46. 
                                
,
                                In Proc. of the 46th IEEE Symposium on Security and Privacy
                    
                                -
                              
45. 
                            
,
                            In Proc. of the 33rd USENIX Security Symposium
                
                            -
                           
                        44. 
                           
ASPLOS'24 -
                           
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation,
                           In Proc. of the 29th International Conference on Architectural Support for Programming Languages and Operating Systems
               
                           -
                          
 BibTex 
                
                         
                           Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, and Yonghwi Kwon
                         
                        
               
                      43. 
                         ICISC'23 -
                         
BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols,
                         In Proc. of the 26th Annual International Conference on Information Security and Cryptology
               
                         -
                        
 BibTex 
                        
               
                       
                         Min Jang, Yuna Hwang, Yonghwi Kwon, and Hyoungshick Kim
                          Best Paper Award
                       
                      
                
                         42. 
                          
IMC'23 -
                          
A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors,
                          In Proc. of the 23rd ACM Internet Measurement Conference
                
                          -
                         
 BibTex 
                
                        
                          Kyungchan Lim, Yonghwi Kwon, and Doowon Kim
                        
                           
                         41. 
                            
ICSE'23 -
                            
BFTDetector: Automatic Detection of Business Flow Tampering for Digital Content Service,
                            In Proc. of the 45th International Conference on Software Engineering 
                
                            -
                           
 BibTex 
                 
                          
                            I Luk Kim, Weihang Wang, Yonghwi Kwon, and Xiangyu Zhang
                          
                         
                         40. 
                            
NDSS'23 -
                            
SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications,
                            In Proc. of the 30th Network and Distributed System Security Symposium
                
                            -
                           
 BibTex 
                 
                          
                            An Chen, JiHo Lee, Basanta Chaulagain, Yonghwi Kwon, and Kyu Hyung Lee
                          
                         
                         39. 
                            
S&P'23 -
                            
PyFET: Forensically Equivalent Transformation for Python Binary Decompilation,
                            In Proc. of the 44th IEEE Symposium on Security and Privacy
                
                            -
                           
 BibTex 
                 
                          
                            Ali Ahad, Chijung Jung, Ammar Askar, Doowon Kim, Taesoo Kim, and Yonghwi Kwon
                          
                          
                         38. 
                            CCS'22 (Poster) -
                            
Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles,
                            In Proc. of the 29th ACM Conference on Computer and Communications Security
                
                            -
                           
 BibTex 
                 
                          
                            Kyeongseok Yang*, Sudharssan Mohan* (*: co-first authors), Yonghwi Kwon, Heejo Lee, and Chung Hwan Kim
                          
                         
                         
                         37. 
                            
CCS'22 -
                            
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing,
                            In Proc. of the 29th ACM Conference on Computer and Communications Security
                
                            -
                           
 BibTex 
                 
                          
                            Seulbae Kim, Major Liu, Junghwan Rhee, Yuseok Jeon, Yonghwi Kwon, and Chung Hwan Kim
                          
                          
                                 
                         36. 
                            WISA'22 -
                            
Dazzle-attack: Anti-Forensic Server-side Attack via Fail-free Dynamic State Machine,
                            In Proc. of the 23rd World Conference on Information Security Applications 
                
                            -
                           
 BibTex 
                 
                          
                            Bora Lee*, Kyungchan Lim* (*: co-first authors), JiHo Lee, Chijung Jung, Doowon Kim, Kyu Hyung Lee, Haehyun Cho, and Yonghwi Kwon
                             Best Student Paper Award
                          
                         
                          
                         35. 
                            
ICSE'22 -
                            
Hiding Critical Program Components via Ambiguous Translation,
                            In Proc. of the 44th International Conference on Software Engineering 
                
                            -
                           
 BibTex 
                 
                          
                            Chijung Jung, Doowon Kim, An Chen, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, and Yonghwi Kwon
                          
                          
                         34. 
                            
S&P'22 -
                            
SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms,
                            In Proc. of the 43rd IEEE Symposium on Security and Privacy
                
                            -
                           
 BibTex 
                 
                          
                            Chijung Jung, Ali Ahad, Yuseok Jeon, and Yonghwi Kwon
                          
                         
                         33. 
                            
