Unleashing Mayhem on Binary Code SK Cha, T Avgerinos, A Rebert, D Brumley 2012 IEEE Symposium on Security and Privacy, 380-394, 2012 | 786 | 2012 |
The Art, Science, and Engineering of Fuzzing: A Survey VJM Manes, H Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo IEEE Transactions on Software Engineering, 2018 | 606 | 2018 |
Automatic Exploit Generation T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley Communications of the ACM 57 (2), 74-84, 2014 | 604 | 2014 |
AEG: Automatic Exploit Generation T Avgerinos, SK Cha, BLT Hao, D Brumley Network and Distributed System Security Symposium, 283-300, 2011 | 604* | 2011 |
Enhancing Symbolic Execution with Veritesting T Avgerinos, A Rebert, SK Cha, D Brumley Proceedings of the 36th International Conference on Software Engineering …, 2014 | 349 | 2014 |
Program-adaptive Mutational Fuzzing SK Cha, M Woo, D Brumley 2015 IEEE Symposium on Security and Privacy, 725-741, 2015 | 333 | 2015 |
Optimizing Seed Selection for Fuzzing A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley USENIX Security Symposium, 861-875, 2014 | 315 | 2014 |
Scheduling Black-box Mutational Fuzzing M Woo, SK Cha, S Gottlieb, D Brumley Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 255 | 2013 |
IMF: Inferred Model-based Fuzzer HS Han, SK Cha Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 161 | 2017 |
CodeAlchemist: Semantics-aware code generation to find vulnerabilities in JavaScript engines. HS Han, DH Oh, SK Cha NDSS, 2019 | 157 | 2019 |
SplitScreen: Enabling Efficient, Distributed Malware Detection SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen NSDI, 377-390, 2010 | 129 | 2010 |
SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses J Choi, D Kim, S Kim, G Grieco, A Groce, SK Cha The 36th IEEE/ACM International Conference on Automated Software Engineering, 2021 | 124 | 2021 |
Boosting Fuzzer Efficiency: An Information Theoretic Perspective M Böhme, VJM Manès, SK Cha Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 113 | 2020 |
Montage: A Neural Network Language Model-Guided JavaScript Fuzzer S Lee, HS Han, SK Cha, S Son 20th USENIX Security Symposium (USENIX Security 2020), 2020 | 109 | 2020 |
Retracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016 | 97 | 2016 |
Grey-box Concolic Testing on Binary Code J Choi, J Jang, C Han, SK Cha Proceedings of the 41st International Conference on Software Engineering …, 2019 | 89 | 2019 |
Testing Intermediate Representations for Binary Analysis S Kim, M Faerevaag, M Jung, SI Jung, DY Oh, JH Lee, SK Cha Proceedings of the 32nd IEEE/ACM International Conference on Automated …, 2017 | 84 | 2017 |
Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference VJM Manès, S Kim, SK Cha Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 70 | 2020 |
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned D Kim, E Kim, SK Cha, S Son, Y Kim IEEE Transactions on Software Engineering 49 (4), 1661-1682, 2022 | 59 | 2022 |
Automated Exploit Generation D Brumley, SK Cha, T Avgerinos US Patent 9,135,405, 2015 | 42 | 2015 |