Unleashing Mayhem on Binary Code SK Cha, T Avgerinos, A Rebert, D Brumley 2012 IEEE Symposium on Security and Privacy, 380-394, 2012 | 594 | 2012 |
Automatic Exploit Generation T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley Communications of the ACM 57 (2), 74-84, 2014 | 471 | 2014 |
AEG: Automatic Exploit Generation T Avgerinos, SK Cha, BLT Hao, D Brumley Network and Distributed System Security Symposium, 283-300, 2011 | 471* | 2011 |
Enhancing Symbolic Execution with Veritesting T Avgerinos, A Rebert, SK Cha, D Brumley Proceedings of the 36th International Conference on Software Engineering …, 2014 | 285 | 2014 |
Program-adaptive Mutational Fuzzing SK Cha, M Woo, D Brumley 2015 IEEE Symposium on Security and Privacy, 725-741, 2015 | 238 | 2015 |
The Art, Science, and Engineering of Fuzzing: A Survey VJM Manes, H Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo IEEE Transactions on Software Engineering, 2018 | 225* | 2018 |
Optimizing Seed Selection for Fuzzing A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley USENIX Security Symposium, 861-875, 2014 | 223 | 2014 |
Scheduling Black-box Mutational Fuzzing M Woo, SK Cha, S Gottlieb, D Brumley Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 183 | 2013 |
SplitScreen: Enabling Efficient, Distributed Malware Detection SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen NSDI, 377-390, 2010 | 106 | 2010 |
IMF: Inferred Model-based Fuzzer HS Han, SK Cha Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 104 | 2017 |
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines. HS Han, DH Oh, SK Cha NDSS, 2019 | 69 | 2019 |
Retracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016 | 68 | 2016 |
Testing Intermediate Representations for Binary Analysis S Kim, M Faerevaag, M Jung, SI Jung, DY Oh, JH Lee, SK Cha Proceedings of the 32nd IEEE/ACM International Conference on Automated …, 2017 | 56 | 2017 |
Grey-box Concolic Testing on Binary Code J Choi, J Jang, C Han, SK Cha Proceedings of the 41st International Conference on Software Engineering …, 2019 | 42 | 2019 |
Boosting Fuzzer Efficiency: An Information Theoretic Perspective M Böhme, VJM Manès, SK Cha Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 37 | 2020 |
Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference VJM Manès, S Kim, SK Cha Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 34 | 2020 |
Automated Exploit Generation D Brumley, SK Cha, T Avgerinos US Patent 9,135,405, 2015 | 33 | 2015 |
Montage: A Neural Network Language Model-Guided JavaScript Fuzzer S Lee, HS Han, SK Cha, S Son 20th USENIX Security Symposium (USENIX Security 2020), 2020 | 32 | 2020 |
Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition SI Wi, J Choi, SK Cha 2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018 | 16 | 2018 |
Platform-independent Programs SK Cha, B Pak, D Brumley, RJ Lipton Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 16 | 2010 |