What is the target?

UNIST CSE master's student
Hi, My name is Wonil Jang. My research interests focus on finding vulnerabilities in both closed and open-source software.
Especially, I am interested in fuzzing and hacking moving devices (e.g., cars, drones, ships, etc.). My motto is “No Pain, No Gain.” Happy hacking!
ADVISOR HISTORY
- 2025.03.03 ~ now: Joined CSSL and working with Prof. Hyungon Moon at UNIST.
- 2024.02.26 ~ 2025.03.02: Joined S2Lab at UNIST. Prof. Yuseok Jeon moved to Korea University at the end of 2024.
PUBLICATIONS
- 2025 CMASan: Custom Memory Allocator-aware Address Sanitizer
Junwha Hong, Wonil Jang, Mijung Kim, Lei Yu, Yonghwi Kwon, and Yuseok Jeon
In IEEE Symposium on Security and Privacy (S&P), 2025.
AWARDS
- 2024 Grand Prize Winner (General Division) of the Ulsan Hacking CTF Competition - Ulsan Police Agency
- 2023 Grand Prize in the Buulgyeong Cybersecurity Hackathon - Graduate School of Convergence Security, PNU
- 2023 Best of the Best 11th WhiteHat10 Award - KITRI
- 2022 Outstanding Paper Award at the Korea Internet of Things Association - KIOT
- 2021 Link Industry Cooperation Best Artificial Intelligence Advanced Course Award - LINC Industry Cooperation, UOU
- 2021 23rd Hacking Camp SINCERE Hacker Award - HackingCamp
- 2019 Excellence Award in the Training Course on Analysis and Response of Cyber Infringement Accidents - UIPA
- 2019 Network Forensics Practical Training Course Excellence Award - UIPA
SPECIAL ACTIVITIES
- 2024 Attended CCS Conference
- 2022~2023 Completed the Best of the Best 11th
- 2021 Attended the 23rd Hacking Camp
- 2020 Attended the K-Security competition on using artificial intelligence to identify malware
- 2019 Attended the 22nd Hacking Camp
CTF
- 2024 Ulsan Hacking competition CTF 4th / 23th ( Team: yummyshell, General Division Winner )
- 2024 M0lECON CTF ( Team: yummyshell )
- 2024 UNIST CSE web security CTF 1st / 27th ( Individual )
- 2023 Dreamhack Christmas CTF 8th / 147th ( Team: yummyshell, i.e., the former name OASIS, 3 people )
- 2021 Hacking Camp CTF 4th ( Team, 4 people )
FOUND VULNS
- CVE-2023-7152, CVE-2023-7158, CVE-2024-8946, CVE-2024-8947, CVE-2024-8948 in MicroPython
- CVE-2023-7104 in SQLite3
- CVE-2023-46256: Heap Buffer Overflow in Open Source PX4 Drone
- KVE-2022-1969: IoT RCE by webshell with root permission
- KVE-2022-2162: BLE Replay Attack
- KVE-2022-2328: IoT DoS Attack By BOF
- KVE-2022-2329: IoT DoS Attack By BOF
*CVE = Common Vulnerabilites and Exposures
*KVE = Korean Vulnerabilites and Exposures ( The company name and device inforamation cannot be specified )