Sang Kil Cha
Sang Kil Cha
School of Computing, KAIST
Verified email at kaist.ac.kr - Homepage
Title
Cited by
Cited by
Year
Unleashing Mayhem on Binary Code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
4622012
Automatic Exploit Generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
379*2014
AEG: Automatic Exploit Generation
T Avgerinos, SK Cha, BLT Hao, D Brumley
Network and Distributed System Security Symposium, 283-300, 2011
2522011
Enhancing Symbolic Execution with Veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
2402014
Program-adaptive Mutational Fuzzing
SK Cha, M Woo, D Brumley
2015 IEEE Symposium on Security and Privacy, 725-741, 2015
1712015
Optimizing Seed Selection for Fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
USENIX Security Symposium, 861-875, 2014
1622014
Scheduling Black-box Mutational Fuzzing
M Woo, SK Cha, S Gottlieb, D Brumley
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1282013
SplitScreen: Enabling Efficient, Distributed Malware Detection
SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen
NSDI, 377-390, 2010
942010
The Art, Science, and Engineering of Fuzzing: A Survey
VJM Manes, H Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo
IEEE Transactions on Software Engineering, 2018
72*2018
IMF: Inferred Model-based Fuzzer
HS Han, SK Cha
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
562017
Retracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps
W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
502016
Testing Intermediate Representations for Binary Analysis
S Kim, M Faerevaag, M Jung, SI Jung, DY Oh, JH Lee, SK Cha
Proceedings of the 32nd IEEE/ACM International Conference on Automated …, 2017
332017
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines.
HS Han, DH Oh, SK Cha
NDSS, 2019
252019
Automated Exploit Generation
D Brumley, SK Cha, T Avgerinos
US Patent 9,135,405, 2015
242015
Platform-independent Programs
SK Cha, B Pak, D Brumley, RJ Lipton
Proceedings of the 17th ACM conference on Computer and communications …, 2010
132010
Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition
SI Wi, J Choi, SK Cha
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
112018
Detecting Exploitable Bugs in Binary Code
D Brumley, SK Cha, T Avgerinos, A Rebert
US Patent 9,183,396, 2015
112015
Grey-box Concolic Testing on Binary Code
J Choi, J Jang, C Han, SK Cha
Proceedings of the 41st International Conference on Software Engineering …, 2019
102019
B2R2: Building an Efficient Front-End for Binary Analysis
M Jung, S Kim, HS Han, J Choi, SK Cha
Proceedings of the NDSS Workshop on Binary Analysis Research, 2019
92019
Indago: A New Framework for Detecting Malicious SDN Applications
C Lee, C Yoon, S Shin, SK Cha
2018 IEEE 26th International Conference on Network Protocols (ICNP), 220-230, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20