Obfuscation means to make something difficult to understand. Programming code is often obfuscated to protect intellectual property or trade secrets, and to prevent an attacker from reverse engineering a proprietary software program.
Memory safety is the state of being protected from various software bugs and security vulnerabilities when dealing with memory access, such as buffer overflows and dangling pointers.
Fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program.
EMSEC, PhD Student
Software Security
Code Obfuscation
[2025]
asmMBA: Robust Virtualization Obfuscation with AssemblyBased Mixed Boolean Arithmetic
Hongjoo Jin, Jiwon Lee, Taehoon Kim, Mu Yeol Sung, and Dong Hoon Lee
ACM/SIGAPP Symposium On Applied Computing (ACM SAC) 2025 (BK21+ 인정 IF 1)
Enhancing Stack Memory Safety with Secure In-Process Isolation
Hongjoo Jin, Sumin Yang, Haehyun Cho, and Dong Hoon Lee
Computers & Security, 2024 (IF 4.8)
[2024]
ChatDEOB: An Effective Deobfuscation Method based on Large Language Model
Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee, and Wonsuk Choi
WISA 2024
Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages
Hongjoo Jin, Sumin Yang, Moon Chan Park, Haehyun Cho, and Dong Hoon Lee
IFIP International Conference on ICT Systems Security and Privacy Protection, 2024 (BK21+ 인정 IF 1)
A Framework to Quantify the Quality of Source Code Obfuscation
Hongjoo Jin, Jiwon Lee, Sumin Yang, Kijoong Kim and Dong Hoon Lee
Applied Sciences, 2024 (IF 2.5)
CatchFuzz: Reliable active anti-fuzzing techniques against coverage-guided fuzzer
Hee Yeon Kim, and Dong Hoon Lee
Computers & Security, 2024 (IF 5.6)
DROPSYS: Detection of ROP attacks using system information
Seon Kwon Kim, Hongjoo Jin, Kyungho Joo, Jiwon Lee, and Dong Hoon Lee
Computers & Security, 2024 (IF 5.6)
[2023]
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances
Na Young Ahn, and Dong Hoon Lee
Computers & Security, 2023 (IF 5.6)
BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph
Moon Chan Park, and Dong Hoon Lee
IEEE Access, 2023 (IF 3.9)
[2021]
Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective
Nayoung Ahn, and Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)
Prof-gen: Practical Study on System Call Whitelist Generation for Container Attack Surface Reduction
Sungjin Kim, Byung Joon Kim, and Dong Hoon Lee
IEEE International Conference on Cloud Computing (CLOUD) 2021 (BK+ 인정 IF 1)
Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools
Youngbi Lee, Jaehyuk Suk, and Dong Hoon Lee
IEEE Access, 2021 (IF 3.476)
[2020]
SOTPM: Software One-Time Programmable Memory to Protect Shared Memory on ARM Trustzone
Dongwook Shim, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
HS-Pilot: Heap Security Evaluation Tool Model Based on Atomic Heap Interaction
Sumin Chae, Hongjoo Jin, Moon Chan Park, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
Jae Hyuk Suk, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
SCORE: Source Code Optimization & REconstruction
Jea Hyuk Suk, Young Bi Lee, and Dong Hoon Lee
IEEE Access, 2020 (IF 3.367)
Random CFI (RCFI): Efficient fine-grained Control-Flow Integrity through random verification
Moon Chan Park, and Dong Hoon Lee
IEEE Transactions on Computers, 2020 (IF 2.663)
IBV-CFI: Efficient Fine-grained Control-Flow Integrity Preserving CFG Precision
Hyerean Jang, Moon Chan Park, and Dong Hoon Lee
Computers & Security, 2020 (IF 4.438)
[2018]
UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program
Jae Hyuk Suk, Jae‐Yung Lee, Hongjoo Jin, In Seok Kim, and Dong Hoon Lee
Software-Practice and Experience, 2018
VODKA: Virtualization Obfuscation using Dynamic Key Approach
Jae Yung Lee, Jae Hyuk Suk, and Dong Hoon Lee
World Conference on Information Security Applications (WISA 2018)