Sang Kil Cha
Sang Kil Cha
Email verificata su kaist.ac.kr - Home page
TitoloCitata daAnno
Unleashing Mayhem on Binary Code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
3632012
Automatic Exploit Generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
326*2014
AEG: Automatic Exploit Generation
T Avgerinos, SK Cha, BLT Hao, D Brumley
Network and Distributed System Security Symposium, 283-300, 2011
3262011
Enhancing Symbolic Execution with Veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
1912014
Program-adaptive Mutational Fuzzing
SK Cha, M Woo, D Brumley
2015 IEEE Symposium on Security and Privacy, 725-741, 2015
1282015
Optimizing Seed Selection for Fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
23rd {USENIX} Security Symposium ({USENIX} Security 14), 861-875, 2014
1192014
Scheduling Black-box Mutational Fuzzing
M Woo, SK Cha, S Gottlieb, D Brumley
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1002013
SplitScreen: Enabling Efficient, Distributed Malware Detection
SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen
NSDI, 377-390, 2010
552010
Retracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps
W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
362016
SplitScreen: Enabling Efficient, Distributed Malware Detection
SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen
Journal of Communications and Networks 13 (2), 187-200, 2011
352011
IMF: Inferred Model-based Fuzzer
HS Han, SK Cha
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
302017
Automated Exploit Generation
D Brumley, SK Cha, T Avgerinos
US Patent 9,135,405, 2015
252015
Testing Intermediate Representations for Binary Analysis
S Kim, M Faerevaag, M Jung, SI Jung, DY Oh, JH Lee, SK Cha
Proceedings of the 32nd IEEE/ACM International Conference on Automated …, 2017
162017
Platform-independent Programs
SK Cha, B Pak, D Brumley, RJ Lipton
Proceedings of the 17th ACM conference on Computer and communications …, 2010
122010
Detecting exploitable bugs in binary code
D Brumley, SK Cha, T Avgerinos, A Rebert
US Patent 9,183,396, 2015
102015
The Art, Science, and Engineering of Fuzzing: A Survey
VJM Manes, H Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo
arXiv: 1812.00140, 2018
8*2018
Computer memory access monitoring and error checking
W Cui, D Molnar, SK Cha
US Patent App. 13/316,582, 2013
52013
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines.
HS Han, DH Oh, SK Cha
NDSS, 2019
42019
Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition
SI Wi, J Choi, SK Cha
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
42018
INDAGO: A New Framework For Detecting Malicious SDN Applications
C Lee, C Yoon, S Shin, SK Cha
2018 IEEE 26th International Conference on Network Protocols (ICNP), 220-230, 2018
32018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20