35. Hiding Critical Program Components via Ambiguous Translation
In Proc. of the 44th International Conference on Software Engineering
Chijung Jung, Doowon Kim, An Chen, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, and Yonghwi Kwon
@inproceedings{conf_icse22_ambitr, author = {Chijung Jung and Doowon Kim and An Chen and Weihang Wang and Yunhui Zheng and Kyu Hyung Lee and Yonghwi Kwon}, title = {Hiding Critical Program Components via Ambiguous Translation}, booktitle = {44th {IEEE/ACM} 44th International Conference on Software Engineering, {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022}, pages = {1120--1132}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1145/3510003.3510139}, doi = {10.1145/3510003.3510139}, }
34. SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms
In Proc. of the 43rd IEEE Symposium on Security and Privacy
Chijung Jung, Ali Ahad, Yuseok Jeon, and Yonghwi Kwon
@inproceedings{conf_oakland22_swarmflawfinder, author = {Chijung Jung and Ali Ahad and Yuseok Jeon and Yonghwi Kwon}, title = {{SwarmFlawFinder:} Discovering and Exploiting Logic Flaws of Swarm Algorithms}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, 23-26 May 2021}, pages = {1447-1464}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.ieeecomputersociety.org/10.1109/SP46214.2022.00084}, doi = {10.1109/SP46214.2022.00084}, }
33. Sofware Watermarking via a Binary Function Relocation
In Proc. of 37th Annual Conference on Computer Security Applications
Honggoo Kang, Yonghwi Kwon, Sangjin Lee, and Hyungjoon Koo
@inproceedings{conf_acsac21_watermarking, author = {Honggoo Kang and Yonghwi Kwon and Sangjin Lee and Hyungjoon Koo}, title = {SoftMark: Software Watermarking via a Binary Function Relocation}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {169--181}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488027}, doi = {10.1145/3485832.3488027}, }
32. Defeating Program Analysis Techniques via Ambiguous Translation
In Proc. of 36th IEEE/ACM International Conference on Automated Software Engineering (New Ideas and Emerging Results Track)
Chijung Jung, Doowon Kim, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, and Yonghwi Kwon
@inproceedings{conf_ase21nier, author = {Chijung Jung and Doowon Kim and Weihang Wang and Yunhui Zheng and Kyu Hyung Lee and Yonghwi Kwon}, title = {Defeating Program Analysis Techniques via Ambiguous Translation}, booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2021, Melbourne, Australia, November 15-19, 2021}, pages = {1382--1387}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ASE51524.2021.9678912}, doi = {10.1109/ASE51524.2021.9678912}, }
31. TRACE: Enterprise-Wide Provenance Tracking For Real-Time APT Detection
IEEE Transactions on Information Forensics and Security
Hassaan Irshad, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, and Xiangyu Zhang
@article{journal_tifs_trace, author = {Hassaan Irshad and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran and Kyu Hyung Lee and Jignesh M. Patel and Somesh Jha and Yonghwi Kwon and Dongyan Xu and Xiangyu Zhang}, title = {{TRACE:} Enterprise-Wide Provenance Tracking for Real-Time {APT} Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4363--4376}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3098977}, doi = {10.1109/TIFS.2021.3098977}, }
30. An Empirical Study of Bugs in WebAssembly Compilers
In Proc. of 36th IEEE/ACM International Conference on Automated Software Engineering
Alan Romano, Xinyue Liu, Yonghwi Kwon, and Weihang Wang
@inproceedings{conf_ase21_wasmcompiler, author = {Alan Romano and Xinyue Liu and Yonghwi Kwon and Weihang Wang}, title = {An Empirical Study of Bugs in WebAssembly Compilers}, booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2021, Melbourne, Australia, November 15-19, 2021}, pages = {42--54}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ASE51524.2021.9678776}, doi = {10.1109/ASE51524.2021.9678776}, }
29. Swarmbug: Debugging Configuration Bugs in Swarm Robotics
In Proc. of 29th ACM SIGSOFT International Symposium on the Foundations of Software Engineering
Chijung Jung, Ali Ahad, Jinho Jung, Sebastian Elbaum, and Yonghwi Kwon
@inproceedings{conf_fse21_swarmbug, author = {Chijung Jung and Ali Ahad and Jinho Jung and Sebastian G. Elbaum and Yonghwi Kwon}, editor = {Diomidis Spinellis and Georgios Gousios and Marsha Chechik and Massimiliano Di Penta}, title = {Swarmbug: debugging configuration bugs in swarm robotics}, booktitle = {{ESEC/FSE} '21: 29th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, Greece, August 23-28, 2021}, pages = {868--880}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3468264.3468601}, doi = {10.1145/3468264.3468601}, }
28. Spinner: Automated Dynamic Command Subsystem Perturbation
In Proc. of 28th ACM Conference on Computer and Communications Security
Chijung Jung, Ali Ahad, and Yonghwi Kwon
@inproceedings{conf_ccs21_spinner, author = {Meng Wang and Chijung Jung and Ali Ahad and Yonghwi Kwon}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Spinner: Automated Dynamic Command Subsystem Perturbation}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1839--1860}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484577}, doi = {10.1145/3460120.3484577} }
27. Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
In Proc. of 16th ACM ASIA Conference on Computer and Communications Security
Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Doupe, Sooel Son, Gail-Joon Ahn, and Tudor Dumitras
@inproceedings{conf_asiaccs21_certificate, author = {Doowon Kim and Haehyun Cho and Yonghwi Kwon and Adam Doup{\'{e}} and Sooel Son and Gail{-}Joon Ahn and Tudor Dumitras}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Security Analysis on Practices of Certificate Authorities in the {HTTPS} Phishing Ecosystem}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {407--420}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453100}, doi = {10.1145/3433210.3453100}, }
26. TLS 1.3 in Practice: How TLS 1.3 Contributes to the Internet
In Proc. of 30th The Web Conference
Hyunwoo Lee, Doowon Kim, and Yonghwi Kwon
@inproceedings{conf_www21_tls13, author = {Hyunwoo Lee and Doowon Kim and Yonghwi Kwon}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {{TLS} 1.3 in Practice: How {TLS} 1.3 Contributes to the Internet}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {70--79}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3450057}, doi = {10.1145/3442381.3450057}, }
25. OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary
In Proc. of the 42nd IEEE Symposium on Security and Privacy
Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-chuan Lee, Yonghwi Kwon, Yousra Aafer, and Xiangyu Zhang
@inproceedings{conf_oakland21_osprey, author = {Zhuo Zhang and Yapeng Ye and Wei You and Guanhong Tao and Wen{-}Chuan Lee and Yonghwi Kwon and Yousra Aafer and Xiangyu Zhang}, title = {{OSPREY:} Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {813--832}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00051}, doi = {10.1109/SP40001.2021.00051}, }
24. C2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis
In Proc. of the 28th Network and Distributed System Security Symposium
Yonghwi Kwon, Weihang Wang, Jinho Jung, Kyu Hyung Lee, and Roberto Perdisci
@inproceedings{conf_ndss21_c2sr, author = {Yonghwi Kwon and Weihang Wang and Jinho Jung and Kyu Hyung Lee and Roberto Perdisci}, title = {C{\^{2}}SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, Virtual, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/c2sr-cybercrime-scene-reconstruction-for-post-mortem-forensic-analysis/}, }
23. TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks
In Proc. of the 41st IEEE Symposium on Security and Privacy
Ranjita Pai Kasturi, Yiting Sun, Ruian Duian, Omar Alrawi, Ehsan Asdar, Victor Zhu, Yonghwi Kwon, and Brendan Saltaformaggio
