AEG: Automatic Exploit Generation T Avgerinos, SK Cha, BLT Hao, D Brumley Network and Distributed System Security Symposium, 283-300, 2011 | 603* | 2011 |
AlertVision: Visualizing Security Alerts J Hong, JK Lee, HK Lee, YH Chang, KH Choi, SK Cha Information Security Applications: 19th International Conference, WISA 2018 …, 2019 | | 2019 |
Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference VJM Manès, S Kim, SK Cha Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 68 | 2020 |
Apparatus, method, and computer program for detecting malware in software defined network S Seungwon, C Lee, Y Changhoon, SK Cha US Patent App. 15/811,248, 2018 | 20 | 2018 |
AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar Inference H Kim, S Kim, J Lee, SK Cha Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024 | | 2024 |
Asia's Surging Interest in Binary Analysis SK Cha, Z Liang Communications of the ACM 63 (4), 86-88, 2020 | 3 | 2020 |
Automated Exploit Generation D Brumley, SK Cha, T Avgerinos US Patent 9,135,405, 2015 | 42 | 2015 |
Automatic Exploit Generation T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley Communications of the ACM 57 (2), 74-84, 2014 | 603 | 2014 |
Automatic Exploit Generation The idea is to identify security-critical software bugs so they can be fixed first. T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley | | |
B2R2: Building an Efficient Front-End for Binary Analysis M Jung, S Kim, HS Han, J Choi, SK Cha Proceedings of the NDSS Workshop on Binary Analysis Research, 2019 | 26 | 2019 |
Boosting Fuzzer Efficiency: An Information Theoretic Perspective M Böhme, VJM Manès, SK Cha Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 112 | 2020 |
BotScreen: Trust Everybody, but Cut the Aimbots Yourself M Choi, G Ko, SK Cha 32nd USENIX Security Symposium (USENIX Security 23), 481-498, 2023 | 3 | 2023 |
CodeAlchemist: Semantics-aware code generation to find vulnerabilities in JavaScript engines. HS Han, DH Oh, SK Cha NDSS, 2019 | 153 | 2019 |
Computer Memory Access Monitoring and Error Checking W Cui, D Molnar, SK Cha US Patent App. 13/316,582, 2013 | 4 | 2013 |
DAFL: Directed Grey-box Fuzzing guided by Data Dependency TE Kim, J Choi, K Heo, SK Cha 32nd USENIX Security Symposium (USENIX Security 23), 4931-4948, 2023 | 13 | 2023 |
Detecting Exploitable Bugs in Binary Code D Brumley, SK Cha, T Avgerinos, A Rebert US Patent 9,183,396, 2015 | 15 | 2015 |
Detecting Exploitable Bugs in Binary Code D Brumley, SK Cha, T Avgerinos, A Rebert US Patent 9,542,559, 2017 | 3 | 2017 |
Enhancing Symbolic Execution with Veritesting T Avgerinos, A Rebert, SK Cha, D Brumley Proceedings of the 36th International Conference on Software Engineering …, 2014 | 348 | 2014 |
Evaluating Directed Fuzzers: Are We Heading in the Right Direction? TE Kim, J Choi, S Im, K Heo, SK Cha Proceedings of the ACM on Software Engineering 1 (FSE), 316-337, 2024 | | 2024 |
Funprobe: Probing Functions from Binary Code through Probabilistic Analysis S Kim, H Kim, SK Cha Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 2 | 2023 |