Contact
-
I graduated and joined the Security Services Team
at the IBM Thomas J. Watson Research Center. - My new homepage
while(!(succeed = try()));
Education
-
Ph.D. in Electrical and Computer Engineering, Carnegie Mellon University ... Aug 2013
Advisor: David Brumley -
M.S. in Computer Science, Yonsei University ... Feb 2007
Advisor: JooSeok Song - B.S. in Computer Science and Industrial System Engineering, Yonsei University ... Feb 2005
Research Interests
My research focuses on software security,
especially malicious software (malware) analysis and binary program analysis.
I am also interested in network security, networking, and systems.
Refereed Publications
-
Towards Automatic Software Lineage Inference.
PDF
Jiyong Jang, Maverick Woo, and David Brumley.
In Proceedings of the 22nd USENIX Security Symposium, 2013.
-
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions.
PDF WEB
Jiyong Jang, Abeer Agrawal, and David Brumley.
In Proceedings of the 33rd IEEE Symposium on Security and Privacy (Oakland), 2012.
-
BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis.
PDF
Jiyong Jang, David Brumley, and Shobha Venkataraman.
In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), 2011.
-
SplitScreen: Enabling Efficient, Distributed Malware Detection.
PDF
Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen.
In Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010.
-
A Time-Based Key Management Protocol for Wireless Sensor Networks.
PDF
Jiyong Jang, Taekyoung Kwon, and JooSeok Song.
In Proceedings of the 3rd Information Security Practice and Experience Conference (ISPEC), 2007.
Lecture Notes in Computer Science, Vol. 4464. -
2-Subset Difference Scheme for Broadcast Encryption.
PDF (in Korean)
Jiyong Jang, DaeHun Nyang, and JooSeok Song.
Journal of Korea Institute of Information Security and Cryptography (KIISC), 16(4):27-32, 2006.
Articles / Technical Reports
-
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions.
PDF
Jiyong Jang, Maverick Woo, and David Brumley.
USENIX ;login: Magazine. December 2012.
-
BitShred: Fast, Scalable Malware Triage.
PDF
Jiyong Jang, David Brumley, and Shobha Venkataraman.
Technical Report, Carnegie Mellon University CyLab, CMU-Cylab-10-022. November 2010.
(Follow-up work of CMU-Cylab-10-006.)
Open Source Tool
- ReDeBug: Unpatched Code Clone Detection Tool
Selected Honors and Awards
Coursework
- Machine Learning (10701) taught by Aarti Singh ... Fall 2010
- Network Security (18731) taught by Adrian Perrig ... Spring 2010
- Special Topics in Security: Vulnerability, Defense, and Malware Analysis (18739c) taught by David Brumley ... Spring 2009
- Applied Cryptography (18733) taught by Virgil Gligor ... Spring 2009
- Secure Software Systems (18732) taught by Lujo Bauer and Anupam Datta ... Fall 2008
- Introduction to Computer Security (18730) taught by Virgil Gligor ... Fall 2008
Teaching Experience
- Teaching Assistant, Carnegie Mellon University
- Teaching Assistant, Yonsei University
- Information Security, undergraduate course ... Fall 2006
- Information Security, undergraduate course ... Fall 2005
Others
- Plaid Parliament of Pwning (CMU Capture The Flag team)