VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery S Kim, S Woo, H Lee, H Oh Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 595-614, 2017 | 185 | 2017 |
Finding semantic bugs in file systems with an extensible fuzzing framework S Kim, M Xu, S Kashyap, J Yoon, W Xu, T Kim Proceedings of the 27th ACM Symposium on Operating Systems Principles, 147-161, 2019 | 44 | 2019 |
Software systems at risk: An empirical study of cloned vulnerabilities in practice S Kim, H Lee computers & security 77, 720-736, 2018 | 22 | 2018 |
Poster: Iotcube: an automated analysis platform for finding security vulnerabilities S Kim, S Woo, H Lee, H Oh Proceedings of the 38th IEEE Symposium on Poster presented at Security and …, 2017 | 6 | 2017 |
CENTRIS: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse S Woo, S Park, S Kim, H Lee, H Oh 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 4 | 2021 |
SIGMATA: Storage Integrity Guaranteeing Mechanism against Tampering Attempts for Video Event Data Recorders H Kwon, S Kim, H Lee 7th International Multi-Conference on Complexity, Informatics and …, 2016 | 4 | 2016 |
Apparatus and method for detecting code cloning of software H Lee, S Kim US Patent 10,146,532, 2018 | 2 | 2018 |
Finding Bugs in File Systems with an Extensible Fuzzing Framework S Kim, M Xu, S Kashyap, J Yoon, W Xu, T Kim ACM Transactions on Storage (TOS) 16 (2), 2020 | 1 | 2020 |
Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes CK Nkuba, S Kim, S Dietrich, H Lee IEEE Access 10, 1775-1789, 2021 | | 2021 |