-Checking.
Proceedings of the 25th USENIX Security Symposium, 2016

Breaking Kernel Address Space Layout Randomization with Intel TSX.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Preventing Use-after-free with Dangling Pointers Nullification.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

UCognito: Private Browsing without Tears.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
On the Feasibility of Large-Scale Infections of iOS Devices.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

A11y Attacks: Exploiting Accessibility in Operating Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...