Author of the publication

APISan: Sanitizing API Usages through Semantic Cross-Checking.

, , , , , and . USENIX Security Symposium, page 363-378. USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Jang, Yeongjin
add a person with the name Jang, Yeongjin
 

Other publications of authors with the same name

Preventing Use-after-free with Dangling Pointers Nullification., , , , , , and . NDSS, The Internet Society, (2015)Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset., , , and . IACR Cryptology ePrint Archive, (2018)A11y Attacks: Exploiting Accessibility in Operating Systems., , , , and . ACM Conference on Computer and Communications Security, page 103-115. ACM, (2014)On the Feasibility of Large-Scale Infections of iOS Devices., , , , , and . USENIX Security Symposium, page 79-93. USENIX Association, (2014)Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud., , , , , and . USENIX Security Symposium, page 33-48. USENIX Association, (2014)Making Code Re-randomization Practical with MARDU., , , and . CoRR, (2019)Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques., , , , , , , , , and 2 other author(s). ACM Comput. Surv., 49 (2): 38:1-38:47 (2016)Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications., , , and . NDSS, The Internet Society, (2014)Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset., , , and . PoPETs, 2019 (1): 172-191 (2019)UCognito: Private Browsing without Tears., , , , and . ACM Conference on Computer and Communications Security, page 438-449. ACM, (2015)