Jaeseung Choi (최재승)

Assistant Professor
Department of Computer Science and Engineering, Sogang University
  jschoi22@sogang.ac.kr / jschoi.2022@gmail.com
  Adam Schall Hall (AS) 711
  +82 2 705 8490
  [CV] [Google Scholar]

Research Interest

My research interest include various topics in software security and software testing. In particular, I am interested in fuzz testing, symbolic execution and static analysis.


Professional Experience



[7]  Extending the Capacity of Program-Aware Fuzzing with Binary-Level Static Analysis.
Jaeseung Choi.
Ph.D. Thesis, 2021
[6]  SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses
Jaeseung Choi*, Doyeon Kim*, Soomin Kim, Gustavo Grieco, Alex Groce, and Sang Kil Cha.
IEEE/ACM International Conference on Automated Software Engineering (ASE), 2021
*Co-first authors.
[PDF] [GitHub]
[5]  NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis
Jaeseung Choi, Kangsu Kim, Daejin Lee, and Sang Kil Cha.
IEEE Symposium on Security and Privacy (S&P, Oakland), 2021
[PDF] [GitHub]
[4]  Semantics-Preserving Mutation-Based Fuzzing on JavaScript Interpreters
Donghyeon Oh, Jaeseung Choi, and Sang Kil Cha.
Journal of the Korea Institute of Information Security & Cryptology, 2020
[Link] (Korean)
[3]  Grey-box Concolic Testing on Binary Code
Jaeseung Choi, Joonun Jang, Choongwoo Han, and Sang Kil Cha.
IEEE/ACM International Conference on Software Engineering (ICSE), 2019
[PDF] [GitHub]
[2]  B2R2: Building an Efficient Front-End for Binary Analysis
Minkyu Jung, Soomin Kim, HyungSeok Han, Jaeseung Choi, and Sang Kil Cha.
NDSS Workshop on Binary Analysis Research, 2019
[PDF] [GitHub]
[1]  Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition
SeongIl Wi, Jaeseung Choi, and Sang Kil Cha.
USENIX Workshop on Advances in Security Education, 2018
[PDF] [GitHub]

Vulnerability Reports