Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chongkyung Kil
@incollection{DBLP:series/ais/SezerKN10, author = {Emre Can Sezer and Chongkyung Kil and Peng Ning}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Automated Software Vulnerability Analysis}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {201--223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_10}, doi = {10.1007/978-1-4419-0140-8\_10}, timestamp = {Wed, 25 Sep 2019 17:41:05 +0200}, biburl = {https://dblp.org/rec/series/ais/SezerKN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KilSANZ09, author = {Chongkyung Kil and Emre Can Sezer and Ahmed M. Azab and Peng Ning and Xiaolan Zhang}, title = {Remote attestation to dynamic system properties: Towards providing complete system integrity evidence}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {115--124}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270348}, doi = {10.1109/DSN.2009.5270348}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/KilSANZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangLCXRK08, author = {XiaoFeng Wang and Zhuowei Li and Jong Youl Choi and Jun Xu and Michael K. Reiter and Chongkyung Kil}, title = {Fast and Black-box Exploit Detection and Signature Generation for Commodity Software}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {11:1--11:35}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455523}, doi = {10.1145/1455518.1455523}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangLCXRK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KilSNZ07, author = {Chongkyung Kil and Emre Can Sezer and Peng Ning and Xiaolan Zhang}, title = {Automated Security Debugging Using Program Structural Constraints}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {453--462}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.19}, doi = {10.1109/ACSAC.2007.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KilSNZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SezerNKX07, author = {Emre Can Sezer and Peng Ning and Chongkyung Kil and Jun Xu}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Memsherlock: an automated debugger for unknown memory corruption vulnerabilities}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {562--572}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315314}, doi = {10.1145/1315245.1315314}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SezerNKX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KilJBXN06, author = {Chongkyung Kil and Jinsuk Jun and Christopher Bookholt and Jun Xu and Peng Ning}, title = {Address Space Layout Permutation {(ASLP):} Towards Fine-Grained Randomization of Commodity Software}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {339--348}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.9}, doi = {10.1109/ACSAC.2006.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KilJBXN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangLXRKC06, author = {XiaoFeng Wang and Zhuowei Li and Jun Xu and Michael K. Reiter and Chongkyung Kil and Jong Youl Choi}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Packet vaccine: black-box exploit detection and signature generation}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {37--46}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180412}, doi = {10.1145/1180405.1180412}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangLXRKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuNKZB05, author = {Jun Xu and Peng Ning and Chongkyung Kil and Yan Zhai and Christopher Bookholt}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Automatic diagnosis and response to memory corruption vulnerabilities}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {223--234}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102151}, doi = {10.1145/1102120.1102151}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XuNKZB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.