Sang Kil Cha
Sang Kil Cha
School of Computing, KAIST
Verified email at kaist.ac.kr - Homepage
Title
Cited by
Cited by
Year
Unleashing Mayhem on Binary Code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
5212012
Automatic Exploit Generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
4292014
AEG: Automatic Exploit Generation
T Avgerinos, SK Cha, BLT Hao, D Brumley
Network and Distributed System Security Symposium, 283-300, 2011
429*2011
Enhancing Symbolic Execution with Veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering ・, 2014
2582014
Program-adaptive Mutational Fuzzing
SK Cha, M Woo, D Brumley
2015 IEEE Symposium on Security and Privacy, 725-741, 2015
1972015
Optimizing Seed Selection for Fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
USENIX Security Symposium, 861-875, 2014
1822014
Scheduling Black-box Mutational Fuzzing
M Woo, SK Cha, S Gottlieb, D Brumley
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications ・, 2013
1542013
The Art, Science, and Engineering of Fuzzing: A Survey
VJM Manes, H Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo
IEEE Transactions on Software Engineering, 2018
113*2018
SplitScreen: Enabling Efficient, Distributed Malware Detection
SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen
NSDI, 377-390, 2010
992010
IMF: Inferred Model-based Fuzzer
HS Han, SK Cha
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications ・, 2017
762017
Retracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps
W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE ・, 2016
572016
Testing Intermediate Representations for Binary Analysis
S Kim, M Faerevaag, M Jung, SI Jung, DY Oh, JH Lee, SK Cha
Proceedings of the 32nd IEEE/ACM International Conference on Automated ・, 2017
432017
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines.
HS Han, DH Oh, SK Cha
NDSS, 2019
412019
Automated Exploit Generation
D Brumley, SK Cha, T Avgerinos
US Patent 9,135,405, 2015
272015
Grey-box Concolic Testing on Binary Code
J Choi, J Jang, C Han, SK Cha
Proceedings of the 41st International Conference on Software Engineering ・, 2019
232019
Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition
SI Wi, J Choi, SK Cha
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
142018
Platform-independent Programs
SK Cha, B Pak, D Brumley, RJ Lipton
Proceedings of the 17th ACM conference on Computer and communications ・, 2010
142010
Detecting Exploitable Bugs in Binary Code
D Brumley, SK Cha, T Avgerinos, A Rebert
US Patent 9,183,396, 2015
122015
Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference
VJM Manès, S Kim, SK Cha
Proceedings of the ACM/IEEE 42nd International Conference on Software ・, 2020
112020
B2R2: Building an Efficient Front-End for Binary Analysis
M Jung, S Kim, HS Han, J Choi, SK Cha
Proceedings of the NDSS Workshop on Binary Analysis Research, 2019
112019
The system can't perform the operation now. Try again later.
Articles 1–20