Calculated based on number of publications stored in Pure and citations from Scopus
20132023

Research activity per year

Filter
Conference contribution

Search results

  • 2022

    Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients

    Jang, D., Askar, A., Yun, I., Tong, S., Cai, Y. & Kim, T., 26 Oct 2022, Proceedings of 25th International Symposium on Researchin Attacks, Intrusions and Defenses, RAID 2022. Association for Computing Machinery, p. 1-16 16 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    BadASLR: Exceptional Cases of ASLR Aiding Exploitation

    Jang, D., 2021, Information Security Applications - 22nd International Conference, WISA 2021, Revised Selected Papers. Kim, H. (ed.). Springer Science and Business Media Deutschland GmbH, p. 278-289 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13009 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Preventing use-after-free attacks with fast forward allocation

    Wickman, B., Hu, H., Yun, I., Jang, D., Lim, J. W., Kashyap, S. & Kim, T., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 2453-2470 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Citations (Scopus)
  • 2020

    Fuzzing JavaScript engines with aspect-preserving mutation

    Park, S., Xu, W., Yun, I., Jang, D. & Kim, T., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 1629-1642 14 p. 9152648. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    77 Citations (Scopus)
  • 2019

    POLaR: Per-Allocation Object Layout Randomization

    Kim, J., Jang, D., Jeong, Y. & Kang, B. B., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. Institute of Electrical and Electronics Engineers Inc., p. 505-516 12 p. 8809488. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2014

    ATRA: Address translation redirection attack gainst hardware-based external monitors

    Jang, D., Lee, H., Kim, M., Kim, D., Kim, D. & Kang, B. B., 3 Nov 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 167-178 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Citations (Scopus)
  • 2013

    KI-Mon: A hardware-assisted event-triggered monitoring platform for mutable kernel object

    Lee, H., Moon, H., Jang, D., Kim, K., Lee, J., Paek, Y. & Kang, B. B. H., 2013, Proceedings of the 22nd USENIX Security Symposium. USENIX Association, p. 511-526 16 p. (Proceedings of the 22nd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    55 Citations (Scopus)