πŸ™‹ About Me

  • Security Researcher at ENKI WhiteHat (Vulnerability Research, Program Analysis, Fuzzing)
  • Security Researcher with focus on Windows Kernel Security and Bug Discovery

πŸ“§ contact.sangjun@gmail.com


πŸŽ“ Education


πŸ—‚ Blog Highlights

Latest posting updates

πŸ’Ό Work Experience


πŸ”¬ Research Experience

  • 2023.7 - 2024.3
    Windows Kernel Driver Research at Best of the Best 12th
    Windows Kernel Driver Fuzzing: Engineered a sophisticated fuzzing framework using Symbolic Execution to systematically uncover kernel-level vulnerabilities.

  • 2023.8 - 2024.3
    Undergraduate Researcher at Soongsil University, Cyber Security Lab
    Embedded System Static Analysis: Extended a static analysis framework to support stripped binaries, enabling vulnerability discovery in embedded systems without debugging symbols.

  • 2020.12 - 2022.6
    Undergraduate Research Assistant at Soongsil University
    Network Packet Analysis: Supported the development of network equipment by large-scale network traffic data with Etobil Soft.


🎀 Talks

  • CodeBlue2024 Link Code Video (Selected R&D Support Fund, Β₯500,000)
    S. Park, J. Kim, Y. Park. β€œ1-Click-Fuzz: Systematically Fuzzing the Windows Kernel Driver with Symbolic Execution”

πŸ“š Publications

  • Jungwoo Lee, Haeun Lee, Sangjun Park, and Sang Kil Cha. On the Applicability of Benford’s Law to Detect Saturation in Fuzzing (Registered Report). In Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA Companion β€˜25), 2025.

  • Sungjun Park, Sangjun Park, Chang-Bae Seo, Han-Eul Ryu, Byoungmo Cho, and Haehyun Cho. Detecting Vulnerabilities in Symbol-Deprived Embedded Systems with Data Flow Analysis. In Journal of the Korea Institute of Information Security & Cryptology, 2025


πŸ“ Bug Reports

  • 2024
    • CVE-2024-20653*, Local Privilege Escalation in Windows Common Log File System.
    • CVE-2024-21442, Local Privilege Escalation in Windows USB Print Driver.
    • CVE-2024-21445, Local Privilege Escalation in Windows USB Print Driver.
  • 2023
    • 20+ CVEs*, Mitsubishi Electric and Jungo Kernel Driver Local Privilege Escalation
    • CVE-2023-31341, Out-of-bounds write in AMD ΞΌPROF
    • CVE-2023-46280, Out-of-bounds read in Siemens Simatic
    • Hall of Fame recognitions from Sophos, MSI, and eScan
  • 2022
    • CVE-2022-2831*, Remote Code Execution in Blender

✱ indicates major contribution


🚩 CTF

  • 2024 DEFCON CTF 2024 9th (Team, Cold Fusion)

  • 2023 HITCON CTF 2023 4th (Team, ν”„λ‘œκ·Έλž¨ν„Έλͺ¨μ°Œ)

  • 2022 Hacktheon 2022 1st (Team, ASC)


Copyright β“’ Sangjun All rights reserved.