BibTeX records: Sang Kil Cha

download as .bib file

@article{DBLP:journals/cacm/AvgerinosRCB16,
  author    = {Thanassis Avgerinos and
               Alexandre Rebert and
               Sang Kil Cha and
               David Brumley},
  title     = {Enhancing symbolic execution with veritesting},
  journal   = {Commun. {ACM}},
  volume    = {59},
  number    = {6},
  pages     = {93--100},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2927924},
  doi       = {10.1145/2927924},
  timestamp = {Fri, 27 May 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cacm/AvgerinosRCB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icse/CuiPCFK16,
  author    = {Weidong Cui and
               Marcus Peinado and
               Sang Kil Cha and
               Yanick Fratantonio and
               Vasileios P. Kemerlis},
  title     = {RETracer: triaging crashes by reverse execution from partial memory
               dumps},
  booktitle = {Proceedings of the 38th International Conference on Software Engineering,
               {ICSE} 2016, Austin, TX, USA, May 14-22, 2016},
  pages     = {820--831},
  year      = {2016},
  crossref  = {DBLP:conf/icse/2016},
  url       = {http://doi.acm.org/10.1145/2884781.2884844},
  doi       = {10.1145/2884781.2884844},
  timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icse/CuiPCFK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChaWB15,
  author    = {Sang Kil Cha and
               Maverick Woo and
               David Brumley},
  title     = {Program-Adaptive Mutational Fuzzing},
  booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  pages     = {725--741},
  year      = {2015},
  crossref  = {DBLP:conf/sp/2015},
  url       = {https://doi.org/10.1109/SP.2015.50},
  doi       = {10.1109/SP.2015.50},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/ChaWB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/AvgerinosCRSWB14,
  author    = {Thanassis Avgerinos and
               Sang Kil Cha and
               Alexandre Rebert and
               Edward J. Schwartz and
               Maverick Woo and
               David Brumley},
  title     = {Automatic exploit generation},
  journal   = {Commun. {ACM}},
  volume    = {57},
  number    = {2},
  pages     = {74--84},
  year      = {2014},
  url       = {http://doi.acm.org/10.1145/2560217.2560219},
  doi       = {10.1145/2560217.2560219},
  timestamp = {Tue, 28 Jan 2014 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cacm/AvgerinosCRSWB14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icse/AvgerinosRCB14,
  author    = {Thanassis Avgerinos and
               Alexandre Rebert and
               Sang Kil Cha and
               David Brumley},
  title     = {Enhancing symbolic execution with veritesting},
  booktitle = {36th International Conference on Software Engineering, {ICSE} '14,
               Hyderabad, India - May 31 - June 07, 2014},
  pages     = {1083--1094},
  year      = {2014},
  crossref  = {DBLP:conf/icse/2014},
  url       = {http://doi.acm.org/10.1145/2568225.2568293},
  doi       = {10.1145/2568225.2568293},
  timestamp = {Sun, 18 May 2014 16:02:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icse/AvgerinosRCB14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/RebertCAFWGB14,
  author    = {Alexandre Rebert and
               Sang Kil Cha and
               Thanassis Avgerinos and
               Jonathan Foote and
               David Warren and
               Gustavo Grieco and
               David Brumley},
  title     = {Optimizing Seed Selection for Fuzzing},
  booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014.},
  pages     = {861--875},
  year      = {2014},
  crossref  = {DBLP:conf/uss/2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/rebert},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/RebertCAFWGB14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WooCGB13,
  author    = {Maverick Woo and
               Sang Kil Cha and
               Samantha Gottlieb and
               David Brumley},
  title     = {Scheduling black-box mutational fuzzing},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {511--522},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {http://doi.acm.org/10.1145/2508859.2516736},
  doi       = {10.1145/2508859.2516736},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/WooCGB13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChaARB12,
  author    = {Sang Kil Cha and
               Thanassis Avgerinos and
               Alexandre Rebert and
               David Brumley},
  title     = {Unleashing Mayhem on Binary Code},
  booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
               San Francisco, California, {USA}},
  pages     = {380--394},
  year      = {2012},
  crossref  = {DBLP:conf/sp/2012},
  url       = {https://doi.org/10.1109/SP.2012.31},
  doi       = {10.1109/SP.2012.31},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/ChaARB12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcn/ChaMJTBA11,
  author    = {Sang Kil Cha and
               Iulian Moraru and
               Jiyong Jang and
               John Truelove and
               David Brumley and
               David G. Andersen},
