About Me

I am an Assistant Professor in the College of Information Sciences and Technology at the Pennsylvania State University. My research interests include cyber-physical security, systems security, and software security.

Announcement

  • I'm looking for motivated students working on security research. If you are interested in working with me and have a background in cyber-physical security (e.g., robotic vehicles), systems security, and software security, please email me!
  • One proposal for drone security will be awarded by National Security Research Institute (NSR). Thanks NSR for support! (Sole PI, Total $168.4K, Aug. 2022)

  • Academic Services

  • Technical Program Committee: USENIX Security '23, '24, CCS '22, '23, NDSS '23, ASIACCS '21, '22, SecureComm '20, etc
  • Artifact Evaluation Committee: USENIX Security '21

  • Teaching

  • IST 543 Software Security Spring 2022, Fall 2022, Spring 2023
  • IST 240 Introduction to Computer Languages Fall 2023
  • IST 454 Computer and Cyber Forensics Spring 2024

  • Conference Publications

      ★ indicates the papers published at top-tier conferences according to https://csrankings.org

    1. DnD: Decompiling Deep Neural Network Compiled Binary
      Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu
      25th Black Hat Europe (BH-EU 2022)
      Excel London, UK, December 2022 (Acceptance Rate: TBD%)
    2. DnD: A Cross-Architecture Deep Neural Network Decompiler
      Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu
      In Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022)
      Boston, MA, August 2022 (Acceptance Rate: 18.1%)
    3. Reverse Engineering and Retrofitting Robotic Aerial Vehicle Control Firmware using DisPatch
      Taegyu Kim, Aolin Ding, Sriharsha Etigowni, Pengfei Sun, Jizhou Chen, Luis Garcia, Saman Zonouz, Dongyan Xu, Dave (Jing) Tian
      In Proceedings of the 20th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2022)
      Portland, OR, June 2022 (Acceptance Rate: 21.6%)
    4. ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs
      Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian
      In Proceedings of the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2022)
      Nagasaki, Japan, May 2022 (Acceptance Rate: 18.4%)
    5. FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks
      Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin Butler, Antonio Bianchi, Dave (Jing) Tian
      In Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022)
      San Francisco, CA, May 2022 (Acceptance Rate: 14.5%)
    6. PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-metal Embedded Applications
      Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian
      In Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021)
      Vancouver, BC, August 2021 (Acceptance Rate: 18.7%)
    7. From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY
      Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu
      In Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020)
      Boston, MA, August 2020 (Acceptance Rate: 16.1%)
    8. RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing
      Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu
      In Proceedings of the 28th USENIX Security Symposium (USENIX Security 2019)
      Santa Clara, CA, August 2019 (Acceptance Rate: 15.7%)
    9. Securing Real-Time Microcontroller Systems through Customized Memory View Switching
      Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu
      In Proceedings of the 25th Network and Distributed System Security Symposium (NDSS 2018)
      San Diego, CA, Feburary 2018 (Acceptance Rate: 21%)
    10. Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks
      Fan Fei, Zhan Tu, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, Xinyan Deng.
      In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA 2018)
      Brisbane, Australia, August 2018 (Acceptance Rate: 40.6%)
    11. RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications
      Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu
      In Proceedings of the Annual Computer Security Applications Conference (ACSAC 2017)
      Orlando, FL, December 2017 (Acceptance Rate: 19.7%)
    12. Malfinder: Accelerated Malware Classification System through Filtering on Manycore System
      Taegyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park, Kyu Ho Park
      In Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP 2015)
      Angers, France, Feburary 2015
    13. I-Filter: Identical Structured Control Flow String Filter for Accelerated Malware Variant Classification
      Taegyu Kim, Woomin Hwang, Ki-Woong Park, Kyu Ho Park
      In Proceedings of the International Symposium on Biometrics and Security Technologies (ISBAST 2014)
      Kuala Lumpur, Malaysia, August 2014

    Journal Publications

    1. Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks
      Christopher N. Gutierrez, Taegyu Kim, Raffaele D. Corte, Jeffrey Avery, Saurabh Bagchi, Dan Goldwasser, Marcello Cinque
      IEEE Transactions on Dependable and Secure Computing (TDSC)
      November 2018
    2. MalCore: Toward a Practical Malware Identication System Enhanced with Manycore Technology
      Taegyu Kim, Ki-Woong Park
      Information Systems Security and Privacy in Communications in Computer and Information Science (ICISSP)
      January 2016