| SeokJun Ryu | |
|---|---|
| |
| Native name | 류석준 |
| Born | Seoul, South Korea |
| Education | Soongsil University (IT Convergence, EE) |
| Occupation | Security Researcher Student |
| Known for | Windows Kernel Exploitation Reverse Engineering AI for Security |
| Website | github.com/SEORY0 |
I am a student at Soongsil University and security researcher. He is currently studying at Soongsil University and is a member of the WhiteHat School 3rd cohort.
My primary research focus includes Windows Kernel Exploitation and advanced Reverse Engineering techniques. I aim to understand the root causes of vulnerabilities beyond a exploitation.
Biography
Started studying computer science with a passion for low-level system architecture. Currently active as a team member in various CTF competitions and conducting in-depth vulnerability analysis projects.
Education
- Soongsil University - IT Convergence Electronic Engineering (Current)
- WhiteHat School 3rd - KITRI Certificated
- Hacking Camp 27th - POC Security Ceritificated
Experiences
- Soongsil University AI Safety Center - Undergrad. Research Intern (Current)
| Languages | C, C++, Python, Assembly (x86/x64) |
|---|---|
| Tools | WinDbg, IDA, GDB |
| Platforms | Windows, Linux |
- Kernel Exploitation: Focusing on Windows drviers and modern mitigation bypass techniques.
- Root Cause Analysis: Deep diving into CVEs to understand the underlying logic errors.
- AI for Security: Developing tools for fuzzing and crash analysis base on AI.