Jiyong Jang
contact information
Principal Research Scientist and Manager, Cyber Security Intelligence (CSI) teamThomas J. Watson Research Center, Yorktown Heights, NY USA +1
914
945
1688



links
2022
Streamlining and Automating Threat Hunting With Kestrel
Xiaokui Shu, Paul Coccoli, Jiyong Jang, Ian Molloy
Black Hat USA - Arsenal, 2022
Xiaokui Shu, Paul Coccoli, Jiyong Jang, Ian Molloy
Black Hat USA - Arsenal, 2022
2021
An Open Stack for Threat Hunting in Hybrid Cloud With Connected Observability
Xiaokui Shu, Frederico Araujo, Teryl Taylor, Jiyong Jang
Black Hat Europe Arsenal, 2021
Xiaokui Shu, Frederico Araujo, Teryl Taylor, Jiyong Jang
Black Hat Europe Arsenal, 2021
Evidential Cyber Threat Hunting
Frederico Araujo, Dhilung Kirat, Xiaokui Shu, Teryl Taylor, Jiyong Jang
SDM AI/ML for Cybersecurity Workshop, 2021
Frederico Araujo, Dhilung Kirat, Xiaokui Shu, Teryl Taylor, Jiyong Jang
SDM AI/ML for Cybersecurity Workshop, 2021
The Game of Cyber Threat Hunting: The Return of the Fun
Xiaokui Shu, Jiyong Jang
RSA Conference, 2021
Xiaokui Shu, Jiyong Jang
RSA Conference, 2021
Adaptive Verifiable Training Using Pairwise Class Similarity
Shiqi Wang, Kevin Eykholt, Taesung Lee, Jiyong Jang, Ian Molloy
AAAI Conference on Artificial Intelligence (AAAI), 2021
Shiqi Wang, Kevin Eykholt, Taesung Lee, Jiyong Jang, Ian Molloy
AAAI Conference on Artificial Intelligence (AAAI), 2021
Microservice-Aware Reference Monitoring through Hybrid Program Analysis
William Blair, Frederico Araujo, Teryl Taylor, Jiyong Jang
FloCon, 2021
William Blair, Frederico Araujo, Teryl Taylor, Jiyong Jang
FloCon, 2021
Software Deception Steering through Version Emulation
Frederico Araujo, Sailik Sengupta, Jiyong Jang, Adam Doupe, Kevin W. Hamlen, Subbarao Kambhampati
Hawaii International Conference on Systems Sciences (HICSS), 2021
Frederico Araujo, Sailik Sengupta, Jiyong Jang, Adam Doupe, Kevin W. Hamlen, Subbarao Kambhampati
Hawaii International Conference on Systems Sciences (HICSS), 2021
2020
IBM Works With Cisco to Exorcise Ghosts From Webex Meetings
Jiyong Jang, Dhilung Kirat, Ian Molloy, Josyula R. Rao
Security Intelligence, 2020
Jiyong Jang, Dhilung Kirat, Ian Molloy, Josyula R. Rao
Security Intelligence, 2020
Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic
Jialong Zhang, Zhongshu Gu, Jiyong Jang, Dhilung Kirat, Marc Ph. Stoecklin, Xiaokui Shu, and Heqing Huang
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2020
Jialong Zhang, Zhongshu Gu, Jiyong Jang, Dhilung Kirat, Marc Ph. Stoecklin, Xiaokui Shu, and Heqing Huang
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2020
2019
Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis
Yuping Li, Jiyong Jang, and Xinming Ou
Proceedings of the International Conference on Security and Privacy in Communication Systems (SecureComm), 2019
Yuping Li, Jiyong Jang, and Xinming Ou
Proceedings of the International Conference on Security and Privacy in Communication Systems (SecureComm), 2019
2018
Threat Intelligence Computing
Xiaokui Shu, Frederico Araujo, Douglas L. Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, and Josyula R. Rao
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2018
Xiaokui Shu, Frederico Araujo, Douglas L. Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, and Josyula R. Rao
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2018
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
Dhilung Kirat, Jiyong Jang, and Marc Ph. Stoecklin
Black Hat USA, 2018
Dhilung Kirat, Jiyong Jang, and Marc Ph. Stoecklin
Black Hat USA, 2018
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence
Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, and Xin Hu
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018
Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, and Xin Hu
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018
Protecting Intellectual Property of Deep Neural Networks with Watermarking
Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian Molloy
Proceedings of the ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2018
Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian Molloy
Proceedings of the ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2018
2017
Android Malware Clustering through Malicious Payload Mining
Yuping Li, Jiyong Jang, Xin Hu, and Xinming Ou
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2017
Yuping Li, Jiyong Jang, Xin Hu, and Xinming Ou
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2017
2016
Scalable Malware Classification with Multifaceted Content Features and Threat Intelligence
Xin Hu, Jiyong Jang, Ting Wang, Zubair Ashraf, Marc Ph. Stoecklin, Dhilung Kirat
IBM Journal of Research and Development 60(4), 2016
Xin Hu, Jiyong Jang, Ting Wang, Zubair Ashraf, Marc Ph. Stoecklin, Dhilung Kirat
IBM Journal of Research and Development 60(4), 2016
Scalable Analytics to Detect DNS Misuse for Establishing Stealthy Communication Channels
Douglas L. Schales, Jiyong Jang, Ting Wang, Xin Hu, Dhilung Kirat, Ben Wuest, Marc Ph. Stoecklin
IBM Journal of Research and Development 60(4), 2016
Douglas L. Schales, Jiyong Jang, Ting Wang, Xin Hu, Dhilung Kirat, Ben Wuest, Marc Ph. Stoecklin
IBM Journal of Research and Development 60(4), 2016
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks
Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas L. Schales, Dhilung Kirat, and Josyula R. Rao
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016
Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas L. Schales, Dhilung Kirat, and Josyula R. Rao
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016
Hunting for Invisibility: Characterizing and Detecting Malicious Web Infrastructures through Server Visibility Analysis
Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, and Marc Ph. Stoecklin
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2016
Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, and Marc Ph. Stoecklin
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2016
Detecting Malicious Exploit Kits using Tree-based Similarity Searches
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, and Reiner Sailer
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, and Reiner Sailer
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016
BotMeter: Charting DGA-Botnet Landscapes in Large Networks
Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, and Teryl Taylor
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2016
Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, and Teryl Taylor
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2016
2015
Experimental Study of Fuzzy Hashing in Malware Clustering Analysis
Yuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, Doina Caragea, Xin Hu, Jiyong Jang
Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET), 2015
Yuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, Doina Caragea, Xin Hu, Jiyong Jang
Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET), 2015
Rateless and Pollution-Attack-Resilient Network Coding
Wentao Huang, Ting Wang, Xin Hu, Jiyong Jang, and Theodoros Salonidis
Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2015
Wentao Huang, Ting Wang, Xin Hu, Jiyong Jang, and Theodoros Salonidis
Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2015
FCCE: Highly Scalable Distributed Feature Collection and Correlation Engine for Low Latency Big Data Analytics
Douglas L. Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, and Ting Wang
Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2015
Douglas L. Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, and Ting Wang
Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2015
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics
Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2015
Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2015
2014
MUSE: Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation
Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas L. Schales, Jiyong Jang, and Reiner Sailer
EURASIP Journal on Information Security, 2014
Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas L. Schales, Jiyong Jang, and Reiner Sailer
EURASIP Journal on Information Security, 2014
Lightweight Authentication of Freshness in Outsourced Key-Value Stores
Yuzhe Tang, Ting Wang, Ling Liu, Xin Hu, and Jiyong Jang
Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2014
Yuzhe Tang, Ting Wang, Ling Liu, Xin Hu, and Jiyong Jang
Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2014
FCCE: Highly Scalable Distributed Feature Collection and Correlation Engine for Low Latency Big Data Analytics
Douglas L. Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, and Ting Wang
IBM Research Report, RC25456, 2014
Douglas L. Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, and Ting Wang
IBM Research Report, RC25456, 2014
Stream Computing for Large-Scale, Multi-Channel Cyber Threat Analytics
Douglas L. Schales, Mihai Christodorescu, Xin Hu, Jiyong Jang, Josyula R. Rao, Reiner Sailer, Marc Ph. Stoecklin, Wietse Venema, and Ting Wang
Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI), 2014
Douglas L. Schales, Mihai Christodorescu, Xin Hu, Jiyong Jang, Josyula R. Rao, Reiner Sailer, Marc Ph. Stoecklin, Wietse Venema, and Ting Wang
Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI), 2014
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation
Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas L. Schales, Jiyong Jang, and Reiner Sailer
Proceedings of the International Workshop on Cyber Crime (IWCC), 2014
Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas L. Schales, Jiyong Jang, and Reiner Sailer
Proceedings of the International Workshop on Cyber Crime (IWCC), 2014
2013
Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code
Jiyong Jang
Ph.D. Dissertation, Carnegie Mellon University, 2013
Jiyong Jang
Ph.D. Dissertation, Carnegie Mellon University, 2013
Towards Automatic Software Lineage Inference
Jiyong Jang, Maverick Woo, and David Brumley
Proceedings of the USENIX Security Symposium, 2013
Jiyong Jang, Maverick Woo, and David Brumley
Proceedings of the USENIX Security Symposium, 2013
2012
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
Jiyong Jang, Maverick Woo, and David Brumley
USENIX ;login: 37(6), 2012
Jiyong Jang, Maverick Woo, and David Brumley
USENIX ;login: 37(6), 2012
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
Jiyong Jang, Abeer Agrawal, and David Brumley
Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2012
Jiyong Jang, Abeer Agrawal, and David Brumley
Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2012
2011
SplitScreen: Enabling Efficient, Distributed Malware Detection
Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen
Journal of Communications and Networks (JCN) 13(2), 187-200, 2011
Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen
Journal of Communications and Networks (JCN) 13(2), 187-200, 2011
BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis
Jiyong Jang, David Brumley, and Shobha Venkataraman
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011
Jiyong Jang, David Brumley, and Shobha Venkataraman
Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011
2010
BitShred: Fast, Scalable Malware Triage
Jiyong Jang, David Brumley, and Shobha Venkataraman
Carnegie Mellon University CyLab, CMU-Cylab-10-022, 2010
Jiyong Jang, David Brumley, and Shobha Venkataraman
Carnegie Mellon University CyLab, CMU-Cylab-10-022, 2010
SplitScreen: Enabling Efficient, Distributed Malware Detection
Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen
Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010
Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen
Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010
2009
BitShred: Fast, Scalable Code Reuse Detection in Binary Code
Jiyong Jang, and David Brumley
Carnegie Mellon University CyLab, CMU-Cylab-10-006, 2009
Jiyong Jang, and David Brumley
Carnegie Mellon University CyLab, CMU-Cylab-10-006, 2009
2007
A Time-Based Key Management Protocol for Wireless Sensor Networks
Jiyong Jang, Taekyoung Kwon, and JooSeok Song
Proceedings of the Information Security Practice and Experience Conference (ISPEC), 2007
Jiyong Jang, Taekyoung Kwon, and JooSeok Song
Proceedings of the Information Security Practice and Experience Conference (ISPEC), 2007
2006
Secure Key Pre-distribution Scheme for Wireless Sensor Network
Jiyong Jang, Hyoung-Jin Kim, Taekyoung Kwon, and JooSeok Song
Proceedings of Conference on Information Security and Cryptography (CISC), pp. 447-450, 2006
Jiyong Jang, Hyoung-Jin Kim, Taekyoung Kwon, and JooSeok Song
Proceedings of Conference on Information Security and Cryptography (CISC), pp. 447-450, 2006
2-Subset Difference Scheme for Broadcast Encryption
Jiyong Jang, DaeHun Nyang, and JooSeok Song
Journal of Korea Institute of Information Security and Cryptography 16(4), 27-32, 2006
Jiyong Jang, DaeHun Nyang, and JooSeok Song
Journal of Korea Institute of Information Security and Cryptography 16(4), 27-32, 2006