INSU YUN (@insu_yun) 's Twitter Profile
INSU YUN

@insu_yun

Assistant Professor at KAIST EE
#KAIST #HackingLab #GoN

ID: 1153725303275085824

calendar_today23-07-2019 17:55:22

242 Tweet

1,1K Takipçi

599 Takip Edilen

USENIX WOOT Conference on Offensive Technologies (@wootsecurity) 's Twitter Profile Photo

WOOT! Big news! Starting 2024 WOOT will be @USENIX WOOT Conference on Offensive Technologies! WOOT '24 will be on August 12-13 2024, colocated with USENIX Security WOOT '24 will be co-chaired by Alyssa Milburn (Intel) and Adam Doupé (University of Arizona) usenix.org/conference/woo…

WOOT! Big news! 

Starting 2024 WOOT will be @USENIX WOOT Conference on Offensive Technologies! 

WOOT '24 will be on August 12-13 2024, colocated with USENIX Security

WOOT '24 will be co-chaired by <a href="/noopwafel/">Alyssa Milburn</a> (<a href="/intel/">Intel</a>) and <a href="/adamdoupe/">Adam Doupé</a> (<a href="/uarizona/">University of Arizona</a>)

usenix.org/conference/woo…
INSU YUN (@insu_yun) 's Twitter Profile Photo

This list includes some South Korean researchers that I personally know. I think we need to remember that South Koreans use the same naming conventions as North Koreans.

ACM WiSec (@acm_wisec) 's Twitter Profile Photo

📢Call for Workshop for WiSec 2024 (wisec2024.kaist.ac.kr/call-for-works…) We seek proposals for organizing strong workshops, which aims to provide researchers with a forum for presenting early research results and sharing their experiences with the research community.

ACM WiSec (@acm_wisec) 's Twitter Profile Photo

📢Attention researchers & professionals in wireless security! The paper submission deadline is fast approaching. February 8th is the last day to submit your groundbreaking work. Don't miss this opportunity to shape the future of wireless security!

INSU YUN (@insu_yun) 's Twitter Profile Photo

This year, I was honored to receive the Prize for Excellence in Teaching at KAIST. I think I could get this award thanks to the CTF-based teaching. I would like to share this joy with those who are currently teaching or planning to teach such CTF-based courses (e.g., Taesoo Kim).

ACM WiSec (@acm_wisec) 's Twitter Profile Photo

📢 Deadline Extended!📢Great news for the WiSec 2024 community! We've extended the paper submission deadline to February 12, 2024. You have a few more days to fine-tune your submissions. Let's make this edition the most impactful yet!

ACM WiSec (@acm_wisec) 's Twitter Profile Photo

📢#WiSec2024 invites you to showcase your innovative work! We're now accepting submissions for posters and demos in the field of #Security and #Privacy in Wireless and Mobile Networks. A great opportunity to engage with the community and make an impact!

Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Boom! Seunghyun Lee (Xion) of KAIST Hacking Lab was able to successfully demonstrate his exploit of #Google Chrome. He's off to the disclosure call to provide us all the details before we bring in the Google team for disclosure. #Pwn2Own #P2OVancouver

Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Seunghyun Lee (Xion) of KAIST Hacking Lab used a UAF to get code execution in the #Google Chrome renderer. He earns $60,000 and 6 Master of Pwn points. #Pwn2Own

Confirmed! Seunghyun Lee (<a href="/0x10n/">Xion</a>) of KAIST Hacking Lab used a UAF to get code execution in the #Google Chrome renderer. He earns $60,000 and 6 Master of Pwn points. #Pwn2Own
INSU YUN (@insu_yun) 's Twitter Profile Photo

Today, there was an great talk by Yan ([email protected]) at KAIST. He shared his extensive experience in binary analysis and fascinating stories about angr and his recent research. I am very grateful for his participation as a speaker in our colloquium! Thanks!

Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Wow! Seunghyun Lee (Xion) of KAIST Hacking Lab was able to demonstrate code execution on both #Edge and #Chrome using the same exploit. That's the third 'double tap' of the contest. He's off to the disclosure call to drop all the details. #Pwn2Own

Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed!! Seunghyun Lee (Xion) of KAIST Hacking Lab used a UAF to RCE in the renderer on both #Micosoft Edge and #Google Chrome. He earns $85,000 and 9 Master of Pwn points. That also puts us over $1,000,000 for the event! #Pwn2Own

Confirmed!! Seunghyun Lee (<a href="/0x10n/">Xion</a>) of KAIST Hacking Lab used a UAF to RCE in the renderer on both #Micosoft Edge and #Google Chrome. He earns $85,000 and 9 Master of Pwn points. That also puts us over $1,000,000 for the event! #Pwn2Own
ACM WiSec (@acm_wisec) 's Twitter Profile Photo

📢 Attention #WISEC2024 attendees! Need visa information for your trip to South Korea? 🌍✈️ Check out all the details and requirements for your visa application here: wisec2024.kaist.ac.kr/visas/. Plan ahead!

INSU YUN (@insu_yun) 's Twitter Profile Photo

We are happy to share our slides for TyphoonCon 2024 and the exploit code for v8ctf. We hope this will be helpful for those who study browser exploits :) github.com/kaist-hacking/… kaist-hacking.github.io/pubs/2024/lee:…