ACSAC'21 -
                            
Sofware Watermarking via a Binary Function Relocation,
                            In Proc. of 37th Annual Conference on Computer Security Applications
                
                            -
                           
 Slides | 
                           
 BibTex 
                 
                          
                            Honggoo Kang, Yonghwi Kwon, Sangjin Lee, and Hyungjoon Koo
                          
                         
                         32. 
                            ASE'21 (NIER) -
                            
Defeating Program Analysis Techniques via Ambiguous Translation,
                            In Proc. of 36th IEEE/ACM International Conference on Automated Software Engineering (New Ideas and Emerging Results Track)
                 
                            -
                           
 BibTex 
                 
                          
                            Chijung Jung, Doowon Kim, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, and Yonghwi Kwon
                          
                         
                         
                         31. 
                           
TIFS (Journal, IF: 6.211) -
                           
TRACE: Enterprise-Wide Provenance Tracking For Real-Time APT Detection,
                           IEEE Transactions on Information Forensics and Security 
                 
                           -
                          
 BibTex 
                 
                          
                           Hassaan Irshad, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, and Xiangyu Zhang
                          
                         
                
                        
                
                         30. 
                           
ASE'21 -
                           
An Empirical Study of Bugs in WebAssembly Compilers,
                            In Proc. of 36th IEEE/ACM International Conference on Automated Software Engineering
                
                            -
                           
 BibTex 
                
                          
                            Alan Romano, Xinyue Liu, Yonghwi Kwon, and Weihang Wang
                          
                         
                
                         29. 
                           
FSE'21 -
                            
Swarmbug: Debugging Configuration Bugs in Swarm Robotics,
                            In Proc. of 29th ACM SIGSOFT International Symposium on the Foundations of Software Engineering
                
                            -
                            
 Invited Talk at WISA | 
                            
 BibTex 
                
                          
                           Chijung Jung, Ali Ahad, Jinho Jung, Sebastian Elbaum, and
                           Yonghwi Kwon
                          
                         
                
                         28. 
                           
CCS'21 -
                            
Spinner: Automated Dynamic Command Subsystem Perturbation, 
                            In Proc. of 28th ACM Conference on Computer and Communications Security 
                
                            -
                            
 BibTex 
                
                          
                           Chijung Jung, Ali Ahad, and
                           Yonghwi Kwon
                          
                         
                
                         27. 
                           
ASIACCS'21 - 
                           
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem, 
                           In Proc. of 16th ACM ASIA Conference on Computer and Communications Security 
                            
                           -
                           
 BibTex 
                
                          
                           Doowon Kim, Haehyun Cho, Yonghwi Kwon,
                           Adam Doupe,
                           Sooel Son,
                           Gail-Joon Ahn, and
                           Tudor Dumitras
                          
                         
                
                         26. 
                           
WWW'21 - 
                            
                            TLS 1.3 in Practice: How TLS 1.3 Contributes to the Internet, 
                            
                            In Proc. of 30th The Web Conference 
                
                            - 
                            
 Video | 
                            
 BibTex 
                
                          
                           Hyunwoo Lee,
                           Doowon Kim, and Yonghwi Kwon
                          
                         
                
                         25. 
                           
S&P'21 - 
                            
                            OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary,
                             
                            In Proc. of the 42nd IEEE Symposium on Security and Privacy 
                
                            -
                            
 BibTex 
                
                          
                           Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-chuan Lee,
                           Yonghwi Kwon, Yousra Aafer, and
                           Xiangyu Zhang
                          
                         
                
                         24. 
                           
NDSS'21 - 
                            
                            C2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis,
                            
                            In Proc. of the 28th Network and Distributed System Security Symposium 
                
                            - 
                            
 Slides | 
 Video |
                            
 BibTex 
                          
                           Yonghwi Kwon,
                           Weihang Wang, Jinho Jung,
                           Kyu Hyung Lee, and
                           Roberto Perdisci
                          
                         
                
                
                         23. 
                           
S&P'20 - 
                            
                            TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks,
                            
                            In Proc. of the 41st IEEE Symposium on Security and Privacy 
                
                            - 
                            
 Video | 
                            
 BibTex 
                          
                           Ranjita Pai Kasturi, Yiting Sun, Ruian Duian, Omar Alrawi, Ehsan Asdar, Victor Zhu,
                           Yonghwi Kwon, and
                           Brendan Saltaformaggio
                          
                         
                
                         22. 
                           
S&P'20 - 
                            
                            PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning,
                            
                            In Proc. of the 41st IEEE Symposium on Security and Privacy 
                
                            - 
                            
 BibTex 
                
                          
                           Wei You,
                           Zhuo Zhang,
                           Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Makena Harmon, and
                           Xiangyu Zhang
                          
                         
                
                         21. 
                           
