Follow
Seulbae Kim
Title
Cited by
Cited by
Year
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery
S Kim, S Woo, H Lee, H Oh
Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 595-614, 2017
1852017
Finding semantic bugs in file systems with an extensible fuzzing framework
S Kim, M Xu, S Kashyap, J Yoon, W Xu, T Kim
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 147-161, 2019
442019
Software systems at risk: An empirical study of cloned vulnerabilities in practice
S Kim, H Lee
computers & security 77, 720-736, 2018
222018
Poster: Iotcube: an automated analysis platform for finding security vulnerabilities
S Kim, S Woo, H Lee, H Oh
Proceedings of the 38th IEEE Symposium on Poster presented at Security and …, 2017
62017
CENTRIS: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse
S Woo, S Park, S Kim, H Lee, H Oh
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
42021
SIGMATA: Storage Integrity Guaranteeing Mechanism against Tampering Attempts for Video Event Data Recorders
H Kwon, S Kim, H Lee
7th International Multi-Conference on Complexity, Informatics and …, 2016
42016
Apparatus and method for detecting code cloning of software
H Lee, S Kim
US Patent 10,146,532, 2018
22018
Finding Bugs in File Systems with an Extensible Fuzzing Framework
S Kim, M Xu, S Kashyap, J Yoon, W Xu, T Kim
ACM Transactions on Storage (TOS) 16 (2), 2020
12020
Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes
CK Nkuba, S Kim, S Dietrich, H Lee
IEEE Access 10, 1775-1789, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–9