Yonghwi Jin

 

I'm a second year Ph.D. student in SSLab advised by Taesoo Kim (currently on-leave, working in Theori).

Research Interests

Representing machine-code in understandable & verifiable way

A computer program is compiled from human-written code to machine-understandable representation. Analyzing code in various programming languages may require linear implementation costs. My goal is to bring novel program analysis techniques onto the binary level, and also enable humans to understand the semantic of a program. Ideally, I want to make frameworks that researchers can do scalable, fine-grained analysis without language-specific, and repetitive implementations, which is the current status.

Education

Georgia Institute of Technology 2020.08 - present

  • Ph.D. in Computer Science in SSLab

Georgia Institute of Technology 2019.08 - 2021.08

  • MS in Computer Science

Korea University 2015.03 - 2019.02

  • B.S. in Engineering

Skill

Publications

QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries

HyungSeok Han, JeongOh Kyea, Yonghwi Jin, Jinoh Kang, Brian Pak, and Insu Yun. IEEE S&P 2023

WINNIE: Fuzzing Windows Applications with Harness Synthesis and Fast Cloning

Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, and Taesoo Kim. NDSS 2021

Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities

Yonghwi Jin, Jungwon Lim, Insu Yun, and Taesoo Kim. Black Hat USA 2020

Return to dynamic linker

Yonghwi Jin. CODEGATE 2014 Junior (Korean)

Other experiences

TA

  • CS6265 OMS, Georgia Tech Fall 2019

Vulnerability Reports 2016 - present

  • Apple macOS 5 CVEs in Pwn2Own 2020
  • Google Chrome CVE-2016-5156, CVE-2017-5039, 625475, CVE-2017-15430
  • Naver, KISA, HackerOne 50 cases, ~$100K

Best of the Best (Top 10 awards) 2014.07 ~ 2015.03

  • Automated Vulnerability Discovery and Analysis Framework
  • - Utilized Pin, Z3 to create a trace-based symbolic execution tool for x86 machines
  • Research on BitTorrent, Tor Vulnerability
  • - Reported 2 DoS vulnerabilities on DHT server [1] [2]

Whitehash Program 2014 Scholarship student

  • Research on Generic unpacking method for Virtualization-based binary obfuscators

Honors & Awards

I have participated a lot of security contests (CTF, pwn2own, ...). What is CTF?

2023

2022

2021

2020

2019

2018

2017

2016

2015