Jason Kim

김종성
Profile Picture

nosajmik@gatech-scp:~$ whoami

Hello! My name is Jason, and I am a first-year PhD student in the School of Cybersecurity and Privacy at Georgia Tech, fortunate to be advised by Prof. Daniel Genkin. I graduated from the University of Michigan in May 2021 with my bachelor's degree in computer science, where I worked on projects with Daniel and Prof. Kevin Leach.

nosajmik@gatech-scp:~$ cat research.txt

Broadly, I am interested in side channel attacks and their applications. Rather than attacking the algorithms of a computer system, I find ways to break computers by taking advantage of subtleties that arise from how they are designed and implemented. More recently, I am working on breaking in-browser countermeasures against microprocessor side channels, and how such channels can be abused applied to compromise privacy and anonymity on the Internet. Quoting my advisor: they make, we break!

Before side channels, I worked on machine learning models for binary analysis, network security and intrusion detection systems, and a little bit of bioinformatics alongside my undergraduate minor in biology. I was also on the course staff of Michigan's computer security course for two years as a teaching assistant.

nosajmik@gatech-scp:~$ cat misc.txt

When I am not working on side channels, I enjoy cooking, watching movies, and going on a hike or road trip. Ever since I got a Google Pixel as my phone (and free unlimited Google Photos storage as a result), I have been taking pictures of nice scenery or objects, printing them, and framing them on my wall.

You can find me on floor 10 of the Coda Building, at 756 W Peachtree St NW, Atlanta, GA 30308 - or reach me at nosajmik (at) gatech (dot) edu. That's kimjason spelled backwards, and originally was my username at Michigan.

nosajmik@gatech-scp:~$ ls publications/

  • Ayush Agarwal, Sioli O'Connell, Jason Kim, Shaked Yehezkel, Daniel Genkin, Eyal Ronen, and Yuval Yarom.
    Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution.
    To appear in IEEE Symposium on Security and Privacy (S&P) 2022.
  • Jason Kim, Daniel Genkin, and Kevin Leach.
    SToPR: Swift Toolchain Provenance Recovery of ARM Program Binaries.
    Revision in progress.