- Senior Security Engineer, GREE 🇯🇵 2012, Now ~
- Security Manager, LINE 🇯🇵 2008, 4 and half years
- Co-founder, PanicSecurity 🇰🇷 (PS ScanW3B) 2004
- Security Engineer, Webzen 🇰🇷 2003, 2years
- Security Consultant, HackersLab 🇰🇷 (The first security consulting firm in Korea) 2001, 2years
- Founder, IGRUS, Inha Group of Research for UNIX Secruity (2000)
- Co-founder, KHDP, Koean Hacking Document Project (1999) with Wongyeo Jeong, Jiman Ham
- solidity, truffle, geth, react, nodejs, remix, ...
- x86/64 asm, C/C++, C#, Python, PHP, Java, Ruby, Delphi, QML, Yacc&Lex...
- IDA Pro, IDA plugins, gdb, frida, ollydbg, WindDbg, ZAP, Burp, Burp extensions ...
- golang, Laravel, Fuelphp, Codeigniter, CakePHP, Django, Node.js, Symfony, Silex, Typescript, ...
- Android, iOS, Windows, Linux, Mac OSX, Raspberry Pi, Arduino ...
- (old friends) Solaris, Digital Unix, AIX, Minix, WinCE, i-Mode, KVM, ...
- 2002 Host, KOF(King of Fighters) 2001 ctf, HackersLab, Taiwan
- 2001 Host, 2st KOF(King of Fighters) ctf, HackersLab, Korea
- 2001 Winner, World Information Security Olymfair, KAIST, Korea
- CVE-2001-1093 "Buffer overflow in msgchk in Digital UNIX 4.0G and earlier"
- CVE-2001-1092 "Msgchk in Digital UNIX 4.0G and earlier allows a local user to read the first line"
- CVE-2000-0998 "Format string vulnerability in top program allows local attackers to gain root privileges"
- CVE-1999-0691 "Digital Unix CDE dtaction -user overflow vulnerability proof of concept code"
- Lists are here https://github.com/truefinder/none-cve-vulnerabilities
- SINoALICE -シノアリス-, 戦姫絶唱シンフォギアXD UNLIMITED, アサルトリリィ Last Bullet, ...
- 消滅都市, アナザーエデン 時空を超える猫, ダンまち〜メモリア・フレーゼ〜, ソウルアームズ, 追憶の青, ...
- 釣り★スタ, ハコニワ, モンスタープラネット, 踊り子クリノッペ, 海賊王国コロンブス, 探検ドリランド, 聖戦ケルベロス, ...
- LINE Bubble, LINE Pokopang, LINE PokoPoko, LINE Pop, LINE GundamWars, ...
- TERA, Specil Force, Dragon Nest, ELSEWORD, パチスロDX, パチンコDX, ななぱち, チョコットランド, アラド戦記, ...
- 2021 Gree TechConference(🇯🇵) https://techcon.gree.jp/2021/
- "TONBI, vulnerabilitiy scanner for various MVC-model server frameworks"
- 2016 SECUINSIDE(🇰🇷) http://secuinside.com/2017/archive.html
- "About oauth zero-day vulneribilities on Koeran SNS giants"
- 2015 GREE Mini Tech Talk(🇯🇵) https://labs.gree.jp/blog/2015/01/13430/
- "Android game application vulnerailiies in wild"
- 2013 HITCON(🇹🇼) https://hitcon.org/2013/agenda/
- "Spears and shields on online game"
- 2012 AVTOKYO(🇯🇵) https://ja.avtokyo.org/avtokyo2012/speakers
- "Smartphone online game vulnerabilities"
- 2002 CONCERT(🇰🇷)
- "Format String Attack"
- 2000 CONCERT(🇰🇷)
- "UNIX network vulnerabilities"
- 2002 "Heap overflow - feee/malloc, double free corruption" https://github.com/truefinder/truefinder/blob/main/documents/heap_overflow_free_malloc_double_free_corruption.txt
- 2001 "Format string attack on alpha(64bits) system" https://github.com/truefinder/truefinder/blob/main/documents/format_string_attack_on_alpha_system.txt
- 2001 "Ptrace and controlling the child process" https://github.com/truefinder/truefinder/blob/main/documents/ptrace_and_controlling_the_child_process.txt
- 2001 "Format string attack - concept and general exploit" https://github.com/truefinder/truefinder/blob/main/documents/format_string_attack_concept_and_general_exploit