关注
Sang Kil Cha
Sang Kil Cha
School of Computing, KAIST
在 kaist.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
年份
AEG: Automatic Exploit Generation
T Avgerinos, SK Cha, BLT Hao, D Brumley
Network and Distributed System Security Symposium, 283-300, 2011
603*2011
AlertVision: Visualizing Security Alerts
J Hong, JK Lee, HK Lee, YH Chang, KH Choi, SK Cha
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
2019
Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference
VJM Manès, S Kim, SK Cha
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
682020
Apparatus, method, and computer program for detecting malware in software defined network
S Seungwon, C Lee, Y Changhoon, SK Cha
US Patent App. 15/811,248, 2018
202018
AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar Inference
H Kim, S Kim, J Lee, SK Cha
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024
2024
Asia's Surging Interest in Binary Analysis
SK Cha, Z Liang
Communications of the ACM 63 (4), 86-88, 2020
32020
Automated Exploit Generation
D Brumley, SK Cha, T Avgerinos
US Patent 9,135,405, 2015
422015
Automatic Exploit Generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
6032014
Automatic Exploit Generation The idea is to identify security-critical software bugs so they can be fixed first.
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
B2R2: Building an Efficient Front-End for Binary Analysis
M Jung, S Kim, HS Han, J Choi, SK Cha
Proceedings of the NDSS Workshop on Binary Analysis Research, 2019
262019
Boosting Fuzzer Efficiency: An Information Theoretic Perspective
M Böhme, VJM Manès, SK Cha
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
1122020
BotScreen: Trust Everybody, but Cut the Aimbots Yourself
M Choi, G Ko, SK Cha
32nd USENIX Security Symposium (USENIX Security 23), 481-498, 2023
32023
CodeAlchemist: Semantics-aware code generation to find vulnerabilities in JavaScript engines.
HS Han, DH Oh, SK Cha
NDSS, 2019
1532019
Computer Memory Access Monitoring and Error Checking
W Cui, D Molnar, SK Cha
US Patent App. 13/316,582, 2013
42013
DAFL: Directed Grey-box Fuzzing guided by Data Dependency
TE Kim, J Choi, K Heo, SK Cha
32nd USENIX Security Symposium (USENIX Security 23), 4931-4948, 2023
132023
Detecting Exploitable Bugs in Binary Code
D Brumley, SK Cha, T Avgerinos, A Rebert
US Patent 9,183,396, 2015
152015
Detecting Exploitable Bugs in Binary Code
D Brumley, SK Cha, T Avgerinos, A Rebert
US Patent 9,542,559, 2017
32017
Enhancing Symbolic Execution with Veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
3482014
Evaluating Directed Fuzzers: Are We Heading in the Right Direction?
TE Kim, J Choi, S Im, K Heo, SK Cha
Proceedings of the ACM on Software Engineering 1 (FSE), 316-337, 2024
2024
Funprobe: Probing Functions from Binary Code through Probabilistic Analysis
S Kim, H Kim, SK Cha
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20