About


I am a Ph.D. student (Expected Summer 2018, on the job market ) in the Department of Computer Science at Purdue University.
I am co-advised by Prof. Xiangyu Zhang and Prof. Dongyan Xu.
My research aims to solve system security problems via program analysis techniques (e.g., dynamic/static program analysis, binary analysis, and reverse-engineering). More specifically, I have developed fundamental primitives for the investigation of advanced cyber-attacks (e.g., APTs) and the analysis and prevention of ever-evolving malicious programs and payloads across multiple platforms.

I am on the job market (for positions starting in the Summer/Fall of 2018).
[ Resume, Research Statement
]
Teaching/Diversity Statements are available upon request.
emails { yongkwon , kwon58  {at} purdue.edu, yonghwi.kwon  {at} hotmail.com }

Publications

System Security (9 conf. papers, 4 first authors)
NDSS'15 (1st), ASPLOS'16 (1st), NDSS'17 (1st), NDSS'18 (1st) | ASE'17 (2nd) | WWW'18 (3rd) | WWW'17 (4th), ACSAC'17 (4th), FSE'16 (4th)
Software Engineering/Programming Language (4 conf. papers, 2 first authors)
ASE'13 (1st) , ISSTA'17 (1st) | ASPLOS'15 (2nd), OOPSLA'16 (2nd)
2+ papers are in submission. (As of Dec 24th, 2017)
WWW'18
AdBudgetKiller: Online Advertising Budget Draining Attack [ paper]
I Luk Kim, Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, Weijie Meng, and Xiangyu Zhang,
In Proc. 27th International World Wide Web Conference
NDSS'18
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation [ paper]
Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela Ciocarlie, Ashish Gehani, and Vinod Yegneswaran,
In Proc. 25th Network and Distributed System Security Symposium
ACSAC'17
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications [ paper]
Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu,
In Proc. 33rd Annual Conference on Computer Security Applications
ASE'17
PAD: Programming Third-party Web Advertisement Censorship [ paper]
Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, I Luk Kim, Wen-Chuan Lee, Yingqi Liu, Weijie Meng, Xiangyu Zhang, and Patrick Eugster, In Proc. 32nd IEEE/ACM International Conference on Automated Software Engineering
ISSTA'17
CPR: Cross Platform Binary Code Reuse via Platform Independent Trace Program [ paper | slides]
Yonghwi Kwon, Weihang Wang, Yunhui Zheng, Xiangyu Zhang, and Dongyan Xu,
In Proc. 26th ACM SIGSOFT International Symposium on Software Testing and Analysis
WWW'17
J-Force: Forced Execution on JavaScript [ paper]
Kyungtae Kim, I Luk Kim, Chung Hwan Kim, Yonghwi Kwon, Yunhui Zheng, Xiangyu Zhang, and Dongyan Xu,
In Proc. 26th International World Wide Web Conference
NDSS'17
A2C: Self Destructing Exploit Executions via Input Perturbation [ paper | slides]
Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu,
In Proc. 24th Network and Distributed System Security Symposium
 OOPSLA'16 
Apex: Automatic Programming Assignment Error Explanation [ paper | website]
Dohyeong Kim, Yonghwi Kwon, Peng Liu, I Luk Kim, David Mitchel Perry, Xiangyu Zhang, and Gustavo Rodriguez-Rivera,
In Proc. 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications
 FSE'16 
WebRanz: Web Page Randomization For Better Advertisement Delivery and Web-Bot Prevention [ paper | website]
Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, and Patrick Eugster,
In Proc. 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering
 WOOT'16 
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic [ paper]
Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, and John Qian,
In Proc. 10th USENIX Workshop on Offensive Technologies
 ASPLOS'16 
LDX: Causality Inference by Lightweight Dual Execution [ paper | slides]
Yonghwi Kwon, Dohyeong Kim, William N. Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu,
In Proc. 21st International Conference on Architectural Support for Programming Languages and Operating Systems
 ASPLOS'15 
Dual Execution for On the Fly Fine Grained Execution Comparison [ paper]
Dohyeong Kim, Yonghwi Kwon, William N. Sumner, Xiangyu Zhang, and Dongyan Xu,
In Proc. 20th International Conference on Architectural Support for Programming Languages and Operating Systems
NDSS'15
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions [ paper | slides]
Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, and John Qian,
In Proc. 22nd Network and Distributed System Security Symposium
ASE'13
PIEtrace: Platform Independent Executable Trace [ paper | slides | website]
Yonghwi Kwon, Xiangyu Zhang, and Dongyan Xu,
In Proc. 28th IEEE/ACM International Conference on Automated Software Engineering
ACM SIGSOFT Distinguished Paper Award and Best Paper Award

Awards

2017 Maurice H. Halstead Memorial Award, Purdue University
2013 ACM SIGSOFT Distinguished Paper Award, ACM
2013 Best Paper Award, ASE'13
2008-2012 Microsoft MVP (Most Valuable Professional), Microsoft

Professional Experience

{ Security Researcher } - 3 years as a researcher
I involved in developing security solutions such as DRM (Digital Rights Management) systems,
Binary Protectors which encrypt and decrypt executable files on the fly to prevent reverse-engineering.
Also, I have developed several anti-malware programs in both kernel and user-mode.

{ System Programmer } - 3 years as a student researcher
Beside security projects, I developed and led many commercial projects including system utilities,
network firewalls, file-filter drivers, and image processing applications.
I also have developed programs on various platforms including x86, MIPS, and ARM.

Talks

2017 A2C: Self Destructing Exploit Executions via Input Perturbation,
CERIAS (Purdue)
2015 P2C: Understanding Output Data Files via On-the-Fly Transformation
from Producer to Consumer Executions, CERIAS (Purdue)
2011 Migration to the Visual Studio 2010, Microsoft Korea
2010 Effective Windows Programming, Microsoft Korea
2009 Advanced topics in Windows Programming, Microsoft Korea
2009 Debugging Applications in Windows, Samsung Electronics

Books

1. Effective Windows Programming, WellBook, June, 2010, Yonghwi Kwon, Yonghyun Kim, and Youngjin Shin.

Technical Articles

1. How to Find a COM Object Connected to Internet Explorer [open]
2. Hooking the Real COM Objects: Intercepting IHTMLDocument3 Functions [open]
3. Phishing applications: Security threats regarding the SetParent function [open]
4. How to Detect Empty Password Users [open]
[ See all my articles on codeproject.com ]