  title     = {SplitScreen: Enabling efficient, distributed malware detection},
  journal   = {Journal of Communications and Networks},
  volume    = {13},
  number    = {2},
  pages     = {187--200},
  year      = {2011},
  url       = {https://doi.org/10.1109/JCN.2011.6157418},
  doi       = {10.1109/JCN.2011.6157418},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jcn/ChaMJTBA11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AvgerinosCHB11,
  author    = {Thanassis Avgerinos and
               Sang Kil Cha and
               Brent Lim Tze Hao and
               David Brumley},
  title     = {{AEG:} Automatic Exploit Generation},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
               2011},
  year      = {2011},
  crossref  = {DBLP:conf/ndss/2011},
  url       = {http://www.isoc.org/isoc/conferences/ndss/11/pdf/5_5.pdf},
  timestamp = {Wed, 31 Aug 2011 14:05:35 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/AvgerinosCHB11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChaPBL10,
  author    = {Sang Kil Cha and
               Brian Pak and
               David Brumley and
               Richard Jay Lipton},
  title     = {Platform-independent programs},
  booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages     = {547--558},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010},
  url       = {http://doi.acm.org/10.1145/1866307.1866369},
  doi       = {10.1145/1866307.1866369},
  timestamp = {Mon, 22 Nov 2010 20:51:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/ChaPBL10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/ChaMJTBA10,
  author    = {Sang Kil Cha and
               Iulian Moraru and
               Jiyong Jang and
               John Truelove and
               David Brumley and
               David G. Andersen},
  title     = {SplitScreen: Enabling Efficient, Distributed Malware Detection},
  booktitle = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design
               and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA,
               {USA}},
  pages     = {377--390},
  year      = {2010},
  crossref  = {DBLP:conf/nsdi/2010},
  url       = {http://www.usenix.org/events/nsdi10/tech/full_papers/cha.pdf},
  timestamp = {Wed, 14 May 2014 19:33:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/nsdi/ChaMJTBA10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icse/2016,
  editor    = {Laura K. Dillon and
               Willem Visser and
               Laurie Williams},
  title     = {Proceedings of the 38th International Conference on Software Engineering,
               {ICSE} 2016, Austin, TX, USA, May 14-22, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2884781},
  doi       = {10.1145/2884781},
  isbn      = {978-1-4503-3900-1},
  timestamp = {Tue, 04 Apr 2017 13:20:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icse/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/2015,
  title     = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7160813},
  isbn      = {978-1-4673-6949-7},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icse/2014,
  editor    = {Pankaj Jalote and
               Lionel C. Briand and
               Andr{\'{e}} van der Hoek},
  title     = {36th International Conference on Software Engineering, {ICSE} '14,
               Hyderabad, India - May 31 - June 07, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2568225},
  isbn      = {978-1-4503-2756-5},
  timestamp = {Sun, 18 May 2014 16:02:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icse/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2014,
  editor    = {Kevin Fu and
               Jaeyeon Jung},
  title     = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014},
  publisher = {{USENIX} Association},
  year      = {2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2508859},
  isbn      = {978-1-4503-2477-9},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/2012,
  title     = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
               San Francisco, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6233637},
  isbn      = {978-0-7695-4681-0},
  timestamp = {Thu, 08 Jan 2015 16:59:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/2011,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
               2011},
  publisher = {The Internet Society},
  year      = {2011},
  url       = {http://www.isoc.org/isoc/conferences/ndss/11/},
  timestamp = {Wed, 31 Aug 2011 14:05:35 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010,
  editor    = {Ehab Al{-}Shaer and
               Angelos D. Keromytis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0245-6},
  timestamp = {Mon, 22 Nov 2010 20:51:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2010,
  title     = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design
               and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA,
               {USA}},
  publisher = {{USENIX} Association},
  year      = {2010},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A1},
  isbn      = {978-1-931971-73-7},
  timestamp = {Wed, 14 May 2014 19:33:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/nsdi/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier