Seulbae Kim
Cited by
Cited by
VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery
S Kim, S Woo, H Lee, H Oh
Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 595-614, 2017
Finding semantic bugs in file systems with an extensible fuzzing framework
S Kim, M Xu, S Kashyap, J Yoon, W Xu, T Kim
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 147-161, 2019
Software systems at risk: An empirical study of cloned vulnerabilities in practice
S Kim, H Lee
Computers & Security 77, 720-736, 2018
CENTRIS: A precise and scalable approach for identifying modified open-source software reuse
S Woo, S Park, S Kim, H Lee, H Oh
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
Riding the IoT wave with VFuzz: discovering security flaws in smart homes
CK Nkuba, S Kim, S Dietrich, H Lee
IEEE Access 10, 1775-1789, 2021
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing
S Kim, M Liu, JJ Rhee, Y Jeon, Y Kwon, CH Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Poster: Iotcube: an automated analysis platform for finding security vulnerabilities
S Kim, S Woo, H Lee, H Oh
Proceedings of the 38th IEEE Symposium on Poster presented at Security and …, 2017
RoboFuzz: Fuzzing Robotic Systems over Robot Operating System (ROS) for Finding Correctness Bugs
S Kim, T Kim
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
Finding Bugs in File Systems with an Extensible Fuzzing Framework
S Kim, M Xu, S Kashyap, J Yoon, W Xu, T Kim
ACM Transactions on Storage (TOS) 16 (2), 2020
SIGMATA: Storage Integrity Guaranteeing Mechanism against Tampering Attempts for Video Event Data Recorders
H Kwon, S Kim, H Lee
7th International Multi-Conference on Complexity, Informatics and …, 2016
Apparatus and method for detecting code cloning of software
H Lee, S Kim
US Patent 10,146,532, 2018
The system can't perform the operation now. Try again later.
Articles 1–11