关注
Sang Kil Cha
Sang Kil Cha
School of Computing, KAIST
在 kaist.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
年份
AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar Inference
H Kim, S Kim, J Lee, SK Cha
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024
2024
Evaluating Directed Fuzzers: Are We Heading in the Right Direction?
TE Kim, J Choi, S Im, K Heo, SK Cha
Proceedings of the ACM on Software Engineering 1 (FSE), 316-337, 2024
2024
PoE: A Domain-Specific Language for Exploitation
JH Kim, S Gustaman, SK Cha
2024 Silicon Valley Cybersecurity Conference (SVCC), 1-6, 2024
2024
Method and apparatus for determining binary function entry
SK Cha, H Kim, LEE Junoh, KIM Soomin
US Patent App. 18/360,011, 2024
2024
Method and system for fuzzing windows kernel by utilizing type information obtained through binary static analysis
SK Cha, JS Choi, D Lee, K Kim
US Patent 11,860,765, 2024
2024
On the Effectiveness of Synthetic Benchmarks for Evaluating Directed Grey-box Fuzzers
H Lee, HD Yang, SG Ji, SK Cha
2023 30th Asia-Pacific Software Engineering Conference (APSEC), 11-20, 2023
12023
Funprobe: Probing Functions from Binary Code through Probabilistic Analysis
S Kim, H Kim, SK Cha
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
22023
BotScreen: Trust Everybody, but Cut the Aimbots Yourself
M Choi, G Ko, SK Cha
32nd USENIX Security Symposium (USENIX Security 23), 481-498, 2023
32023
DAFL: Directed Grey-box Fuzzing guided by Data Dependency
TE Kim, J Choi, K Heo, SK Cha
32nd USENIX Security Symposium (USENIX Security 23), 4931-4948, 2023
132023
Reassembly is Hard: A Reflection on Challenges and Strategies
H Kim, S Kim, J Lee, K Jee, SK Cha
32nd USENIX Security Symposium (USENIX Security 23), 1469-1486, 2023
62023
Fuzzle: Making a Puzzle for Fuzzers
H Lee, S Kim, SK Cha
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
112022
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned
D Kim, E Kim, SK Cha, S Son, Y Kim
IEEE Transactions on Software Engineering 49 (4), 1661-1682, 2022
582022
How’d Security Benefit Reverse Engineers? The Implication of Intel CET on Function Identification
H Kim, J Lee, S Kim, SI Jung, SK Cha
DSN, 2022
62022
SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses
J Choi, D Kim, S Kim, G Grieco, A Groce, SK Cha
The 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
1192021
NTFuzz: Enabling type-aware kernel fuzzing on windows with static binary analysis
J Choi, K Kim, D Lee, SK Cha
2021 IEEE Symposium on Security and Privacy (SP), 677-693, 2021
412021
Mind control attack: Undermining deep learning with GPU memory exploitation
SO Park, O Kwon, Y Kim, SK Cha, H Yoon
Computers & Security 102, 102115, 2021
122021
Boosting Fuzzer Efficiency: An Information Theoretic Perspective
M Böhme, VJM Manès, SK Cha
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
1122020
Montage: A Neural Network Language Model-Guided JavaScript Fuzzer
S Lee, HS Han, SK Cha, S Son
20th USENIX Security Symposium (USENIX Security 2020), 2020
1072020
Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference
VJM Manès, S Kim, SK Cha
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
682020
Asia's Surging Interest in Binary Analysis
SK Cha, Z Liang
Communications of the ACM 63 (4), 86-88, 2020
32020
系统目前无法执行此操作,请稍后再试。
文章 1–20