Jiyong Jang


Jiyong Jang


Principal Research Scientist & Manager, AI Supply Chain Security


IBM Research - Yorktown Heights Yorktown Heights, NY USA


Jiyong Jang is a Principal Research Scientist and Manager of the AI Supply Chain Security team at the IBM Thomas J. Watson Research Center. He completed his Ph.D. degree at Carnegie Mellon University. His research interests include most areas of computer security, with an emphasis on software and network security. His current research focuses on security analytics to detect advanced threats in complex networking systems, and application security to identify and remediate vulnerabilities using static and dynamic analysis.


💼 LinkedIn
📚 Google Scholar
📸 Photography


Program Committee

  • International Symposium on Research in Attacks, Intrusions and Defenses (RAID): 2021, 2022, 2023, 2024
  • Network Forensics Workshop at IEEE Conference on Communications and Network Security (CNS): 2016
  • Cyber Security Awareness Week Conference (CSAW): 2014

Dissertation Committee

  • Anthony Saieva (Ph.D., Columbia University): "Modern Methodologies In Practical Software Testing and Maintenance," 2023
  • Soyeon Park (Ph.D., Georgia Institute of Technology): "Program Synthesis for Fuzzing in the Perspective of Programming Language Characteristics," 2023
  • Octavian Suciu (Ph.D., University of Maryland): "Data-Driven Techniques for Vulnerability Assessments," 2019–2021
  • Bum Jun Kwon (Ph.D., University of Maryland): "Understand, Detect, and Block Malware Distribution from a Global Viewpoint," 2018
  • Yuping Li (Ph.D., University of South Florida): "Similarity based Large Scale Malware Analysis: Techniques and Implications," 2017–2018

Reviewer for Journals

  • ACM Transactions on Privacy and Security (TOPS): 2017, 2018, 2019, 2021, 2022
  • IEEE Transactions on Dependable and Secure Computing (TDSC): 2018, 2019, 2020, 2021
  • Journal of Information Security and Applications (JISA): 2020, 2021, 2022
  • IEEE Transactions on Network and Service Management (TNSM): 2017, 2022
  • IEEE Transactions on Computers (TC): 2020, 2021
  • ACM Computing Surveys (CSUR): 2018, 2019
  • ACM Transactions on Information Forensics and Security (TIFS): 2018
  • IEEE Access: 2018
  • IEEE/ACM Transactions on Networking: 2016
  • ACM Transactions on Information and System Security: 2015
  • Mobile Information Systems: 2015
  • Communications Letters: 2009

Security Vulnerabilities






Building reusable, composable, and shareable huntflows across different data sources and threat intel.

Blog posts

Top collaborators