Yeongjin Jang

According to our database1, Yeongjin Jang authored at least 14 papers between 2014 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset.
IACR Cryptology ePrint Archive, 2018

QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Hacking in Darkness: Return-oriented Programming against Secure Enclaves.
Proceedings of the 26th USENIX Security Symposium, 2017

SGX-Bomb: Locking Down the Processor via Rowhammer Attack.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

2016
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques.
ACM Comput. Surv., 2016

APISan: Sanitizing API Usages through Semantic Cross-Checking.
Proceedings of the 25th USENIX Security Symposium, 2016

Breaking Kernel Address Space Layout Randomization with Intel TSX.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Preventing Use-after-free with Dangling Pointers Nullification.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

UCognito: Private Browsing without Tears.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
On the Feasibility of Large-Scale Infections of iOS Devices.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

A11y Attacks: Exploiting Accessibility in Operating Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...