Sang Kil Cha
Sang Kil Cha
School of Computing, KAIST
Verified email at - Homepage
Cited by
Cited by
Unleashing Mayhem on Binary Code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
Automatic Exploit Generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
AEG: Automatic Exploit Generation
T Avgerinos, SK Cha, BLT Hao, D Brumley
Network and Distributed System Security Symposium, 283-300, 2011
Enhancing Symbolic Execution with Veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
Program-adaptive Mutational Fuzzing
SK Cha, M Woo, D Brumley
2015 IEEE Symposium on Security and Privacy, 725-741, 2015
The Art, Science, and Engineering of Fuzzing: A Survey
VJM Manes, H Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo
IEEE Transactions on Software Engineering, 2018
Optimizing Seed Selection for Fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
USENIX Security Symposium, 861-875, 2014
Scheduling Black-box Mutational Fuzzing
M Woo, SK Cha, S Gottlieb, D Brumley
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
IMF: Inferred Model-based Fuzzer
HS Han, SK Cha
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
SplitScreen: Enabling Efficient, Distributed Malware Detection
SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen
NSDI, 377-390, 2010
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines.
HS Han, DH Oh, SK Cha
NDSS, 2019
Retracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps
W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
Testing Intermediate Representations for Binary Analysis
S Kim, M Faerevaag, M Jung, SI Jung, DY Oh, JH Lee, SK Cha
Proceedings of the 32nd IEEE/ACM International Conference on Automated …, 2017
Grey-box Concolic Testing on Binary Code
J Choi, J Jang, C Han, SK Cha
Proceedings of the 41st International Conference on Software Engineering …, 2019
Boosting Fuzzer Efficiency: An Information Theoretic Perspective
M Böhme, VJM Manès, SK Cha
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
Montage: A Neural Network Language Model-Guided JavaScript Fuzzer
S Lee, HS Han, SK Cha, S Son
20th USENIX Security Symposium (USENIX Security 2020), 2020
Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference
VJM Manès, S Kim, SK Cha
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Automated Exploit Generation
D Brumley, SK Cha, T Avgerinos
US Patent 9,135,405, 2015
B2R2: Building an Efficient Front-End for Binary Analysis
M Jung, S Kim, HS Han, J Choi, SK Cha
Proceedings of the NDSS Workshop on Binary Analysis Research, 2019
Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition
SI Wi, J Choi, SK Cha
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
The system can't perform the operation now. Try again later.
Articles 1–20