Hacking Lab
Hacking Lab
Home
People
Publications
CVEs
Contact
Light
Dark
Automatic
Insu Yun
Latest
Bridging the Gap between Real-World and Formal Binary Lifting through Filtered-Simulation (to appear)
RGFuzz: Rule-Guided Fuzzer for WebAssembly Runtimes (to appear)
From the Vulnerability to the Victory: A Chrome Renderer 1-Day Exploit’s Journey to v8CTF Glory
One shot, Triple kill: Pwning all three Google kernelCTF instances with a single 1-day Linux vulnerability
BaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries
Scalable and Secure Virtualization of HSM with ScaleTrust
Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients
DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators
Preventing Use-After-Free Attacks with Fast Forward Allocation
Analyzing Qualcomm Hexagon Emulators via Differential Testing
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
Concolic Execution Tailored for Hybrid Fuzzing
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
Compromising the macOS kernel through Safari by chaining six vulnerabilities
Fuzzing JavaScript Engines with Aspect-preserving Mutation
REPT: Reverse Debugging of Failures in Deployed Software
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems
APISan: Sanitizing API Usages through Semantic Cross-checking
HDFI: Hardware-Assisted Data-Fow Isolation
Analyzing Security of Korean USIM-based PKI Certificate Service
Kargus: A Highly-scalable Software-based Intrusion Detection System
Cite
×