Follow
Min Gyung Kang
Min Gyung Kang
Verified email at google.com
Title
Cited by
Cited by
Year
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
10742008
Renovo: A hidden code extractor for packed executables
MG Kang, P Poosankam, H Yin
Proceedings of the 2007 ACM workshop on Recurring malcode, 46-53, 2007
4512007
Dta++: dynamic taint analysis with targeted control-flow propagation.
MG Kang, S McCamant, P Poosankam, D Song
NDSS, 2011
4142011
Emulating emulation-resistant malware
MG Kang, H Yin, S Hanna, S McCamant, D Song
Proceedings of the 1st ACM workshop on Virtual machine security, 11-22, 2009
1732009
BitScope: Automatically dissecting malicious binaries
D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ...
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007
1162007
FiG: Automatic fingerprint generation
J Caballero, S Venkataraman, P Poosankam, MG Kang, D Song, A Blum
Carnegie Mellon University, 2007
842007
Distributed evasive scan techniques and countermeasures
MG Kang, J Caballero, D Song
Detection of Intrusions and Malware, and Vulnerability Assessment: 4th …, 2007
462007
Crash analysis with BitBlaze
C Miller, J Caballero, NM Johnson, MG Kang, S McCamant, ...
at BlackHat USA, 2010
422010
BitBlaze: Binary analysis for computer security
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
102013
Advanced binary analysis techniques for malware defense
MG Kang
Carnegie Mellon University, 2010
2010
Challenges in Building an Internet-Wide Monitoring Infrastructure for Network Security
MG Kang, S Moon
MalSolver: In-depth Malware Analysis through Layered Symbolic Execution
H Yin, C Hartwig, MG Kang, D Song
The system can't perform the operation now. Try again later.
Articles 1–12