What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yonghwi Kwon
Google Scholar
ORCID:
0000-0002-0021-2850
26
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
CMASan: Custom Memory Allocator-aware Address Sanitizer.
Junwha Hong
Wonil Jang
Mijung Kim
Lei Yu
Yonghwi Kwon
Yuseok Jeon
2025
conf/sp
Racedb: Detecting Request Race Vulnerabilities in Database-Backed Web Applications.
An Chen
Yonghwi Kwon
Kyu Hyung Lee
2024
conf/uss
SCAVY: Automated Discovery of Memory Corruption Targets in Linux Kernel for Privilege Escalation.
Erin Avllazagaj
Yonghwi Kwon
Tudor Dumitras
2024
conf/sec
DryJIN: Detecting Information Leaks in Android Applications.
Minseong Choi
Yubin Im
Steven Y. Ko
Yonghwi Kwon
Yuseok Jeon
Haehyun Cho
2023
conf/sp
Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation.
Ali Ahad
Chijung Jung
Ammar Askar
Doowon Kim
Taesoo Kim
Yonghwi Kwon
2023
conf/icisc
BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols.
Min Jang
Yuna Hwang
Yonghwi Kwon
Hyoungshick Kim
2023
conf/ndss
SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications.
An Chen
Jiho Lee
Basanta Chaulagain
Yonghwi Kwon
Kyu Hyung Lee
2022
conf/ccs
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing.
Seulbae Kim
Major Liu
Junghwan John Rhee
Yuseok Jeon
Yonghwi Kwon
Chung Hwan Kim
2022
conf/ccs
Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles.
Kyeongseok Yang
Sudharssan Mohan
Yonghwi Kwon
Heejo Lee
Chung Hwan Kim
2022
conf/sp
SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms.
Chijung Jung
Ali Ahad
Yuseok Jeon
Yonghwi Kwon
2022
conf/wisa
Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine.
Bora Lee
Kyungchan Lim
JiHo Lee
Chijung Jung
Doowon Kim
Kyu Hyung Lee
Haehyun Cho
Yonghwi Kwon
2021
journals/tifs
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
Hassaan Irshad
Gabriela F. Ciocarlie
Ashish Gehani
Vinod Yegneswaran
Kyu Hyung Lee
Jignesh M. Patel
Somesh Jha
Yonghwi Kwon
Dongyan Xu
Xiangyu Zhang
2021
conf/ccs
Spinner: Automated Dynamic Command Subsystem Perturbation.
Meng Wang
Chijung Jung
Ali Ahad
Yonghwi Kwon
2021
conf/sp
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Zhuo Zhang
Yapeng Ye
Wei You
Guanhong Tao
Wen-Chuan Lee
Yonghwi Kwon
Yousra Aafer
Xiangyu Zhang
2021
conf/asiaccs
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Doowon Kim
Haehyun Cho
Yonghwi Kwon
Adam Doupé
Sooel Son
Gail-Joon Ahn
Tudor Dumitras
2021
conf/ndss
C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis.
Yonghwi Kwon
Weihang Wang
Jinho Jung
Kyu Hyung Lee
Roberto Perdisci
2021
conf/acsac
SoftMark: Software Watermarking via a Binary Function Relocation.
Honggoo Kang
Yonghwi Kwon
Sangjin Lee
Hyungjoon Koo
2020
conf/sp
TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks.
Ranjita Pai Kasturi
Yiting Sun
Ruian Duan
Omar Alrawi
Ehsan Asdar
Victor Zhu
Yonghwi Kwon
Brendan Saltaformaggio
2020
conf/sp
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning.
Wei You
Zhuo Zhang
Yonghwi Kwon
Yousra Aafer
Fei Peng
Yu Shi
Carson Harmon
Xiangyu Zhang
2019
conf/ccs
MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis.
Abbas Naderi-Afooshteh
Yonghwi Kwon
Anh Nguyen-Tuong
Ali Razmjoo-Qalaei
Mohammad-Reza Zamiri-Gourabi
Jack W. Davidson
2019
conf/acsac
Cubismo: decloaking server-side malware via cubist program analysis.
Abbas Naderi-Afooshteh
Yonghwi Kwon
Anh Nguyen-Tuong
Mandana Bagheri-Marzijarani
Jack W. Davidson
2018
conf/ndss
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Yonghwi Kwon
Fei Wang
Weihang Wang
Kyu Hyung Lee
Wen-Chuan Lee
Shiqing Ma
Xiangyu Zhang
Dongyan Xu
Somesh Jha
Gabriela F. Ciocarlie
Ashish Gehani
Vinod Yegneswaran
2018
conf/acsac
Lprov: Practical Library-aware Provenance Tracing.
Fei Wang
Yonghwi Kwon
Shiqing Ma
Xiangyu Zhang
Dongyan Xu
2017
conf/ndss
Self Destructing Exploit Executions via Input Perturbation.
Yonghwi Kwon
Brendan Saltaformaggio
I Luk Kim
Kyu Hyung Lee
Xiangyu Zhang
Dongyan Xu
2017
conf/acsac
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications.
Taegyu Kim
Chung Hwan Kim
Hongjun Choi
Yonghwi Kwon
Brendan Saltaformaggio
Xiangyu Zhang
Dongyan Xu
2015
conf/ndss
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Yonghwi Kwon
Fei Peng
Dohyeong Kim
Kyungtae Kim
Xiangyu Zhang
Dongyan Xu
Vinod Yegneswaran
John Qian
Coauthors
Abbas Naderi-Afooshteh
(2)
Adam Doupé
(1)
Ali Ahad
(3)
Ali Razmjoo-Qalaei
(1)
Ammar Askar
(1)
An Chen
(2)
Anh Nguyen-Tuong
(2)
Ashish Gehani
(2)
Basanta Chaulagain
(1)
Bora Lee
(1)
Brendan Saltaformaggio
(3)
Carson Harmon
(1)
Chijung Jung
(4)
Chung Hwan Kim
(3)
Dohyeong Kim
(1)
Dongyan Xu
(6)
Doowon Kim
(3)
Ehsan Asdar
(1)
Erin Avllazagaj
(1)
Fei Peng
(2)
Fei Wang
(1)
Fei Wang
(1)
Gabriela F. Ciocarlie
(2)
Gail-Joon Ahn
(1)
Guanhong Tao
(1)
Haehyun Cho
(3)
Hassaan Irshad
(1)
Heejo Lee
(1)
Honggoo Kang
(1)
Hongjun Choi
(1)
Hyoungshick Kim
(1)
Hyungjoon Koo
(1)
I Luk Kim
(1)
Jack W. Davidson
(2)
Jignesh M. Patel
(1)
Jiho Lee
(2)
Jinho Jung
(1)
John Qian
(1)
Junghwan John Rhee
(1)
Junwha Hong
(1)
Kyeongseok Yang
(1)
Kyu Hyung Lee
(7)
Kyungchan Lim
(1)
Kyungtae Kim
(1)
Lei Yu
(1)
Major Liu
(1)
Mandana Bagheri-Marzijarani
(1)
Meng Wang
(1)
Mijung Kim
(1)
Min Jang
(1)
Minseong Choi
(1)
Mohammad-Reza Zamiri-Gourabi
(1)
Omar Alrawi
(1)
Ranjita Pai Kasturi
(1)
Roberto Perdisci
(1)
Ruian Duan
(1)
Sangjin Lee
(1)
Seulbae Kim
(1)
Shiqing Ma
(2)
Somesh Jha
(2)
Sooel Son
(1)
Steven Y. Ko
(1)
Sudharssan Mohan
(1)
Taegyu Kim
(1)
Taesoo Kim
(1)
Tudor Dumitras
(2)
Victor Zhu
(1)
Vinod Yegneswaran
(3)
Wei You
(2)
Weihang Wang
(2)
Wen-Chuan Lee
(2)
Wonil Jang
(1)
Xiangyu Zhang
(8)
Yapeng Ye
(1)
Yiting Sun
(1)
Yonghwi Kwon
(26)
Yousra Aafer
(2)
Yu Shi
(1)
Yubin Im
(1)
Yuna Hwang
(1)
Yuseok Jeon
(4)
Zhuo Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to