@inproceedings{conf_oakland20_tardis, author = {Ranjita Pai Kasturi and Yiting Sun and Ruian Duan and Omar Alrawi and Ehsan Asdar and Victor Zhu and Yonghwi Kwon and Brendan Saltaformaggio}, title = {{TARDIS:} Rolling Back The Clock On CMS-Targeting Cyber Attacks}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1156--1171}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00116}, doi = {10.1109/SP40000.2020.00116}, }
22. PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning
In Proc. of the 41st IEEE Symposium on Security and Privacy
Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Makena Harmon, and Xiangyu Zhang
@inproceedings{conf_oakland20_pmp, author = {You, Wei and Zhang, Zhuo and Kwon, Yonghwi and Aafer, Yousra and Peng, Fei and Shi, Yu and Harmon, Carson and Zhang, Xiangyu}, booktitle = {2020 IEEE Symposium on Security and Privacy (SP)}, title = {PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning}, year = {2020}, volume = {}, number = {}, pages = {1121-1138}, doi = {10.1109/SP40000.2020.00035} }
21. MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis
In Proc. of the 26th ACM Conference on Computer and Communications Security
Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Ali Razmjoo-Qalaei, Mohammad-Reza Zamiri-Gourabi, and Jack W. Davidson
@inproceedings{conf_ccs19_malmax, author = {Naderi-Afooshteh, Abbas and Kwon, Yonghwi and Nguyen-Tuong, Anh and Razmjoo-Qalaei, Ali and Zamiri-Gourabi, Mohammad-Reza and Davidson, Jack W.}, title = {MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis}, year = {2019}, isbn = {9781450367479}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3319535.3363199}, doi = {10.1145/3319535.3363199}, booktitle = {Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security}, pages = {1849-1866}, numpages = {18}, keywords = {multi-aspect execution, counterfactual execution, PHP, malware, security}, location = {London, United Kingdom}, series = {CCS '19} }
20. CUBISMO: Decloaking Server-side Malware via Cubist Program Analysis
In Proc. of the 35th Annual Conference on Computer Security Applications
Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, and Jack W. Davidson
@inproceedings{conf_acsac19_cubismo, author = {Naderi-Afooshteh, Abbas and Kwon, Yonghwi and Nguyen-Tuong, Anh and Bagheri-Marzijarani, Mandana and Davidson, Jack W.}, title = {Cubismo: Decloaking Server-Side Malware via Cubist Program Analysis}, year = {2019}, isbn = {9781450376280}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3359789.3359821}, doi = {10.1145/3359789.3359821}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference}, pages = {430-443}, numpages = {14}, keywords = {PHP, malware, counterfactual execution, obfuscation, evasion, security}, location = {San Juan, Puerto Rico}, series = {ACSAC '19} }
19. BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation
In Proc. of the 2019 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications
Zhuo Zhang, Wei You, Guanhong Tao, Guannan Wei, Yonghwi Kwon, and Xiangyu Zhang
@article{conf_oopsla19_bda, author = {Zhang, Zhuo and You, Wei and Tao, Guanhong and Wei, Guannan and Kwon, Yonghwi and Zhang, Xiangyu}, title = {BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-Program Path Sampling and per-Path Abstract Interpretation}, year = {2019}, issue_date = {October 2019}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {3}, number = {OOPSLA}, url = {https://doi.org/10.1145/3360563}, doi = {10.1145/3360563}, journal = {Proc. ACM Program. Lang.}, month = {oct}, articleno = {137}, numpages = {31}, }
18. Probabilistic Disassembly
In Proc. of the 41st International Conference on Software Engineering
Kenneth Adam Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang, Xiangyu Zhang, and Zhiqiang Lin