CCS'19 - 
                            
                            MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis,
                            
                            In Proc. of the 26th ACM Conference on Computer and Communications Security 
                
                            - 
                            
 Slides |
                            
 Code |
                            
 BibTex 
                
                          
                           Abbas Naderi-Afooshteh,
                           Yonghwi Kwon, Anh Nguyen-Tuong, Ali Razmjoo-Qalaei, Mohammad-Reza Zamiri-Gourabi, and
                           Jack W. Davidson
                          
                         
                
                         20. 
                          
ACSAC'19 - 
                           
                           CUBISMO: Decloaking Server-side Malware via Cubist Program Analysis,
                           
                           In Proc. of the 35th Annual Conference on Computer Security Applications 
                
                           - 
                           
 Slides |
                           
 BibTex 
                
                          
                           Abbas Naderi-Afooshteh,
                           Yonghwi Kwon, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, and
                           Jack W. Davidson
                          
                         
                
                         19. 
                           
OOPSLA'19 - 
                            
                            BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation,
                            
                            In Proc. of the 2019 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications 
                            
                            - 
                            
 BibTex 
                            
                          
                           Zhuo Zhang, Wei You,
                           Guanhong Tao,
                           Guannan Wei,
                           Yonghwi Kwon, and
                           Xiangyu Zhang
                           
                            ACM SIGPLAN Distinguished Paper Award
                          
                         
                
                         18. 
                           
ICSE'19 - 
                            
                            Probabilistic Disassembly,
                            
                            In Proc. of the 41st International Conference on Software Engineering 
                
                            - 
                            
 Slides |
                            
 BibTex 
                
                          
                           Kenneth Adam Miller,
                           Yonghwi Kwon, Yi Sun,
                           Zhuo Zhang,
                           Xiangyu Zhang, and
                           Zhiqiang Lin
                          
                         
                
                         17. 
                          
ACSAC'18 - 
                           
                           Lprov: Practical Library-aware Provenance Tracing,
                
                           In Proc. of the 34th Annual Conference on Computer Security Applications 
                
                           - 
                          
 BibTex 
                
                          
                           Fei Wang,
                           Yonghwi Kwon, Shiqing Ma,
                           Xiangyu Zhang, and
                           Dongyan Xu
                          
                         
                
                         16. 
                           
ATC'18 - 
                            
                            Kernel-Supported Cost-Effective Audit Logging for Causality Tracking,
                            In Proc. of the 2018 USENIX Annual Technical Conference
                
                            - 
                            
 BibTex 
                
                          
                           Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela Ciocarlie, Ashish Gehani, Vinod
                           Yegneswaran, Dongyan Xu, and
                           Somesh Jha
                          
                         
                
                         15. 
                          Ph.D. Thesis - 
                          
                          Combatting Advanced Persistent Threat via Causality Inference and Program Analysis - 
                
                          
 BibTex 
                          
                          
                           Yonghwi Kwon
                          
                         
                
                         14. 
                           
WWW'18 - 
                            
                            AdBudgetKiller: Online Advertising Budget Draining Attack,
                            
                            In Proc. of the 27th International World Wide Web Conference 
                
                            - 
                            
 BibTex 
                
                          
                           I Luk Kim,
                           Weihang Wang,
                           Yonghwi Kwon,
                           Yunhui Zheng, Yousra Aafer, Weijie Meng, and
                           Xiangyu Zhang
                          
                         
                
                         13. 
                           
NDSS'18 - 
                            
                            MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation,
                
                            In Proc. of the 25th Network and Distributed System Security Symposium 
                
                            - 
                            
 Slides |
                            
 BibTex 
                
                          
                           Yonghwi Kwon, Fei Wang,
                           Weihang Wang,
                           Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma,
                           Xiangyu Zhang,
                           Dongyan Xu,
                           Somesh Jha, Gabriela Ciocarlie, Ashish Gehani, and Vinod Yegneswaran
                          
                         
                
                
                         
                         12. 
                          
ACSAC'17 - 
                           
                           RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications,
                           In Proc. of the 33rd Annual Conference on Computer Security Applications 
                
                           -
                           
 BibTex 
                          
                           Taegyu Kim,
                           Chung Hwan Kim, Hongjun Choi,
                           Yonghwi Kwon,
                           Brendan Saltaformaggio,
                           Xiangyu Zhang, and
                           Dongyan Xu
                          
                         
                
                         11. 
                           
ASE'17 - 
                            
                            PAD: Programming Third-party Web Advertisement Censorship,
                            In Proc. of the 32nd IEEE/ACM International Conference on Automated Software Engineering 
                
                            -
                            
 BibTex 
                
                          
                           Weihang Wang,
                           Yonghwi Kwon,
                           Yunhui Zheng, Yousra Aafer, I Luk Kim, Wen-Chuan Lee, Yingqi Liu, Weijie Meng,
                           Xiangyu Zhang, and
                           Patrick Eugster
                          
                         
                
                         10. 
                          
ISSTA'17 - 
                            
                            CPR: Cross Platform Binary Code Reuse via Platform Independent Trace Program,
                
                            In Proc. of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis 
                
                            -
                            
 Slides |
                            
 BibTex 
                
                          
                           Yonghwi Kwon,
                           Weihang Wang,
                           Yunhui Zheng,
                           Xiangyu Zhang, and
                           Dongyan Xu
                          
                         
                
                         9. 
                           
WWW'17 - 
                            
J-Force: Forced Execution on JavaScript,
                            In Proc. of the 26th International World Wide Web Conference 
                
                            -
                            
 BibTex 
                
                          
                           Kyungtae Kim, I Luk Kim,
                           Chung Hwan Kim,
                           Yonghwi Kwon,
                           Yunhui Zheng,
                           Xiangyu Zhang, and
                           Dongyan Xu
                          
                         
                
                         8. 
                           
NDSS'17 - 
                            
A2C: Self Destructing Exploit Executions via Input Perturbation,
                            In Proc. of the 24th Network and Distributed System Security Symposium 
                
                            -
                            
 Slides |
                            
 BibTex 
                
                          
                           Yonghwi Kwon,
                           Brendan Saltaformaggio, I Luk Kim,
                           Kyu Hyung Lee,
                           Xiangyu Zhang, and
                           Dongyan Xu
                          
                         
                
                         7. 
                           
OOPSLA'16 - 
                            
Apex: Automatic Programming Assignment Error Explanation,
                            In Proc. of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications 
                
                            -
                            
 Website |
                            
 BibTex 
                
                          
                           Dohyeong Kim,
                           Yonghwi Kwon,
                           Peng Liu, I Luk Kim, David Mitchel Perry,
                           Xiangyu Zhang, and Gustavo Rodriguez-Rivera
                          
                         
                
                         6. 
                           
FSE'16 - 
                           
WebRanz: Web Page Randomization For Better Advertisement Delivery and Web-Bot Prevention,
                           In Proc. of the 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering 
                
                           -
                           
 Website |
                           
 BibTex 
                
                          
                           Weihang Wang,
                           Yunhui Zheng,
                           Xinyu Xing,
                           Yonghwi Kwon,
                           Xiangyu Zhang, and
                           Patrick Eugster
                          
                         
                
                         5. 
                          WOOT'16 - 
                          
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic,
                          In Proc. of the 10th USENIX Workshop on Offensive Technologies 
                
                          -
                          
 BibTex 
                
                          
                           Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson,
                           Yonghwi Kwon, Qi Zhang,
                           Xiangyu Zhang,
                           Dongyan Xu, and John Qian
                          
                         
                
                         4. 
                           
ASPLOS'16 - 
                           
LDX: Causality Inference by Lightweight Dual Execution,
                           In Proc. of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems 
                
                           -
                           
 Slides |
                           
 Demo Video |
                           
 BibTex 
                
                          
                           Yonghwi Kwon, Dohyeong Kim,
                           William N. Sumner, Kyungtae Kim,
                           Brendan Saltaformaggio,
                           Xiangyu Zhang, and
                           Dongyan Xu           
                          
                         
                
                         3. 
                           
ASPLOS'15 - 
                           
Dual Execution for On the Fly Fine Grained Execution Comparison,
                           In Proc. of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems 
                
                           -
                           
 BibTex 
                
                          
                           Dohyeong Kim,
                           Yonghwi Kwon,
                           William N. Sumner,
                           Xiangyu Zhang, and
                           Dongyan Xu
                          
                         
                
                         2. 
                           
NDSS'15 - 
                           
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions,
                           In Proc. of the 22nd Network and Distributed System Security Symposium 
                
                           -
                           
 Slides |
                           
 BibTex 
                
                          
                           Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim,
                           Xiangyu Zhang,
                           Dongyan Xu, Vinod Yegneswaran, and John Qian           
                          
                         
                
                         1. 
                           
ASE'13 - 
                           
PIEtrace: Platform Independent Executable Trace,
                           In Proc. of the 28th IEEE/ACM International Conference on Automated Software Engineering 
                
                           - 
                           
 Slides |
                           
 Website |
                           
 BibTex 
                           
                          
                           Yonghwi Kwon,
                           Xiangyu Zhang, and Dongyan Xu
                           
                            Best Paper Award,  ACM SIGSOFT Distinguished Paper Award