Follow
Insu Yun
Insu Yun
Verified email at kaist.ac.kr - Homepage
Title
Cited by
Cited by
Year
{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing
I Yun, S Lee, M Xu, Y Jang, T Kim
27th USENIX Security Symposium (USENIX Security 18), 745-761, 2018
5192018
Kargus: a highly-scalable software-based intrusion detection system
MA Jamshed, J Lee, S Moon, I Yun, D Kim, S Lee, Y Yi, KS Park
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2032012
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
1582016
{APISan}: Sanitizing {API} Usages through Semantic {Cross-Checking}
I Yun, C Min, X Si, Y Jang, T Kim, M Naik
25th USENIX Security Symposium (USENIX Security 16), 363-378, 2016
106*2016
{REPT}: Reverse debugging of failures in deployed software
W Cui, X Ge, B Kasikci, B Niu, U Sharma, R Wang, I Yun
13th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2018
972018
Fuzzing javascript engines with aspect-preserving mutation
S Park, W Xu, I Yun, D Jang, T Kim
2020 IEEE Symposium on Security and Privacy (SP), 1629-1642, 2020
902020
{CAB-Fuzz}: Practical Concolic Testing Techniques for {COTS} Operating Systems
SY Kim, S Lee, I Yun, W Xu, B Lee, Y Yun, T Kim
2017 USENIX Annual Technical Conference (USENIX ATC 17), 689-701, 2017
632017
Automatic techniques to systematically discover new heap exploitation primitives
I Yun, D Kapil, T Kim
29th USENIX Security Symposium (USENIX Security 20), 1111-1128, 2020
442020
AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically
J Jung, C Jeon, M Wolotsky, I Yun, T Kim
Black Hat USA Briefings (Black Hat USA), Las Vegas, NV, 2017
31*2017
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
E Kim, D Kim, CJ Park, I Yun, Y Kim
NDSS, 2021
262021
Preventing {Use-After-Free} Attacks with Fast Forward Allocation
B Wickman, H Hu, I Yun, D Jang, JW Lim, S Kashyap, T Kim
30th USENIX Security Symposium (USENIX Security 21), 2453-2470, 2021
262021
{DoLTEst}: In-depth Downlink Negative Testing Framework for {LTE} Devices
CJ Park, S Bae, BS Oh, J Lee, E Lee, I Yun, Y Kim
31st USENIX Security Symposium (USENIX Security 22), 1325-1342, 2022
212022
HardsHeap: a universal and extensible framework for evaluating secure allocators
I Yun, W Song, S Min, T Kim
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
82021
Compromising the macOS kernel through Safari by chaining six vulnerabilities
Y Jin, J Lim, I Yun, T Kim
Black Hat USA Briefings (Black Hat USA), Las Vegas, NV, 2020
32020
Scalable and secure virtualization of hsm with scaletrust
J Han, I Yun, S Kim, T Kim, S Son, D Han
IEEE/ACM Transactions on Networking, 2022
22022
Fuzzing@ Home: Distributed Fuzzing on Untrusted Heterogeneous Clients
D Jang, A Askar, I Yun, S Tong, Y Cai, T Kim
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
22022
Reverse debugging of software failures
W Cui, X Ge, BCC Kasikci, B Niu, R Wang, I Yun
US Patent 10,565,511, 2020
22020
Analyzing security of Korean USIM-based PKI certificate service
S Park, S Park, I Yun, D Kim, Y Kim
Information Security Applications: 15th International Workshop, WISA 2014 …, 2015
22015
QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries
HS Han, JO Kyea, Y Jin, J Kang, B Pak, I Yun
2023 IEEE Symposium on Security and Privacy (SP), 3279-312795, 2023
12023
{BASECOMP}: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
E Kim, MW Baek, CJ Park, D Kim, Y Kim, I Yun
32nd USENIX Security Symposium (USENIX Security 23), 3547-3563, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20