Jiyong Jang  Jiyong Jang photo       

contact information

Research Scientist
Thomas J. Watson Research Center, Yorktown Heights, NY USA
  +1dash914dash945dash1688

links


more information

More information:  LinkedIn  |  Google Scholar  |  CMU


2017

Android Malware Clustering through Malicious Payload Mining
Yuping Li, Jiyong Jang, Xin Hu, and Xinming Ou
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2017


2016

Scalable Malware Classification with Multifaceted Content Features and Threat Intelligence
Xin Hu, Jiyong Jang, Ting Wang, Zubair Ashraf, Marc Ph. Stoecklin, Dhilung Kirat
IBM Journal of Research and Development 60(4), 2016

Scalable Analytics to Detect DNS Misuse for Establishing Stealthy Communication Channels
Douglas L. Schales, Jiyong Jang, Ting Wang, Xin Hu, Dhilung Kirat, Ben Wuest, Marc Ph. Stoecklin
IBM Journal of Research and Development 60(4), 2016

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks
Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas L. Schales, Dhilung Kirat, and Josyula R. Rao
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016

Hunting for Invisibility: Characterizing and Detecting Malicious Web Infrastructures through Server Visibility Analysis
Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, and Marc Ph. Stoecklin
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2016

Detecting Malicious Exploit Kits using Tree-based Similarity Searches
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, and Reiner Sailer
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks
Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, and Teryl Taylor
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2016


2015

Experimental Study of Fuzzy Hashing in Malware Clustering Analysis
Yuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, Doina Caragea, Xin Hu, Jiyong Jang
Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET), 2015

Rateless and Pollution-Attack-Resilient Network Coding
Wentao Huang, Ting Wang, Xin Hu, Jiyong Jang, and Theodoros Salonidis
Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2015

FCCE: Highly Scalable Distributed Feature Collection and Correlation Engine for Low Latency Big Data Analytics
Douglas L. Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, and Ting Wang
Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2015

The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics
Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2015


2014

MUSE: Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation
Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas L. Schales, Jiyong Jang, and Reiner Sailer
EURASIP Journal on Information Security, 2014

Lightweight Authentication of Freshness in Outsourced Key-Value Stores
Yuzhe Tang, Ting Wang, Ling Liu, Xin Hu, and Jiyong Jang
Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2014

FCCE: Highly Scalable Distributed Feature Collection and Correlation Engine for Low Latency Big Data Analytics
Douglas L. Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, and Ting Wang
IBM Research Report, RC25456, 2014

Stream Computing for Large-Scale, Multi-Channel Cyber Threat Analytics
Douglas L. Schales, Mihai Christodorescu, Xin Hu, Jiyong Jang, Josyula R. Rao, Reiner Sailer, Marc Ph. Stoecklin, Wietse Venema, and Ting Wang
Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI), 2014

Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation
Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas L. Schales, Jiyong Jang, and Reiner Sailer
Proceedings of the International Workshop on Cyber Crime (IWCC), 2014


2013


Towards Automatic Software Lineage Inference
Jiyong Jang, Maverick Woo, and David Brumley
Proceedings of the USENIX Security Symposium, 2013


2012

ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
Jiyong Jang, Maverick Woo, and David Brumley
USENIX ;login: 37(6), 2012

ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
Jiyong Jang, Abeer Agrawal, and David Brumley
Proceedings of the IEEE Symposium on Security and Privacy, 2012


2011

SplitScreen: Enabling Efficient, Distributed Malware Detection
Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen
Journal of Communications and Networks (JCN) 13(2), 187-200, 2011

BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis
Jiyong Jang, David Brumley, and Shobha Venkataraman
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011


2010

BitShred: Fast, Scalable Malware Triage
Jiyong Jang, David Brumley, and Shobha Venkataraman
Carnegie Mellon University CyLab, CMU-Cylab-10-022, 2010

SplitScreen: Enabling Efficient, Distributed Malware Detection
Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen
Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010


2009

BitShred: Fast, Scalable Code Reuse Detection in Binary Code
Jiyong Jang, and David Brumley
Carnegie Mellon University CyLab, CMU-Cylab-10-006, 2009


2007

A Time-Based Key Management Protocol for Wireless Sensor Networks
Jiyong Jang, Taekyoung Kwon, and JooSeok Song
Proceedings of the Information Security Practice and Experience Conference (ISPEC), 2007


2006

Secure Key Pre-distribution Scheme for Wireless Sensor Network
Jiyong Jang, Hyoung-Jin Kim, Taekyoung Kwon, and JooSeok Song
Proceedings of Conference on Information Security and Cryptography (CISC), pp. 447-450, 2006

2-Subset Difference Scheme for Broadcast Encryption
Jiyong Jang, DaeHun Nyang, and JooSeok Song
Journal of Korea Institute of Information Security and Cryptography 16(4), 27-32, 2006