BibTeX records: Chongkyung Kil

download as .bib file

@incollection{DBLP:series/ais/SezerKN10,
  author       = {Emre Can Sezer and
                  Chongkyung Kil and
                  Peng Ning},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Automated Software Vulnerability Analysis},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {201--223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_10},
  doi          = {10.1007/978-1-4419-0140-8\_10},
  timestamp    = {Wed, 25 Sep 2019 17:41:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SezerKN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KilSANZ09,
  author       = {Chongkyung Kil and
                  Emre Can Sezer and
                  Ahmed M. Azab and
                  Peng Ning and
                  Xiaolan Zhang},
  title        = {Remote attestation to dynamic system properties: Towards providing
                  complete system integrity evidence},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {115--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270348},
  doi          = {10.1109/DSN.2009.5270348},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/KilSANZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangLCXRK08,
  author       = {XiaoFeng Wang and
                  Zhuowei Li and
                  Jong Youl Choi and
                  Jun Xu and
                  Michael K. Reiter and
                  Chongkyung Kil},
  title        = {Fast and Black-box Exploit Detection and Signature Generation for
                  Commodity Software},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {11:1--11:35},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455523},
  doi          = {10.1145/1455518.1455523},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangLCXRK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KilSNZ07,
  author       = {Chongkyung Kil and
                  Emre Can Sezer and
                  Peng Ning and
                  Xiaolan Zhang},
  title        = {Automated Security Debugging Using Program Structural Constraints},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {453--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.19},
  doi          = {10.1109/ACSAC.2007.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KilSNZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SezerNKX07,
  author       = {Emre Can Sezer and
                  Peng Ning and
                  Chongkyung Kil and
                  Jun Xu},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Memsherlock: an automated debugger for unknown memory corruption vulnerabilities},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {562--572},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315314},
  doi          = {10.1145/1315245.1315314},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SezerNKX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KilJBXN06,
  author       = {Chongkyung Kil and
                  Jinsuk Jun and
                  Christopher Bookholt and
                  Jun Xu and
                  Peng Ning},
  title        = {Address Space Layout Permutation {(ASLP):} Towards Fine-Grained Randomization
                  of Commodity Software},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {339--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.9},
  doi          = {10.1109/ACSAC.2006.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KilJBXN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangLXRKC06,
  author       = {XiaoFeng Wang and
                  Zhuowei Li and
                  Jun Xu and
                  Michael K. Reiter and
                  Chongkyung Kil and
                  Jong Youl Choi},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Packet vaccine: black-box exploit detection and signature generation},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {37--46},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180412},
  doi          = {10.1145/1180405.1180412},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangLXRKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuNKZB05,
  author       = {Jun Xu and
                  Peng Ning and
                  Chongkyung Kil and
                  Yan Zhai and
                  Christopher Bookholt},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Automatic diagnosis and response to memory corruption vulnerabilities},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {223--234},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102151},
  doi          = {10.1145/1102120.1102151},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XuNKZB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics