QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing I Yun, S Lee, M Xu, Y Jang, T Kim 27th USENIX Security Symposium (USENIX Security 18), 744-761, 2018 | 540 | 2018 |
Breaking kernel address space layout randomization with intel tsx Y Jang, S Lee, T Kim Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 230 | 2016 |
Hacking in darkness: Return-oriented programming against secure enclaves J Lee, J Jang, Y Jang, N Kwak, Y Choi, C Choi, T Kim, M Peinado, ... 26th USENIX Security Symposium (USENIX Security 17), 522-539, 2017 | 224 | 2017 |
Preventing Use-after-free with Dangling Pointers Nullification. B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee NDSS, 2015 | 214 | 2015 |
SGX-Bomb: Locking down the processor via Rowhammer attack Y Jang, J Lee, S Lee, T Kim Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-6, 2017 | 184 | 2017 |
HFL: Hybrid Fuzzing on the Linux Kernel. K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee NDSS, 2020 | 129 | 2020 |
Firmae: Towards large-scale emulation of iot firmware for dynamic analysis M Kim, D Kim, E Kim, S Kim, Y Jang, Y Kim Annual computer security applications conference, 733-745, 2020 | 112 | 2020 |
Toward engineering a secure android ecosystem: A survey of existing techniques M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ... ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016 | 110 | 2016 |
APISan: Sanitizing API Usages through Semantic Cross-Checking I Yun, C Min, X Si, Y Jang, T Kim, M Naik 25th USENIX Security Symposium (USENIX Security 16), 363-378, 2016 | 110* | 2016 |
A11y attacks: Exploiting accessibility in operating systems Y Jang, C Song, SP Chung, T Wang, W Lee Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 109 | 2014 |
Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy on Public Cloud B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva 23rd usenix security symposium (USENIX Security 14), 33-48, 2014 | 105 | 2014 |
Breaking and fixing VoLTE: Exploiting hidden data channels and mis-implementations H Kim, D Kim, M Kwon, H Han, Y Jang, D Han, T Kim, Y Kim Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 88 | 2015 |
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset T Hoang, MO Ozmen, Y Jang, AA Yavuz In Proceedings on Privacy Enhancing Technologies Symposium (PoPETs), 2019 | 60 | 2019 |
Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications. Y Jang, SP Chung, BD Payne, W Lee NDSS, 2014 | 60 | 2014 |
Mactans: Injecting malware into iOS devices via malicious chargers B Lau, Y Jang, C Song, T Wang, PH Chung, P Royal Black Hat USA 2013, 2013 | 59 | 2013 |
Ucognito: Private browsing without tears M Xu, Y Jang, X Xing, T Kim, W Lee Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 27 | 2015 |
MOSE: Practical multi-user oblivious storage via secure enclaves T Hoang, R Behnia, Y Jang, AA Yavuz Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 24 | 2020 |
On the Feasibility of Large-Scale Infections of iOS Devices T Wang, Y Jang, Y Chen, S Chung, B Lau, W Lee 23rd USENIX Security Symposium (USENIX Security 14), 79-93, 2014 | 24 | 2014 |
Multik: A framework for orchestrating multiple specialized kernels HC Kuo, A Gunasekaran, Y Jang, S Mohan, RB Bobba, D Lie, J Walker arXiv preprint arXiv:1903.06889, 2019 | 18 | 2019 |
Tightly Seal Your Sensitive Pointers with PACTight M Ismail, A Quach, C Jelesnianski, Y Jang, C Min 31st USENIX Security Symposium (USENIX Security 22), 3717-3734, 2022 | 12 | 2022 |