Byoungyoung Lee

PhD student
School of Computer Science
Georgia Institute of Technology
Advisors: Prof.
Wenke Lee and Prof. Taesoo Kim
Research Interests: systems security and software security

I am excited to join Purdue University as an Assistant Professor in Fall 2016!


  1. Instant OS Updates via Userspace Checkpoint-and-Restart (to appear)
    Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, and Pavel Emelyanov
    USENIX Annual Technical Conference (ATC) 2016

  2. HDFI: Hardware-Assisted Data-flow Isolation (to appear) [ paper ]
    Chengyu Song, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, Yunheung Paek
    IEEE Symposium on Security and Privacy (Oakland) 2016

  3. TrackMeOrNot: Enabling Flexible Control on Web Tracking [ paper | code ]
    Wei Meng, Byoungyoung Lee, Xinyu Xing, Wenke Lee
    World Wide Web Conference (WWW) 2016

  4. Enforcing Kernel Security Invariants with Data Flow Integrity [ paper | slides ]
    Chengyu Song, Byoungyoung Lee, Kangjie Lu, William R. Harris, Taesoo Kim, Wenke Lee
    Network and Distributed System Security Symposium (NDSS) 2016

  5. ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks [ paper | slides ]
    Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee
    ACM Conference on Computer and Communications Security (CCS) 2015

  6. Cross-checking Semantic Correctness: The Case of Finding File System Bugs [ paper | slides ]
    Changwoo Min, Sanidhya Kashyap, Byoungyoung Lee, Chengyu Song, Taesoo Kim
    ACM Symposium on Operating Systems Principles (SOSP) 2015

  7. Type Casting Verification: Stopping an Emerging Attack Vector [ paper | slides | demo | code ]
    Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee
    USENIX Security Symposium (Security) 2015
    * Awarded the Internet Defense Prize by Facebook and USENIX [link]
    * Top 10 Finalists by CSAW Best Applied Research Paper Award [link]

  8. Understanding Malvertising Through Ad-Injecting Browser Extensions [ paper ]
    Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, Wenke Lee
    World Wide Web Conference (WWW) 2015

  9. Preventing Use-after-free with Dangling Pointers Nullification [ paper | slides | demo ]
    Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee
    Network and Distributed System Security Symposium (NDSS) 2015
    * Third place award by CSAW Best Applied Research Paper Award [link]

  10. Abusing Performance Optimization Weaknesses to Bypass ASLR [ slides ]
    Byoungyoung Lee, Yeongjin Jang, Tielei Wang, Chengyu Song, Long Lu, Taesoo Kim, Wenke Lee
    BlackHat USA 2014

  11. Exploiting Unpatched iOS Vulnerabilities for Fun and Profit [ slides ]
    Yeongjin Jang, Tielei Wang, Byoungyoung Lee, Billy Lau
    BlackHat USA 2014

  12. From Zygote to Morula: Fortifying Weakened ASLR on Android [ paper | slides | code ]
    Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee
    IEEE Symposium on Security and Privacy (Oakland) 2014

  13. Protecting Location Privacy Using Location Semantics [ paper | code ]
    Byoungyoung Lee, Jinoh Oh, Hwanjo Yu, Jong Kim
    ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD) 2011

  14. binOb+: A Framework for Potent and Stealthy Binary Obfuscation [ paper ]
    Byoungyoung Lee, Yuna Kim, Jong Kim
    ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2010

Work Experience

Honors & Awards

Reported Vulnerabilities and Exploits (selected)