Yeongjin Jang


Assistant Professor
School of Electrical Engineering and Computer Science (EECS)
College of Engineering,
Oregon State University

To prospective students and researchers:

I'm planning to recruiting two Ph.D. students, a postdoc,
and visiting researchers (including Undergraduate students).
Please feel free to contact me if you would like to join my research group.

Please refer to my CV and Google Scholar Profile
to learn more about my prior research projects.


Yeongjin Jang is an Assistant Professor
in the School of Electrical Engineering and Computer Science (EECS)
at Oregon State University.

His research focus lies in computer systems security in general
and especially in identifying and analyzing emerging attacks to
computer systems to build countermeasures to keep systems secure.

The following keywords describe my research interests:
trustworthy computing, vulnerability discovery and analysis,
developing exploit primitives, jailbreaking, side-channel attack,
penetration test, and malware.

His prior research projects covered in popular media including:
MIT Technology Review, Forbes, Reuters, CBS News, Wired, CNN, Telegraph, and many more.

In addition to the academic works, he has been enjoying capture-the-flag (CTF) contests.
He received the Black Badge from DEF CON, as the winner (team DEFKOR) of DEF CON 23 CTF (2015).

Prior to joining to Oregon State University,
he received his Ph.D. and master's degree in Computer Science from Georgia Tech in 2017 and 2016, respectively,
and he earned his bachelor's degree in Computer Science from KAIST (2010).


  • [05/02/2018] QSym is accepted to USENIX Security '18!
  • [04/07/2018] OSU won the Regional Champion Award from DoE Cyber Defense Competition!
  • [09/20/2017] SGX-Bomb is accepted to SysTEX '17!
  • [08/04/2017] I defended my dissertation, and my Ph.D. degree will be awarded at the end of today!
  • [05/11/2017] Dark ROP is accepted to USENIX Security '17!
  • [02/12/2017] The Coordinated Vulnerability Disclosure of DrK is recognized by Microsoft.
  • [12/03/2016] DrK has been used by IOActive to bypass KASLR to avoid the mitigation on CVE-2016-7255
  • [11/11/2016] APISan is nominated as the top 10 research papers by CSAW16
  • [10/23/2016] DrK is on LWN and Hacker News!
  • [10/12/2016] I am counted as 141st researcher, and top among the Ph.D. students with 9 papers in top 4 security conferences (Oakland, CCS, USENIX Security, and NDSS, for recent 17 yrs).


My Erdős Number is 4:

(Paul Erdős -> Noga Alon -> Richard J. Lipton -> Wenke Lee -> Yeongjin Jang)
(Paul Erdős -> Noga Alon -> Richard J. Lipton -> Taesoo Kim -> Yeongjin Jang)
(Paul Erdős -> Noga Alon -> Richard J. Lipton -> Alexandra Boldyreva -> Yeongjin Jang).

My Academic Family Tree

Security + Mathematics:

Yeongjin Jang -> Wenke Lee (Bothunter/Botsniffer/Botminer, Ether, etc.) ->
Sal Stolfo -> Jacob Schwartz -> Nelson Dunford -> Jacob Tamarkin ->
Andrei Markov (his chain!) -> Pafnuty Chebyshev (his inequality!) -> ...

OS + Physics:

Yeongjin Jang -> Taesoo Kim -> Nickolai Zeldovich (HiStar, CryptDB, etc.) ->
David Mazières (Get me off your f-----g mailing list, etc.) ->
M. Frans Kaashoek (Exokernel, Chord, SV6, etc.) -> Andrew Tanenbaum (MINIX!) ->
John Wilcox -> Burton Moyer -> Donald Loughridge ->
Robert Millikan (that oil drop guy) -> Albert A. Michelson (that lightspeed guy) -> ...