Fuzzing of embedded systems: A survey J Yun, F Rustamov, J Kim, Y Shin ACM Computing Surveys 55 (7), 1-33, 2022 | 55 | 2022 |
Poster: Directed hybrid fuzzing on binary code J Kim, J Yun Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 20 | 2019 |
FIRM-COV: high-coverage greybox fuzzing for IoT firmware via optimized process emulation J Kim, J Yu, H Kim, F Rustamov, J Yun IEEE Access 9, 101627-101642, 2021 | 17 | 2021 |
Exploratory review of hybrid fuzzing for automated vulnerability detection F Rustamov, J Kim, J Yu, J Yun IEEE Access 9, 131166-131190, 2021 | 6 | 2021 |
Classification of DJI Drones Based on Flight Log Decryption Method Y Lee, J Kim, J Yu, J Yun Journal of the Korea Institute of Information Security & Cryptology 32 (1 …, 2022 | 4 | 2022 |
BugMiner: Mining the hard-to-reach software vulnerabilities through the target-oriented hybrid fuzzer F Rustamov, J Kim, J Yu, H Kim, J Yun Electronics 10 (1), 62, 2020 | 4 | 2020 |
DeepDiver: Diving into abysmal depth of the binary for hunting deeply hidden software vulnerabilities F Rustamov, J Kim, JB Yun Future Internet 12 (4), 74, 2020 | 4 | 2020 |
HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling J Kim, J Yu, Y Lee, DD Kim, J Yun Journal of Network and Computer Applications 224, 103835, 2024 | 3 | 2024 |
Software vulnerability prediction system using machine learning algorithm M Choi, J Kim, J Yun Journal of the Korea Institute of Information Security & Cryptology 28 (3 …, 2018 | 3 | 2018 |
Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing J Yu, J Kim, Y Lee, F Rustamov, J Yun CMC-COMPUTERS MATERIALS & CONTINUA 75 (2), 3291-3315, 2023 | 1 | 2023 |
Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring J Kim, MJ Choi, J Yun Journal of the Korea Institute of Information Security & Cryptology 28 (2 …, 2018 | | 2018 |