Yonghwi Kwon

Orcid: 0000-0002-0021-2850

Affiliations:
  • University of Virginia, Charlottesville, VA, USA
  • Purdue University, West Lafayette, IN, USA (former)


According to our database1, Yonghwi Kwon authored at least 42 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content Service.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Hiding Critical Program Components via Ambiguous Translation.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
IEEE Trans. Inf. Forensics Secur., 2021

TLS 1.3 in Practice: How TLS 1.3 Contributes to the Internet.
Proceedings of the WWW '21: The Web Conference 2021, 2021

OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Swarmbug: debugging configuration bugs in swarm robotics.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

An Empirical Study of Bugs in WebAssembly Compilers.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Defeating Program Analysis Techniques via Ambiguous Translation.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Spinner: Automated Dynamic Command Subsystem Perturbation.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

SoftMark: Software Watermarking via a Binary Function Relocation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation.
Proc. ACM Program. Lang., 2019

Probabilistic disassembly.
Proceedings of the 41st International Conference on Software Engineering, 2019

MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Cubismo: decloaking server-side malware via cubist program analysis.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
AdBudgetKiller: Online Advertising Budget Draining Attack.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Lprov: Practical Library-aware Provenance Tracing.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
J-Force: Forced Execution on JavaScript.
Proceedings of the 26th International Conference on World Wide Web, 2017

Self Destructing Exploit Executions via Input Perturbation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

PAD: programming third-party web advertisement censorship.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

CPR: cross platform binary code reuse via platform independent trace program.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Apex: automatic programming assignment error explanation.
Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, 2016

LDX: Causality Inference by Lightweight Dual Execution.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

2015
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Dual Execution for On the Fly Fine Grained Execution Comparison.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2013
PIEtrace: Platform independent executable trace.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013


  Loading...