Showing results 1 to 14 of 14
Analyzing security of korean USIM-based PKI certificate service Shinjo Park; Suwan Park; Insu Yun; Dongkwan Kim; Yongdae Kim, 15th International Workshop on Information Security Applications (WISA 2014), pp.95 - 106, Springer Verlag, 2014-08-25 |
APISan: Sanitizing API usages through semantic cross-checking Insu Yun; Changwoo Min; Xujie Si; Yeongjin Jang; Taesoo Kim; Mayur Naik, 25th USENIX Security Symposium (Security '16), pp.363 - 377, USENIX Association, 2016-08-11 |
Automatic techniques to systematically discover new heap exploitation primitives Insu Yun; Dhaval Kapil; Taesoo Kim, 29th USENIX Security Symposium (Security '20), pp.1111 - 1128, USENIX Association, 2020-08-13 |
AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically Chanil Jeon; Insu Yun; Jinho Jung; Max Wolotsky; Taesoo Kim, Black Hat USA 2017, Black Hat, 2017-07-27 |
BASESPEC: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols Eunsoo Kim; Dongkwan Kim; CheolJun Park; Insu Yun; Yongdae Kim, 28th Annual Network and Distributed System Security Symposium (NDSS '21), INTERNET SOC, 2021-02-24 |
CAB-FUZZ: Practical concolic testing techniques for COTS operating systems Su Yong Kim; Sangho Lee; Insu Yun; Wen Xu; Byoungyoung Lee; Youngtae Yun; Taesoo Kim, 2017 USENIX Annual Technical Conference (ATC '17), pp.689 - 701, USENIX Association, 2017-07-14 |
Compromising the macOS kernel through Safari by chaining six vulnerabilities Yonghwi Jin; Jungwon Lim; Insu Yun; Taesoo Kim, Black Hat USA 2020, Black Hat, 2020-08-05 |
DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices CheolJun Park; Sangwook Bae; BeomSeok Oh; Jiho Lee; Eunkyu Lee; Insu Yun; Yongdae Kim, 31st USENIX Security Symposium (Security '22), pp.1325 - 1342, USENIX Association, 2022-08-10 |
Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients Daehee Jang; Ammar Askar; Insu Yun; Stephen Tong; Yiqin Cai; Taesoo Kim, 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID '22), pp.1 - 16, ACM, 2022-10-26 |
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators Insu Yun; Woosun Song; Seunggi Min; Taesoo Kim, 28th ACM Conference on Computer and Communications Security (CCS '21), pp.379 - 392, ACM, 2021-11-16 |
HDFI: Hardware-Assisted Data-Flow Isolation Chengyu Song; Hyungon Moon; Monjur Alam; Insu Yun; Byoungyoung Lee; Taesoo Kim; Wenke Lee; et al, 37th IEEE Symposium on Security and Privacy (Oakland '16), pp.1 - 17, IEEE Computer Society, 2016-05-23 |
Preventing use-after-free attacks with fast forward allocation Brian Wickman; Hong Hu; Insu Yun; Daehee Jang; JungWon Lim; Sanidhya Kashyap; Taesoo Kim, 30th USENIX Security Symposium (Security '21), pp.2453 - 2470, USENIX Association, 2021-08-12 |
QSYM: A practical concolic execution engine tailored for hybrid fuzzing Insu Yun; Sangho Lee; Meng Xu; Yeongjin Jang; Taesoo Kim, 27th USENIX Security Symposium (Security '18), pp.745 - 761, USENIX Association, 2018-08-16 |
REPT: Reverse debugging of failures in deployed software Weidong Cui; Xinyang Ge; Baris Kasikci; Ben Niu; Upamanyu Sharma; Ruoyu Wang; Insu Yun, 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI '18), pp.17 - 32, USENIX Association, 2018-10-08 |
Discover