Jaeseung Choi (최재승)

Assistant Professor
Department of Computer Science and Engineering, Sogang University
  jschoi22@sogang.ac.kr / jschoi.2022@gmail.com
  Adam Schall Hall (AS) 711
  +82 2 705 8490
  [CV] [Google Scholar]

Research Interest

My research interest includes various topics in software security and software engineering. In particular, I am interested in fuzz testing, symbolic execution and static analysis.

Education

Professional Experience

Awards

Selected Publications

 
[7]  DAFL: Directed Grey-box Fuzzing Guided by Data Dependency.
Tae Eun Kim, Jaeseung Choi, Kihong Heo, and Sang Kil Cha.
USENIX Security Symposium (USENIX), 2023
[PDF] [GitHub]
 
[6]  Extending the Capacity of Program-Aware Fuzzing with Binary-Level Static Analysis.
Jaeseung Choi.
Ph.D. Thesis, 2021
 
[5]  Smartian: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses
Jaeseung Choi*, Doyeon Kim*, Soomin Kim, Gustavo Grieco, Alex Groce, and Sang Kil Cha.
IEEE/ACM International Conference on Automated Software Engineering (ASE), 2021
*Co-first authors.
[PDF] [GitHub]
 
[4]  NtFuzz: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis
Jaeseung Choi, Kangsu Kim, Daejin Lee, and Sang Kil Cha.
IEEE Symposium on Security and Privacy (S&P, Oakland), 2021
[PDF] [GitHub]
 
[3]  Grey-box Concolic Testing on Binary Code
Jaeseung Choi, Joonun Jang, Choongwoo Han, and Sang Kil Cha.
IEEE/ACM International Conference on Software Engineering (ICSE), 2019
[PDF] [GitHub]
 
[2]  B2R2: Building an Efficient Front-End for Binary Analysis
Minkyu Jung, Soomin Kim, HyungSeok Han, Jaeseung Choi, and Sang Kil Cha.
NDSS Workshop on Binary Analysis Research, 2019
[PDF] [GitHub]
 
[1]  Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition
SeongIl Wi, Jaeseung Choi, and Sang Kil Cha.
USENIX Workshop on Advances in Security Education, 2018
[PDF] [GitHub]
 

Vulnerability Reports

Teaching

Selected Talks