default search action
Yonghwi Kwon 0001
Person information
- affiliation: University of Virginia, Charlottesville, VA, USA
- affiliation (former): Purdue University, West Lafayette, IN, USA
Other persons with the same name
- Yonghwi Kwon 0002 — KAIST, School of Electrical Engineering, Daejeon, South Korea
- Yonghwi Kwon 0003 — Samsung Electronics, Software R&D Center, Seoul, South Korea
- Yonghwi Kwon 0004 — University of Maryland, College Park, MD, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Minseong Choi, Yubin Im, Steve Ko, Yonghwi Kwon, Yuseok Jeon, Haehyun Cho:
DryJIN: Detecting Information Leaks in Android Applications. SEC 2024: 76-90 - [c42]Chijung Jung, Yung Ryn Choe, Junghwan Rhee, Yonghwi Kwon:
Automatic Configurator to Prevent Attacks for Azure Cloud System. SERA 2024: 174-181 - [c41]Erin Avllazagaj, Yonghwi Kwon, Tudor Dumitras:
SCAVY: Automated Discovery of Memory Corruption Targets in Linux Kernel for Privilege Escalation. USENIX Security Symposium 2024 - 2023
- [c40]Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, Yonghwi Kwon:
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation. ASPLOS (4) 2023: 169-188 - [c39]I Luk Kim, Weihang Wang, Yonghwi Kwon, Xiangyu Zhang:
BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content Service. ICSE 2023: 448-459 - [c38]Kyungchan Lim, Yonghwi Kwon, Doowon Kim:
A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors. IMC 2023: 162-180 - [c37]An Chen, Jiho Lee, Basanta Chaulagain, Yonghwi Kwon, Kyu Hyung Lee:
SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications. NDSS 2023 - [c36]Ali Ahad, Chijung Jung, Ammar Askar, Doowon Kim, Taesoo Kim, Yonghwi Kwon:
Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation. SP 2023: 3296-3313 - 2022
- [c35]Seulbae Kim, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon, Chung Hwan Kim:
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing. CCS 2022: 1753-1767 - [c34]Kyeongseok Yang, Sudharssan Mohan, Yonghwi Kwon, Heejo Lee, Chung Hwan Kim:
Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles. CCS 2022: 3503-3505 - [c33]Chijung Jung, Doowon Kim, An Chen, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, Yonghwi Kwon:
Hiding Critical Program Components via Ambiguous Translation. ICSE 2022: 1120-1132 - [c32]Chijung Jung, Ali Ahad, Yuseok Jeon, Yonghwi Kwon:
SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms. SP 2022: 1808-1825 - [c31]Bora Lee, Kyungchan Lim, JiHo Lee, Chijung Jung, Doowon Kim, Kyu Hyung Lee, Haehyun Cho, Yonghwi Kwon:
Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine. WISA 2022: 204-221 - [i2]Seulbae Kim, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon, Chung Hwan Kim:
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing. CoRR abs/2211.01829 (2022) - 2021
- [j2]Hassaan Irshad, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh M. Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, Xiangyu Zhang:
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection. IEEE Trans. Inf. Forensics Secur. 16: 4363-4376 (2021) - [c30]Honggoo Kang, Yonghwi Kwon, Sangjin Lee, Hyungjoon Koo:
SoftMark: Software Watermarking via a Binary Function Relocation. ACSAC 2021: 169-181 - [c29]Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn, Tudor Dumitras:
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. AsiaCCS 2021: 407-420 - [c28]Meng Wang, Chijung Jung, Ali Ahad, Yonghwi Kwon:
Spinner: Automated Dynamic Command Subsystem Perturbation. CCS 2021: 1839-1860 - [c27]Alan Romano, Xinyue Liu, Yonghwi Kwon, Weihang Wang:
An Empirical Study of Bugs in WebAssembly Compilers. ASE 2021: 42-54 - [c26]Chijung Jung, Doowon Kim, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, Yonghwi Kwon:
Defeating Program Analysis Techniques via Ambiguous Translation. ASE 2021: 1382-1387 - [c25]Yonghwi Kwon, Weihang Wang, Jinho Jung, Kyu Hyung Lee, Roberto Perdisci:
C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis. NDSS 2021 - [c24]Chijung Jung, Ali Ahad, Jinho Jung, Sebastian G. Elbaum, Yonghwi Kwon:
Swarmbug: debugging configuration bugs in swarm robotics. ESEC/SIGSOFT FSE 2021: 868-880 - [c23]Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-Chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang:
