{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing I Yun, S Lee, M Xu, Y Jang, T Kim 27th USENIX Security Symposium (USENIX Security 18), 745-761, 2018 | 540 | 2018 |
Kargus: a highly-scalable software-based intrusion detection system MA Jamshed, J Lee, S Moon, I Yun, D Kim, S Lee, Y Yi, KS Park Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 210 | 2012 |
HDFI: Hardware-assisted data-flow isolation C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek 2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016 | 168 | 2016 |
{APISan}: Sanitizing {API} Usages through Semantic {Cross-Checking} I Yun, C Min, X Si, Y Jang, T Kim, M Naik 25th USENIX Security Symposium (USENIX Security 16), 363-378, 2016 | 110* | 2016 |
{REPT}: Reverse debugging of failures in deployed software W Cui, X Ge, B Kasikci, B Niu, U Sharma, R Wang, I Yun 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2018 | 101 | 2018 |
Fuzzing javascript engines with aspect-preserving mutation S Park, W Xu, I Yun, D Jang, T Kim 2020 IEEE Symposium on Security and Privacy (SP), 1629-1642, 2020 | 96 | 2020 |
{CAB-Fuzz}: Practical Concolic Testing Techniques for {COTS} Operating Systems SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim 2017 USENIX Annual Technical Conference (USENIX ATC 17), 689-701, 2017 | 66 | 2017 |
Automatic techniques to systematically discover new heap exploitation primitives I Yun, D Kapil, T Kim 29th USENIX Security Symposium (USENIX Security 20), 1111-1128, 2020 | 47 | 2020 |
AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically J Jung, C Jeon, M Wolotsky, I Yun, T Kim Black Hat USA Briefings (Black Hat USA), Las Vegas, NV, 2017 | 33* | 2017 |
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols. E Kim, D Kim, CJ Park, I Yun, Y Kim NDSS, 2021 | 30 | 2021 |
Preventing {Use-After-Free} Attacks with Fast Forward Allocation B Wickman, H Hu, I Yun, D Jang, JW Lim, S Kashyap, T Kim 30th USENIX Security Symposium (USENIX Security 21), 2453-2470, 2021 | 30 | 2021 |
{DoLTEst}: In-depth Downlink Negative Testing Framework for {LTE} Devices CJ Park, S Bae, BS Oh, J Lee, E Lee, I Yun, Y Kim 31st USENIX Security Symposium (USENIX Security 22), 1325-1342, 2022 | 23 | 2022 |
HardsHeap: a universal and extensible framework for evaluating secure allocators I Yun, W Song, S Min, T Kim Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 9 | 2021 |
Compromising the macOS kernel through Safari by chaining six vulnerabilities Y Jin, J Lim, I Yun, T Kim Black Hat USA Briefings (Black Hat USA), Las Vegas, NV, 2020 | 4 | 2020 |
Scalable and secure virtualization of hsm with scaletrust J Han, I Yun, S Kim, T Kim, S Son, D Han IEEE/ACM Transactions on Networking, 2022 | 3 | 2022 |
{BASECOMP}: A Comparative Analysis for Integrity Protection in Cellular Baseband Software E Kim, MW Baek, CJ Park, D Kim, Y Kim, I Yun 32nd USENIX Security Symposium (USENIX Security 23), 3547-3563, 2023 | 2 | 2023 |
Fuzzing@ Home: Distributed Fuzzing on Untrusted Heterogeneous Clients D Jang, A Askar, I Yun, S Tong, Y Cai, T Kim Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 2 | 2022 |
Reverse debugging of software failures W Cui, X Ge, BCC Kasikci, B Niu, R Wang, I Yun US Patent 10,565,511, 2020 | 2 | 2020 |
Analyzing security of Korean USIM-based PKI certificate service S Park, S Park, I Yun, D Kim, Y Kim Information Security Applications: 15th International Workshop, WISA 2014 …, 2015 | 2 | 2015 |
QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries HS Han, JO Kyea, Y Jin, J Kang, B Pak, I Yun 2023 IEEE Symposium on Security and Privacy (SP), 3279-312795, 2023 | 1 | 2023 |