Skip to content
View sumin-world's full-sized avatar
:octocat:
:octocat:
  • Yonsei University · Applied Statistics

Block or report sumin-world

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
sumin-world/README.md

sumin-world 🦀

🤔 Why this name?
use std::ops::BitOr;

struct S(&'static str);

impl BitOr for S {
    type Output = String;
    fn bitor(self, rhs: Self) -> Self::Output {
        format!("{} in {}!", self.0, rhs.0)
    }
}

fn main() {
    println!("{}", S("sum") | S("world"));
}

Sometimes the answer is in the code itself


🔧 Tech Stack


🚀 Featured Projects

🌐 Network Programming

  • TCP HTTP Client (C)
    • Non-blocking connect, DNS multi-A failover, recv timeout
    • Production-ready HTTP/1.1 implementation
  • Multi-client Echo Server (C)
    • select() based I/O multiplexing
    • Timeout & keepalive support

🔒 System Security & Programming

  • Signal Handling Demo (C)
    • POSIX signal handling with CI/CD automation
    • Interactive demo with automated testing
  • Tiny Shell (C)
    • Job control, signal handling, race condition prevention
    • Process management & I/O redirection

🦀 Rust Experiments

  • One-liner Challenge: sum in world = suminworld!
  • Custom operators & trait implementations

🔒 Security Research & Exploits

  • Linux Kernel CVE-2022-32250 Exploit Development — WHS-2 (White Hat School), Team Project (2024)

    • Implemented a Linux kernel exploit for CVE-2022-32250 (UAF) with:
      • Heap grooming & leakage primitives
      • KASLR-related exploitation steps
      • Privilege escalation technique via modprobe_path overwrite (controlled execution path)
  • SKT USIM Hacking Analysis — USIS (University Student Intelligence Society), 3rd Cohort (2025, Team Project)

    • Wrote a readability-first technical report for a mixed-background team (many non-CS members)
    • Focus: USIM/telecom threat surface, core flows around subscriber identity, and security implications across telecom backend components (e.g., HSS/UDM) from an APT-style perspective
    • Role: Primary author of the report, organizing the narrative, diagrams, and explanations to make complex topics digestible
  • OpenStack “Open the Window” Security Auditing — SSL 6th Term (Oct 2025 – Jan 2026)

    • Authored a detailed report on the Barbican Key Management module, including architecture analysis and threat modelling.
    • Presented the team’s vulnerability findings (DOM XSS, IDOR, SSRF) in the final briefing, ensuring accurate reproduction and impact analysis.
    • Worked across Skyline‑Console, Cinder, Glance, and Barbican to verify issues and document mitigation steps.

🧠 Machine Learning

  • ML‑based Flood Prediction (Han River) — Hydrology / ML Coursework Project (2024)
    • Proposed the project topic and led the effort to build an LSTM‑based time‑series model for predicting Han River water levels using real‑world data.
    • Focused on rigorous evaluation, feature engineering, and iterative model improvement.
    • This research concept later inspired the Social Crab hardware project in the BitCrab embedded systems club.

⚙️ Hardware

  • Social Crab PCB Design — BitCrab Embedded Systems Club (Yonsei University) / 2024 IHEI Workstation Social Innovation Project (2024, Team Project)
    • As part of a small team from BitCrab, executed this hardware project inspired by our flood-prediction coursework, applying data-driven insights to embedded design for social impact (e.g., flood monitoring IoT prototype).
    • Designed a custom PCB for Raspberry Pi Pico, focusing on power-stability testing and embedded prototyping with protocols like I2C/SPI/UART.
    • Contributed to bring-up/testing workflows and documented processes for reproducible results.

🔥 Recent Activity

  1. ⬆️ Pushed undefined commit(s) to sumin-world/sumin-world
  2. ⬆️ Pushed undefined commit(s) to sumin-world/sumin-world
  3. ⬆️ Pushed undefined commit(s) to sumin-world/sumin-world
  4. ⬆️ Pushed undefined commit(s) to sumin-world/sumin-world
  5. ⬆️ Pushed undefined commit(s) to sumin-world/sumin-world

📝 Latest Blog Posts


🐿️ Research Interests

  • System Hacking: Buffer overflow, heap exploitation, ROP chains
  • Network Security: ARP/DNS spoofing, session hijacking, packet analysis
  • Linux Internals: Syscalls, process management, memory subsystem
  • CTF Practice: Dreamhack, pwnable.kr, OverTheWire

🏆 Competitive Programming

count

💡 "Learning by building, one system call at a time"

Pinned Loading

  1. rust-security-suminworld rust-security-suminworld Public

    let'sRUst!

    Rust

  2. suminworld-system-lab suminworld-system-lab Public

    System programming & networking lab (C, Linux, OSTEP practice)

    C