Follow
Sang Kil Cha
Sang Kil Cha
School of Computing, KAIST
Verified email at kaist.ac.kr - Homepage
Title
Cited by
Cited by
Year
Unleashing Mayhem on Binary Code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
7862012
The Art, Science, and Engineering of Fuzzing: A Survey
VJM Manes, H Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo
IEEE Transactions on Software Engineering, 2018
6062018
Automatic Exploit Generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
6042014
AEG: Automatic Exploit Generation
T Avgerinos, SK Cha, BLT Hao, D Brumley
Network and Distributed System Security Symposium, 283-300, 2011
604*2011
Enhancing Symbolic Execution with Veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
3492014
Program-adaptive Mutational Fuzzing
SK Cha, M Woo, D Brumley
2015 IEEE Symposium on Security and Privacy, 725-741, 2015
3332015
Optimizing Seed Selection for Fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
USENIX Security Symposium, 861-875, 2014
3152014
Scheduling Black-box Mutational Fuzzing
M Woo, SK Cha, S Gottlieb, D Brumley
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2552013
IMF: Inferred Model-based Fuzzer
HS Han, SK Cha
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1612017
CodeAlchemist: Semantics-aware code generation to find vulnerabilities in JavaScript engines.
HS Han, DH Oh, SK Cha
NDSS, 2019
1572019
SplitScreen: Enabling Efficient, Distributed Malware Detection
SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen
NSDI, 377-390, 2010
1292010
SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses
J Choi, D Kim, S Kim, G Grieco, A Groce, SK Cha
The 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
1242021
Boosting Fuzzer Efficiency: An Information Theoretic Perspective
M Böhme, VJM Manès, SK Cha
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
1132020
Montage: A Neural Network Language Model-Guided JavaScript Fuzzer
S Lee, HS Han, SK Cha, S Son
20th USENIX Security Symposium (USENIX Security 2020), 2020
1092020
Retracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps
W Cui, M Peinado, SK Cha, Y Fratantonio, VP Kemerlis
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
972016
Grey-box Concolic Testing on Binary Code
J Choi, J Jang, C Han, SK Cha
Proceedings of the 41st International Conference on Software Engineering …, 2019
892019
Testing Intermediate Representations for Binary Analysis
S Kim, M Faerevaag, M Jung, SI Jung, DY Oh, JH Lee, SK Cha
Proceedings of the 32nd IEEE/ACM International Conference on Automated …, 2017
842017
Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference
VJM Manès, S Kim, SK Cha
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
702020
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned
D Kim, E Kim, SK Cha, S Son, Y Kim
IEEE Transactions on Software Engineering 49 (4), 1661-1682, 2022
592022
Automated Exploit Generation
D Brumley, SK Cha, T Avgerinos
US Patent 9,135,405, 2015
422015
The system can't perform the operation now. Try again later.
Articles 1–20