Haehyun Cho

haehyun@asu.edu
CV
Sep 2020

About

Ph.D. Candidate in Computer Science, concentrating on Information Assurance, at Arizona State University. Currently, I am affiliated with SEFCOM led by Prof. Adam Doupé, Prof. Yan Shoshitaishvili, Prof. Ruoyu (Fish) Wang, Prof. Tiffany Bao, and Prof. Gail-Joon Ahn.

My primary research interests lie in the field of systems security to discover and mitigate security concerns [3, 4, 5]. I am, also, passionate about analyzing, finding and resolving security issues in a wide range of topics [1, 2, 6].

News

* Sep 2020: APWG eCrime 2020 accepted our paper "Scam Pandemic: How Attackers Exploit Public Fear through Phishing."
* Jul 2020: IEEE S&P 2021 accepted our paper "CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing."
* Jul 2020: Usenix WOOT 2020 accepted our paper "Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers."
* May 2020: Awarded the Engineering Graduate Fellowship by Ira A. Fulton Schools of Engineering, Arizona State University.
* Mar 2020: ACM MobiSys 2020 accepted our paper "SmokeBomb: Effective Mitigation Against Cache Side-channel Attacks on the ARM Architecture."
* Mar 2020: Awarded the CIDSE Doctoral Fellowship by the School of Computing, Informatics, and Decisions Systems Engineering (CIDSE), Arizona State University.

Recent Publications

  1. CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. (pdf)
    Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn.
    The 42nd IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, May 2021.
  2. Scam Pandemic: How Attackers Exploit Public Fear through Phishing. (to appear)
    Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn.
    The 2020 APWG Symposium on Electronic Crime Research (eCrime), Online, Nov 2020.
  3. Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. (pdf, code)
    Haehyun Cho, Jinbum Park, Joonwon Kang, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn.
    The 14th USENIX Workshop on Offensive Technologies (WOOT), Online, Aug 2020.
  4. SmokeBomb: Effective Mitigation Against Cache Side-channel Attacks on the ARM Architecture. (pdf, code)
    Haehyun Cho, Jinbum Park, Donguk Kim, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn.
    The 18th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), Online, Jun 2020.
  5. Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. (pdf, code)
    Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao, Adam Doupé, and Gail-Joon Ahn.
    The 34th Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, USA, Dec 2018.
  6. Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. (pdf, code)
    Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn.
    The 34th Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, USA, Dec 2018.