@inproceedings{conf_icse19_probdisasm, author = {Miller, Kenneth and Kwon, Yonghwi and Sun, Yi and Zhang, Zhuo and Zhang, Xiangyu and Lin, Zhiqiang}, title = {Probabilistic Disassembly}, booktitle = {Proceedings of the 41st International Conference on Software Engineering}, series = {ICSE '19}, year = {2019}, location = {Montreal, Quebec, Canada}, pages = {1187--1198}, numpages = {12}, url = {https://doi.org/10.1109/ICSE.2019.00121}, doi = {10.1109/ICSE.2019.00121}, acmid = {3339653}, publisher = {IEEE Press}, address = {Piscataway, NJ, USA}, }
17. Lprov: Practical Library-aware Provenance Tracing
In Proc. of the 34th Annual Conference on Computer Security Applications
Fei Wang, Yonghwi Kwon, Shiqing Ma, Xiangyu Zhang, and Dongyan Xu
@inproceedings{conf_acsac18_lprov, author = {Fei Wang and Yonghwi Kwon and Shiqing Ma and Xiangyu Zhang and Dongyan Xu}, title = {{Lprov}: Practical Library-aware Provenance Tracing}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference ({ACSAC}'18), San Juan, PR, USA, December 03-07, 2018}, pages = {605--617}, year = {2018}, doi = {10.1145/3274694.3274751}, timestamp = {Wed, 05 Dec 2018 09:44:25 +0100}, }
16. Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
In Proc. of the 2018 USENIX Annual Technical Conference
Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, and Somesh Jha
@inproceedings{conf_atc18_kcal, author = {Shiqing Ma and Juan Zhai and Yonghwi Kwon and Kyu Hyung Lee and Xiangyu Zhang and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran and Dongyan Xu and Somesh Jha}, title = {Kernel-Supported Cost-Effective Audit Logging for Causality Tracking}, booktitle = {Proceedings of the 2018 {USENIX} Annual Technical Conference, ({ATC}'18), Boston, MA, USA, July 11-13, 2018}, pages = {241--254}, year = {2018}, timestamp = {Mon, 16 Jul 2018 15:47:29 +0200}, }
15. Combatting Advanced Persistent Threat via Causality Inference and Program Analysis
Ph.D. Thesis
Yonghwi Kwon
@phdthesis{phdthesis_yonghwi_kwon, author = "Yonghwi Kwon", title = "Combatting Advanced Persistent Threat via Causality Inference and Program Analysis", school = "Purdue University", year = "2018" }
14. AdBudgetKiller: Online Advertising Budget Draining Attack
In Proc. of the 27th International World Wide Web Conference
I Luk Kim, Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, Weijie Meng, and Xiangyu Zhang
@inproceedings{conf_www18_adbudgetkiller, author = {I Luk Kim and Weihang Wang and Yonghwi Kwon and Yunhui Zheng and Yousra Aafer and Weijie Meng and Xiangyu Zhang}, title = {{AdBudgetKiller}: Online Advertising Budget Draining Attack}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web ({WWW}'18), Lyon, France, April 23-27, 2018}, pages = {297--307}, year = {2018}, doi = {10.1145/3178876.3186096}, timestamp = {Wed, 21 Nov 2018 12:44:11 +0100}, }
13. MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation
In Proc. of the 25th Network and Distributed System Security Symposium
Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela Ciocarlie, Ashish Gehani, and Vinod Yegneswaran
@inproceedings{conf_ndss18_mci, author = {Yonghwi Kwon and Fei Wang and Weihang Wang and Kyu Hyung Lee and Wen{-}Chuan Lee and Shiqing Ma and Xiangyu Zhang and Dongyan Xu and Somesh Jha and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran}, title = {{MCI}: Modeling-based Causality Inference in Audit Logging for Attack Investigation}, booktitle = {Proceedings of the 25th Annual Network and Distributed System Security Symposium ({NDSS}'18), San Diego, California, USA, February 18-21, 2018}, timestamp = {Thu, 09 Aug 2018 10:56:55 +0200}, }
12. RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications
In Proc. of the 33rd Annual Conference on Computer Security Applications
Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu
@inproceedings{conf_acsac17_revarm, author = {Taegyu Kim and Chung Hwan Kim and Hongjun Choi and Yonghwi Kwon and Brendan Saltaformaggio and Xiangyu Zhang and Dongyan Xu}, title = {{RevARM}: {A} Platform-Agnostic {ARM} Binary Rewriter for Security Applications}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference ({ACSAC}'17), Orlando, FL, USA, December 4-8, 2017}, pages = {412--424}, year = {2017}, doi = {10.1145/3134600.3134627}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, }
11. PAD: Programming Third-party Web Advertisement Censorship
In Proc. of the 32nd IEEE/ACM International Conference on Automated Software Engineering
Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, I Luk Kim, Wen-Chuan Lee, Yingqi Liu, Weijie Meng, Xiangyu Zhang, and Patrick Eugster
@inproceedings{conf_ase17_pad, author = {Weihang Wang and Yonghwi Kwon and Yunhui Zheng and Yousra Aafer and I Luk Kim and Wen{-}Chuan Lee and Yingqi Liu and Weijie Meng and Xiangyu Zhang and Patrick Eugster}, title = {{PAD:} programming third-party web advertisement censorship}, booktitle = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated Software Engineering ({ASE}'17), Urbana, IL, USA, October 30 - November 03, 2017}, pages = {240--251}, year = {2017}, doi = {10.1109/ASE.2017.8115637}, timestamp = {Thu, 05 Jul 2018 01:00:00 +0200}, }
10. CPR: Cross Platform Binary Code Reuse via Platform Independent Trace Program
In Proc. of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis
Yonghwi Kwon, Weihang Wang, Yunhui Zheng, Xiangyu Zhang, and Dongyan Xu
@inproceedings{conf_issta17_cpr, author = {Yonghwi Kwon and Weihang Wang and Yunhui Zheng and Xiangyu Zhang and Dongyan Xu}, title = {{CPR:} cross platform binary code reuse via platform independent trace program}, booktitle = {Proceedings of the 26th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis ({ISSTA}'17), Santa Barbara, CA, USA, July 10 - 14, 2017}, pages = {158--169}, year = {2017}, doi = {10.1145/3092703.3092707}, timestamp = {Tue, 06 Nov 2018 16:57:30 +0100}, }
9. J-Force: Forced Execution on JavaScript
In Proc. of the 26th International World Wide Web Conference
Kyungtae Kim, I Luk Kim, Chung Hwan Kim, Yonghwi Kwon, Yunhui Zheng, Xiangyu Zhang, and Dongyan Xu
@inproceedings{conf_www17_jforce, author = {Kyungtae Kim and I Luk Kim and Chung Hwan Kim and Yonghwi Kwon and Yunhui Zheng and Xiangyu Zhang and Dongyan Xu}, title = {{J-Force}: Forced Execution on JavaScript}, booktitle = {Proceedings of the 26th International Conference on World Wide Web ({WWW}'17), Perth, Australia, April 3-7, 2017}, pages = {897--906}, year = {2017}, doi = {10.1145/3038912.3052674}, timestamp = {Tue, 06 Nov 2018 16:57:07 +0100}, }
8. A2C: Self Destructing Exploit Executions via Input Perturbation
In Proc. of the 24th Network and Distributed System Security Symposium
Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu
@inproceedings{conf_ndss17_a2c, author = {Yonghwi Kwon and Brendan Saltaformaggio and I Luk Kim and Kyu Hyung Lee and Xiangyu Zhang and Dongyan Xu}, title = {{A2C}: Self Destructing Exploit Executions via Input Perturbation}, booktitle = {Proceedings of the 24th Annual Network and Distributed System Security Symposium ({NDSS}'17), San Diego, California, USA, February 26 - March 1, 2017}, timestamp = {Thu, 05 Jul 2018 01:00:00 +0200}, }
7. Apex: Automatic Programming Assignment Error Explanation
In Proc. of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications
Dohyeong Kim, Yonghwi Kwon, Peng Liu, I Luk Kim, David Mitchel Perry, Xiangyu Zhang, and Gustavo Rodriguez-Rivera
@inproceedings{conf_oopsla16_apex, author = {Dohyeong Kim and Yonghwi Kwon and Peng Liu and I Luk Kim and David Mitchel Perry and Xiangyu Zhang and Gustavo Rodriguez{-}Rivera}, title = {{Apex}: automatic programming assignment error explanation}, booktitle = {Proceedings of the 2016 {ACM} {SIGPLAN} International Conference on Object-Oriented Programming, Systems, Languages, and Applications ({OOPSLA}'16), Amsterdam, The Netherlands, October 30 - November 4, 2016}, pages = {311--327}, year = {2016}, doi = {10.1145/2983990.2984031}, timestamp = {Tue, 06 Nov 2018 16:57:16 +0100}, }
6. WebRanz: Web Page Randomization For Better Advertisement Delivery and Web-Bot Prevention
In Proc. of the 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering
Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, and Patrick Eugster
@inproceedings{conf_fse16_webranz, author = {Weihang Wang and Yunhui Zheng and Xinyu Xing and Yonghwi Kwon and Xiangyu Zhang and Patrick Th. Eugster}, title = {{WebRanz}: web page randomization for better advertisement delivery and web-bot prevention}, booktitle = {Proceedings of the 24th {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering ({FSE}'16), Seattle, WA, USA, November 13-18, 2016}, pages = {205--216}, year = {2016}, doi = {10.1145/2950290.2950352}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, }
5. Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic
In Proc. of the 10th USENIX Workshop on Offensive Technologies
Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, and John Qian
@inproceedings{workshop_woot16_netscope, author = {Brendan Saltaformaggio and Hongjun Choi and Kristen Johnson and Yonghwi Kwon and Qi Zhang and Xiangyu Zhang and Dongyan Xu and John Qian}, title = {Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic}, booktitle = {Proceedings of the 10th {USENIX} Workshop on Offensive Technologies ({WOOT}'16), Austin, TX, USA, August 8-9, 2016.}, year = {2016}, timestamp = {Thu, 05 Jul 2018 01:00:00 +0200}, }
4. LDX: Causality Inference by Lightweight Dual Execution
In Proc. of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems
Yonghwi Kwon, Dohyeong Kim, William N. Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu
@inproceedings{conf_asplos16_ldx, author = {Yonghwi Kwon and Dohyeong Kim and William N. Sumner and Kyungtae Kim and Brendan Saltaformaggio and Xiangyu Zhang and Dongyan Xu}, title = {{LDX:} Causality Inference by Lightweight Dual Execution}, booktitle = {Proceedings of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems ({ASPLOS}'16), Atlanta, GA, USA, April 2-6, 2016}, pages = {503--515}, year = {2016}, doi = {10.1145/2872362.2872395}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, }
3. Dual Execution for On the Fly Fine Grained Execution Comparison
In Proc. of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems
Dohyeong Kim, Yonghwi Kwon, William N. Sumner, Xiangyu Zhang, and Dongyan Xu
@inproceedings{conf_asplos15_dualexec, author = {Dohyeong Kim and Yonghwi Kwon and William N. Sumner and Xiangyu Zhang and Dongyan Xu}, title = {Dual Execution for On the Fly Fine Grained Execution Comparison}, booktitle = {Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems ({ASPLOS}'15), Istanbul, Turkey, March 14-18, 2015}, pages = {325--338}, year = {2015}, doi = {10.1145/2694344.2694394}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, }
2. P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
In Proc. of the 22nd Network and Distributed System Security Symposium
Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, and John Qian
@inproceedings{conf_ndss15_p2c, author = {Yonghwi Kwon and Fei Peng and Dohyeong Kim and Kyungtae Kim and Xiangyu Zhang and Dongyan Xu and Vinod Yegneswaran and John Qian}, title = {{P2C:} Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions}, booktitle = {Proceedings of the 22nd Annual Network and Distributed System Security Symposium ({NDSS}'15), San Diego, California, USA, February 8-11, 2015}, year = {2015}, timestamp = {Thu, 05 Jul 2018 01:00:00 +0200}, }
1. PIEtrace: Platform Independent Executable Trace
In Proc. of the 28th IEEE/ACM International Conference on Automated Software Engineering
Yonghwi Kwon, Xiangyu Zhang, and Dongyan Xu
@inproceedings{conf_ase13_pietrace, author = {Yonghwi Kwon and Xiangyu Zhang and Dongyan Xu}, title = {{PIEtrace:} Platform independent executable trace}, booktitle = {Proceedings of the 28th {IEEE/ACM} International Conference on Automated Software Engineering ({ASE}'13), Silicon Valley, CA, USA, November 11-15, 2013}, pages = {48--58}, year = {2013}, doi = {10.1109/ASE.2013.6693065}, timestamp = {Thu, 05 Jul 2018 01:00:00 +0200}, }