Yuseok Jeon

According to our database1, Yuseok Jeon authored at least 12 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective.
CoRR, 2024

2023
Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
FuZZan: Efficient Sanitizer Metadata Design for Fuzzing.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

2019
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2017
HexType: Efficient Detection of Type Confusion Errors for C++.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
TypeSan: Practical Type Confusion Detection.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2013
A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery.
Proceedings of the SEGS'13, 2013

2012
LT-OLSR: Attack-tolerant OLSR against link spoofing.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012


  Loading...