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary. SP 2021: 813-832 - [c22]Hyunwoo Lee, Doowon Kim, Yonghwi Kwon:
TLS 1.3 in Practice: How TLS 1.3 Contributes to the Internet. WWW 2021: 70-79 - [e1]Christophe Hauser, Yonghwi Kwon, Sebastian Banescu:
Checkmate@CCS 2021, Proceedings of the Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8552-7 [contents] - [i1]Meng Wang, Chijung Jung, Ali Ahad, Yonghwi Kwon:
Spinner: Automated Dynamic Command Subsystem Perturbation. CoRR abs/2105.00391 (2021) - 2020
- [c21]Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Harmon, Xiangyu Zhang:
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning. SP 2020: 1121-1138 - [c20]Ranjita Pai Kasturi, Yiting Sun, Ruian Duan, Omar Alrawi, Ehsan Asdar, Victor Zhu, Yonghwi Kwon, Brendan Saltaformaggio:
TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks. SP 2020: 1156-1171
2010 – 2019
- 2019
- [j1]Zhuo Zhang, Wei You, Guanhong Tao, Guannan Wei, Yonghwi Kwon, Xiangyu Zhang:
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation. Proc. ACM Program. Lang. 3(OOPSLA): 137:1-137:31 (2019) - [c19]Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jack W. Davidson:
Cubismo: decloaking server-side malware via cubist program analysis. ACSAC 2019: 430-443 - [c18]Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Ali Razmjoo-Qalaei, Mohammad-Reza Zamiri-Gourabi, Jack W. Davidson:
MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis. CCS 2019: 1849-1866 - [c17]Kenneth A. Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang, Xiangyu Zhang, Zhiqiang Lin:
Probabilistic disassembly. ICSE 2019: 1187-1198 - 2018
- [b1]Yonghwi Kwon:
Combatting Advanced Persistent Threat via Causality Inference and Program Analysis. Purdue University, USA, 2018 - [c16]Fei Wang, Yonghwi Kwon, Shiqing Ma, Xiangyu Zhang, Dongyan Xu:
Lprov: Practical Library-aware Provenance Tracing. ACSAC 2018: 605-617 - [c15]Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS 2018 - [c14]Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha:
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. USENIX ATC 2018: 241-254 - [c13]I Luk Kim, Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, Weijie Meng, Xiangyu Zhang:
AdBudgetKiller: Online Advertising Budget Draining Attack. WWW 2018: 297-307 - 2017
- [c12]Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. ACSAC 2017: 412-424 - [c11]Yonghwi Kwon, Weihang Wang, Yunhui Zheng, Xiangyu Zhang, Dongyan Xu:
CPR: cross platform binary code reuse via platform independent trace program. ISSTA 2017: 158-169 - [c10]Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, I Luk Kim, Wen-Chuan Lee, Yingqi Liu, Weijie Meng, Xiangyu Zhang, Patrick Eugster:
PAD: programming third-party web advertisement censorship. ASE 2017: 240-251 - [c9]Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
Self Destructing Exploit Executions via Input Perturbation. NDSS 2017 - [c8]Kyungtae Kim, I Luk Kim, Chung Hwan Kim, Yonghwi Kwon, Yunhui Zheng, Xiangyu Zhang, Dongyan Xu:
J-Force: Forced Execution on JavaScript. WWW 2017: 897-906 - 2016
- [c7]Yonghwi Kwon, Dohyeong Kim, William N. Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
LDX: Causality Inference by Lightweight Dual Execution. ASPLOS 2016: 503-515 - [c6]Dohyeong Kim, Yonghwi Kwon, Peng Liu, I Luk Kim, David Mitchel Perry, Xiangyu Zhang, Gustavo Rodriguez-Rivera:
Apex: automatic programming assignment error explanation. OOPSLA 2016: 311-327 - [c5]Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, Patrick Th. Eugster:
WebRanz: web page randomization for better advertisement delivery and web-bot prevention. SIGSOFT FSE 2016: 205-216 - [c4]Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, John Qian:
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. WOOT 2016 - 2015
- [c3]Dohyeong Kim, Yonghwi Kwon, William N. Sumner, Xiangyu Zhang, Dongyan Xu:
Dual Execution for On the Fly Fine Grained Execution Comparison. ASPLOS 2015: 325-338 - [c2]Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian:
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. NDSS 2015 - 2013
- [c1]Yonghwi Kwon, Xiangyu Zhang, Dongyan Xu:
PIEtrace: Platform independent executable trace. ASE 2013: 48-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint