CV

General Information

Full Name Hyungjoon Koo
Job Associate Professor
Email kevin.koo AT skku.edu
Telephone +82-31-299-4958
Languages English, Korean

Education

  • 2013-2018
    Doctor of Philosophy
    Stony Brook University, NY, USA
    • (Major) Computer Science
    • (Adviser) Michalis Polychronakis
    • Dissertation
      • Practical Software Specialization against Code Reuse Attacks
  • 2008-2010
    Master
    Korea University
    • (Major) Information Security
    • (Adviser) Sangjin Lee
    • Thesis
      • Predetection Model for Trusted Insider’s Leaks and Manipulation from a Forensic Perspective

Experiences

  • 2019-2020
    Postdoctoral Researcher
    Georgia Tech
    • (Adviser) Taesoo Kim
    • https://gts3.org
  • Summer 2020
    Instructor
    ONR Software Security Summer School (SSSS20)
    • https://www.cerias.purdue.edu/site/ssss20
  • 2014-2019
    Research Assistant
    Stony Brook University
    • Software security
  • Summer 2018
    Intern
    Fujitsu Laboratories of America
    • Fuzzing and concolic execution
  • Summer 2016
    Intern
    Fujitsu Laboratories of America
    • Automated binary hardening
  • 2013-2017
    Teaching Assistant
    Stony Brook University
    • (CSE102) Introduction to Web Design and Programming by Ahmad Esmaili, Fall 2013
    • (CSE130) Introduction to Programming in C by Ahmad Esmaili, Fall 2013
    • (CSE312) Legal, Social, and Ethical Issues in Information Systems by Robert Johnson, Spring 2014
    • (CSE408) Network Security by Robert Johnson, Spring 2014
    • (CSE508) Network Security for Graduates by Michalis Polychronakis, Fall 2017
  • Summer 2013
    Lecturer
    Korea Productivity Center
    • Security Essentials
  • Spring 2013
    Lecturer
    Korea Internet & Security Agency
    • Network Security for Rwanda government officials
  • 2011-2012
    Security Researcher
    Shinhan Bank
  • 2006-2011
    Assistant Manager
    Samsung SDS

Services

  • Program Committee
    • IEEE Symposium on Security and Privacy (S&P) 2024
    • Annual Computer Security Applications Conference (ACSAC) 2024, 2023
    • International Symposium on Foundations & Practice of Security (FPS) 2024, 2023, 2022
    • NYU’s CSAW Program Committee 2024, 2023, 2022, 2021, 2020, 2019
    • World Conference on Information Security Applications (WISA) 2021
  • Organizing Committee
    • Co-chair (Security and Privacy) in International Conference on Parallel and Distributed Systems (ICPADS) 2024
    • Publication Chair in IEEE Secure Development Conference (SecDev) 2024, 2023
  • Session Chair
    • ACM ASIA Conference on Computer and Communications Security (ASIACCS) 2023
    • Workshop on Privacy in the Electronic Society (WPES), collocated with CCS 2021
    • World Conference on Information Security Applications (WISA) 2021
  • Journal Services
    • Editor, Journal of Information Processing Systems (JIPS, 2024)
    • Neurocomputing (2024)
    • Information and Software Technology (IST, 2024)
    • IEEE Transactions on Dependable and Secure Computing (TDSC) 2022
    • Computers and Security (COSE) 2023, 2021
    • IEEE Internet Computing (IC) 2022
    • International Journal of Information Security (IJIS) 2021, 2020
    • Frontiers of Information Technology & Electronic Engineering (FITEE) 2020
    • IEEE Access 2019
    • IEEE/ACM Transactions on Networking (TON) 2019
    • IEEE Security & Privacy Magazine (S&P) 2024, 2021, 2019

Invited Talks

    • Executable Binary Analysis with AI, Workshop on Information Security and Cryptography (WISC, Sep. 2023)
    • A Transformer based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing, Kyunghee University Seminar (Aug. 2023)
    • Understanding of Advanced Code Reuse Attacks and Defenses, UNIST Security Seminar (Dec. 2022)
    • A Practical Binary Similarity Detection Approach, Sejong Cybersecurity Workshop 0x01 (Oct. 2022)
    • Binary Code Representation for Deep Learning and its Applications, Software Convergence Symposium (SWCS, Apr. 2022)
    • Semantic-aware Binary Code Representation with Deep Learning, Fall KAIST Security Colloquium (Nov. 2021)
    • Executable Binary Code Representation with Deep Learning, KOCSEA Technical Symposium Program (Nov. 2021)
    • Crash Course on Deep Learning for Security, Soongsil University (Jul. 2021)
    • Toward Better Binary Code Representation with Deep Learning, Seoul National University (Jun. 2021)
    • Software Protection via Code Randomization, University of Tennessee (Nov. 2020)
    • Practical Software Specialization against Code Reuse Attacks, Sungkyunkwan University (Feb. 2019)
    • Practical Software Specialization against Code Reuse Attacks, KAIST (Feb. 2019)
    • Practical Software Hardening against Code Reuse Attacks, Georgia Tech (Nov. 2018)
    • Software Hardening with Code Diversification, CS Colloquium at SUNY Korea (Jun. 2018)
    • Software Hardening with Code Diversification, Korea University (May 2018)
    • Software Hardening with Code Diversification, Samsung Research (May 2018)
    • Software Hardening, Cyber Symposium by the Stony Brook Computing Society (Apr. 2018)
    • Elaborate Attacks with Existing Tools, National Computing & Information Agency (May 2013)
    • Anonymizing Yourself with Tor, Korea Internet & Security Agency (Apr. 2013)

Patents

  • Relative readability index for Decompiled Codes
    • Hyungjoon Koo, Sungjae Hwang, Haeun Eom, Dohee Kim, Sori Lim
    • (KR) App No. 10-2024-0105125
  • Methods and apparatus for inferring function symbols from assembly code in transformer-based executable binary, and recording medium
    • Hyungjoon Koo, Hyunjin Kim, and Jinyeong Bak
    • (KR) App No. 10-2023-0067351; (US) App No. 18-674-646
  • Watermarking method for smart contract
    • Hyoungshick Kim, Taeyoung Kim, Yunhee Jang, Chanjong Lee, and Hyungjoon Koo
    • (KR) App No. 10-2022-0116335, (US) App No. 18-368-734
  • Apparatus and method for detecting similarity of binary code
    • Sunwoo Ahn, Seonggwan Ahn, Hyungjoon Koo, and Yunheung Paek
    • (KR) App No. 10-2023-0035069; (US) App No. 18-596-194
  • Method and device of embedding watermark in software
    • Hyungjoon Koo, Sangjin Lee, and Honggu Kang
    • (KR) App No. 10-2021-0170916; (US) App No. 18-073-876
  • Method of detecting intrusion for infotainment systems and apparatus thereof
    • Hyungjoon Koo
    • (KR) Patent No. 10-2022-0005421
  • System and method for responding DDoS offensive
    • Changryul Huh, Bonjae Koo, Bonghui Park, Hyungjoon Koo, Kyutae Jeong
    • (KR) Patent No. 10-2010-0065260