Lightweight Concolic Testing via Path-Condition Synthesis for Deep Learning Libraries [ paper]

Sehoon Kim, Yonghyeon Kim, Dahyeon Park, Yuseok Jeon, Jooyong Yi, and Mijung Kim

IEEE/ACM International Conference on Software Engineering (ICSE) 2025

CMASan: Custom Memory Allocator-aware Address Sanitizer [ paper | code ]

Junwha Hong, Wonil Jang, Mijung Kim, Lei Yu, Yonghwi Kwon, and Yuseok Jeon

IEEE Symposium on Security and Privacy (S&P) 2025

Type++: Prohibiting Type Confusion with Inline Type Information [ paper | code ]

Nicolas Badoux, Flavio Toffalini, Yuseok Jeon, and Mathias Payer

Network and Distributed System Security Symposium (NDSS) 2025 (distinguished paper award)

On the Robustness of Graph Reduction Against GNN Backdoor [ paper ]

Yuxuan Zhu, Michael Mandulak, Kerui Wu, George Slota, Yuseok Jeon, Ka-Ho Chow, and Lei Yu

ACM Workshop on Artificial Intelligence and Security (AISec) 2024 (in conjunction with CCS)

ERASAN: Efficient Rust Address Sanitizer [ paper | slide | code ]

Jiun Min*, Dongyeon Yu*, Seongyun Jeong, Dokyung Song, and Yuseok Jeon

IEEE Symposium on Security and Privacy (S&P) 2024

(*: co-first author)

DryJIN: Detecting Information Leaks in Android Applications [ paper | slide ]

Minseong Choi, Yubin Im, Steve Ko, Yonghwi Kwon, Yuseok Jeon, and Haehyun Cho

International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) 2024

Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique [ paper ]

Yoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, and Byoungyoung Lee

USENIX Security Symposium (Security) 2023

Perfect Spray: A Journey From Finding a New Type of Logical Flaw at Linux Kernel To Developing a New Heap Exploitation Technique

Yoochan Lee, Byoungyoung Lee, Yuseok Jeon, Jinhan Kwak, Junesoo Kang

BlackHat EUROPE 2022

DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing [ paper | slide | code ]

Seulbae Kim, Major Liu, Junghwan Rhee, Yuseok Jeon, Yonghwi Kwon, and Chung Hwan Kim

ACM Conference on Computer and Communications Security (CCS) 2022

ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs [ paper ]

Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, and Dave (Jing) Tian

ACM ASIA Conference on Computer and Communications Security (ASIACCS) 2022

SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms [ paper ]

Chijung Jung, Ali Ahad, Yuseok Jeon, and Yonghwi Kwon

IEEE Symposium on Security and Privacy (S&P) 2022

Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem [ paper ]

Bumjun Kwon, Sanghyun Hong, Yuseok Jeon, and Doowon Kim

International Conference on Information and Communications Security (ICICS) 2021

FuZZan: Efficient Sanitizer Metadata Design for Fuzzing [ paper | slide | code ]

Yuseok Jeon, WookHyun Han, Nathan Burow, and Mathias Payer

USENIX Annual Technical Conference (ATC) 2020

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications [ paper | slide ]

Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim, Zhichun Li, Mathias Payer, Byoungyoung Lee, and Zhenyu Wu

ACM Conference on Data and Application Security and Privacy (CODASPY) 2019

HexType: Efficient Detection of Type Confusion Errors for C++ [ paper | slide | code ]

Yuseok Jeon, Priyam Biswas, Scott A. Carr, Byoungyoung Lee, and Mathias Payer

ACM Conference on Computer and Communications Security (CCS) 2017

TypeSan: Practical Type Confusion Detection [ paper | code ]

Istvan Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida, Herbert Bos, and Erik van der Kouwe

ACM Conference on Computer and Communications Security (CCS) 2016

A Distributed Monitoring Architecture for AMIs [ paper ]

Incheol Shin, Junho Huh, Yuseok Jeon, and David M. Nicol

Smart Energy Grid Security Workshop (in conjunction with CCS) 2013

LT-OLSR: Attack-Tolerant OLSR against Link Spoofing [ paper ]

Yuseok Jeon, Tae-Hyung Kim, Yuna Kim, and Jong Kim

IEEE Conference on Local Computer Networks (LCN) 2012, Short Paper

TOP