★ indicates the papers published at top-tier conferences according to https://csrankings.org
✱ indicates co-first authors
U indicates authors are undergraduate interns or completes all the research tasks during the undergraduate intership
V indicates authors are scholarly visitors or completes all the research tasks during the scholarly visit
- NeuroScope: Reverse Engineering Deep Neural Network on Edge Devices using Dynamic Analysis (To Appear)★
Ruoyu Wu, Muqi Zou, Arslan Khan, Taegyu Kim, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi
In Proceedings of the 34th USENIX Security Symposium (USENIX Security 2025)
Seattle, WA, August 2025 (Acceptance Rate: TBD%)
- LTA: Control-Driven UAV Testing and Bug Localization with Flight Record Decomposition (To Appear)★
✱UChangyul Lee, ✱VDeokjin Kim, Giyeol Kim, Sangwook Lee, Taegyu Kim
In Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2024)
Hangzhou, China, November 2024 (Acceptance Rate: 18.9%)
- Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration (To Appear)★
✱Dohyun Ryu, ✱Giyeol Kim, UDaeun Lee, USeongjin Kim, USeungjin Bae, Junghwan Rhee, Taegyu Kim
In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE 2024)
Sacramento, CA, October 2024 (Acceptance Rate: TBD%)
- DnD: Decompiling Deep Neural Network Compiled Binary
Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu
25th Black Hat Europe (BH-EU 2022)
Excel London, UK, December 2022 (Acceptance Rate: TBD%)
- DnD: A Cross-Architecture Deep Neural Network Decompiler★
Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu
In Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022)
Boston, MA, August 2022 (Acceptance Rate: 18.1%)
- Reverse Engineering and Retrofitting Robotic Aerial Vehicle Control Firmware using DisPatch★
Taegyu Kim, Aolin Ding, Sriharsha Etigowni, Pengfei Sun, Jizhou Chen, Luis Garcia, Saman Zonouz, Dongyan Xu, Dave (Jing) Tian
In Proceedings of the 20th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2022)
Portland, OR, June 2022 (Acceptance Rate: 21.6%)
- ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs
Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian
In Proceedings of the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2022)
Nagasaki, Japan, May 2022 (Acceptance Rate: 18.4%)
- FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks★
Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin Butler, Antonio Bianchi, Dave (Jing) Tian
In Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022)
San Francisco, CA, May 2022 (Acceptance Rate: 14.5%)
- PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-metal Embedded Applications★
Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian
In Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021)
Vancouver, BC, August 2021 (Acceptance Rate: 18.7%)
- From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY★
Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu
In Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020)
Boston, MA, August 2020 (Acceptance Rate: 16.1%)
- RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing★
Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu
In Proceedings of the 28th USENIX Security Symposium (USENIX Security 2019)
Santa Clara, CA, August 2019 (Acceptance Rate: 15.7%)
- Securing Real-Time Microcontroller Systems through Customized Memory View Switching★
Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu
In Proceedings of the 25th Network and Distributed System Security Symposium (NDSS 2018)
San Diego, CA, Feburary 2018 (Acceptance Rate: 21%)
- Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks★
Fan Fei, Zhan Tu, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, Xinyan Deng.
In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA 2018)
Brisbane, Australia, August 2018 (Acceptance Rate: 40.6%)
- RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications
Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu
In Proceedings of the Annual Computer Security Applications Conference (ACSAC 2017)
Orlando, FL, December 2017 (Acceptance Rate: 19.7%)
- Malfinder: Accelerated Malware Classification System through Filtering on Manycore System
Taegyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park, Kyu Ho Park
In Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP 2015)
Angers, France, Feburary 2015
- I-Filter: Identical Structured Control Flow String Filter for Accelerated Malware Variant Classification
Taegyu Kim, Woomin Hwang, Ki-Woong Park, Kyu Ho Park
In Proceedings of the International Symposium on Biometrics and Security Technologies (ISBAST 2014)
Kuala Lumpur, Malaysia, August 2014