BibTeX records: Sang Kil Cha

download as .bib file

@article{DBLP:journals/cacm/ChaL20,
  author    = {Sang Kil Cha and
               Zhenkai Liang},
  title     = {Asia's surging interest in binary analysis},
  journal   = {Commun. {ACM}},
  volume    = {63},
  number    = {4},
  pages     = {86--88},
  year      = {2020},
  url       = {https://doi.org/10.1145/3378424},
  doi       = {10.1145/3378424},
  timestamp = {Fri, 17 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/cacm/ChaL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-04107,
  author    = {Suyoung Lee and
               HyungSeok Han and
               Sang Kil Cha and
               Sooel Son},
  title     = {Montage: {A} Neural Network Language Model-Guided JavaScript Engine
               Fuzzer},
  journal   = {CoRR},
  volume    = {abs/2001.04107},
  year      = {2020},
  url       = {https://arxiv.org/abs/2001.04107},
  archivePrefix = {arXiv},
  eprint    = {2001.04107},
  timestamp = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2001-04107.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/0002JHC19,
  author    = {Jaeseung Choi and
               Joonun Jang and
               Choongwoo Han and
               Sang Kil Cha},
  editor    = {Joanne M. Atlee and
               Tevfik Bultan and
               Jon Whittle},
  title     = {Grey-box concolic testing on binary code},
  booktitle = {Proceedings of the 41st International Conference on Software Engineering,
               {ICSE} 2019, Montreal, QC, Canada, May 25-31, 2019},
  pages     = {736--747},
  publisher = {{IEEE} / {ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1109/ICSE.2019.00082},
  doi       = {10.1109/ICSE.2019.00082},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/icse/0002JHC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HanOC19,
  author    = {HyungSeok Han and
               DongHyeon Oh and
               Sang Kil Cha},
  title     = {CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities
               in JavaScript Engines},
  booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS}
               2019, San Diego, California, USA, February 24-27, 2019},
  publisher = {The Internet Society},
  year      = {2019},
  url       = {https://www.ndss-symposium.org/ndss-paper/codealchemist-semantics-aware-code-generation-to-find-vulnerabilities-in-javascript-engines/},
  timestamp = {Thu, 02 May 2019 15:52:21 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/HanOC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/LeeYSC18,
  author    = {Chanhee Lee and
               Changhoon Yoon and
               Seungwon Shin and
               Sang Kil Cha},
  title     = {{INDAGO:} {A} New Framework For Detecting Malicious {SDN} Applications},
  booktitle = {2018 {IEEE} 26th International Conference on Network Protocols, {ICNP}
               2018, Cambridge, UK, September 25-27, 2018},
  pages     = {220--230},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {https://doi.org/10.1109/ICNP.2018.00031},
  doi       = {10.1109/ICNP.2018.00031},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/conf/icnp/LeeYSC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WiCC18,
  author    = {SeongIl Wi and
               Jaeseung Choi and
               Sang Kil Cha},
  editor    = {Wu{-}chang Feng and
               Ashley L. Podhradsky},
  title     = {Git-based {CTF:} {A} Simple and Effective Approach to Organizing In-Course
               Attack-and-Defense Security Competition},
  booktitle = {2018 {USENIX} Workshop on Advances in Security Education, {ASE} 2018,
               Baltimore, MD, USA, August 13, 2018},
  publisher = {{USENIX} Association},
  year      = {2018},
  url       = {https://www.usenix.org/conference/ase18/presentation/wi},
  timestamp = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/uss/WiCC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongLLCCC18,
  author    = {Jina Hong and
               JinKi Lee and
               HyunKyu Lee and
               YoonHa Chang and
               KwangHo Choi and
               Sang Kil Cha},
  editor    = {Brent ByungHoon Kang and
               Jin Soo Jang},
  title     = {AlertVision: Visualizing Security Alerts},
  booktitle = {Information Security Applications - 19th International Conference,
               {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11402},
  pages     = {173--184},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-17982-3\_14},
  doi       = {10.1007/978-3-030-17982-3\_14},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/conf/wisa/HongLLCCC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-00140,
  author    = {Valentin J. M. Man{\`{e}}s and
               HyungSeok Han and
               Choongwoo Han and
               Sang Kil Cha and
               Manuel Egele and
               Edward J. Schwartz and
               Maverick Woo},
  title     = {Fuzzing: Art, Science, and Engineering},
  journal   = {CoRR},
  volume    = {abs/1812.00140},
  year      = {2018},
  url       = {http://arxiv.org/abs/1812.00140},
  archivePrefix = {arXiv},
  eprint    = {1812.00140},
  timestamp = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1812-00140.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HanC17,
  author    = {HyungSeok Han and
               Sang Kil Cha},
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {{IMF:} Inferred Model-based Fuzzer},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {2345--2358},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956.3134103},
  doi       = {10.1145/3133956.3134103},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/HanC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/KimFJJOLC17,
  author    = {Soomin Kim and
               Markus Faerevaag and
               Minkyu Jung and
               SeungIl Jung and
               DongYeop Oh and
               JongHyup Lee and
               Sang Kil Cha},
  editor    = {Grigore Rosu and
               Massimiliano Di Penta and
               Tien N. Nguyen},
  title     = {Testing intermediate representations for binary analysis},
  booktitle = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated
               Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November
               03, 2017},
  pages     = {353--364},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {https://doi.org/10.1109/ASE.2017.8115648},
  doi       = {10.1109/ASE.2017.8115648},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/kbse/KimFJJOLC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AvgerinosRCB16,
  author    = {Thanassis Avgerinos and
               Alexandre Rebert and
               Sang Kil Cha and
               David Brumley},
  title     = {Enhancing symbolic execution with veritesting},
  journal   = {Commun. {ACM}},
  volume    = {59},
  number    = {6},
  pages     = {93--100},
  year      = {2016},
  url       = {https://doi.org/10.1145/2927924},
  doi       = {10.1145/2927924},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cacm/AvgerinosRCB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/CuiPCFK16,
  author    = {Weidong Cui and
               Marcus Peinado and
               Sang Kil Cha and
               Yanick Fratantonio and
               Vasileios P. Kemerlis},
  editor    = {Laura K. Dillon and
               Willem Visser and
               Laurie Williams},
  title     = {RETracer: triaging crashes by reverse execution from partial memory
               dumps},
  booktitle = {Proceedings of the 38th International Conference on Software Engineering,
               {ICSE} 2016, Austin, TX, USA, May 14-22, 2016},
  pages     = {820--831},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2884781.2884844},
  doi       = {10.1145/2884781.2884844},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/icse/CuiPCFK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChaWB15,
  author    = {Sang Kil Cha and
               Maverick Woo and
               David Brumley},
  title     = {Program-Adaptive Mutational Fuzzing},
  booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  pages     = {725--741},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://doi.org/10.1109/SP.2015.50},
  doi       = {10.1109/SP.2015.50},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/ChaWB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AvgerinosCRSWB14,
  author    = {Thanassis Avgerinos and
               Sang Kil Cha and
               Alexandre Rebert and
               Edward J. Schwartz and
               Maverick Woo and
               David Brumley},
  title     = {Automatic exploit generation},
  journal   = {Commun. {ACM}},
  volume    = {57},
  number    = {2},
  pages     = {74--84},
  year      = {2014},
  url       = {https://doi.org/10.1145/2560217.2560219},
  doi       = {10.1145/2560217.2560219},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cacm/AvgerinosCRSWB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/AvgerinosRCB14,
  author    = {Thanassis Avgerinos and
               Alexandre Rebert and
               Sang Kil Cha and
               David Brumley},
  editor    = {Pankaj Jalote and
               Lionel C. Briand and
               Andr{\'{e}} van der Hoek},
  title     = {Enhancing symbolic execution with veritesting},
  booktitle = {36th International Conference on Software Engineering, {ICSE} '14,
               Hyderabad, India - May 31 - June 07, 2014},
  pages     = {1083--1094},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2568225.2568293},
  doi       = {10.1145/2568225.2568293},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/icse/AvgerinosRCB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RebertCAFWGB14,
  author    = {Alexandre Rebert and
               Sang Kil Cha and
               Thanassis Avgerinos and
               Jonathan Foote and
               David Warren and
               Gustavo Grieco and
               David Brumley},
  editor    = {Kevin Fu and
               Jaeyeon Jung},
  title     = {Optimizing Seed Selection for Fuzzing},
  booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014},
  pages     = {861--875},
  publisher = {{USENIX} Association},
  year      = {2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/rebert},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {https://dblp.org/rec/conf/uss/RebertCAFWGB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WooCGB13,
  author    = {Maverick Woo and
               Sang Kil Cha and
               Samantha Gottlieb and
               David Brumley},
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {Scheduling black-box mutational fuzzing},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {511--522},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2508859.2516736},
  doi       = {10.1145/2508859.2516736},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/WooCGB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChaARB12,
  author    = {Sang Kil Cha and
               Thanassis Avgerinos and
               Alexandre Rebert and
               David Brumley},
  title     = {Unleashing Mayhem on Binary Code},
  booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
               San Francisco, California, {USA}},
  pages     = {380--394},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://doi.org/10.1109/SP.2012.31},
  doi       = {10.1109/SP.2012.31},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/ChaARB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/ChaMJTBA11,
  author    = {Sang Kil Cha and
               Iulian Moraru and
               Jiyong Jang and
               John Truelove and
               David Brumley and
               David G. Andersen},
  title     = {SplitScreen: Enabling efficient, distributed malware detection},
  journal   = {J. Commun. Networks},
  volume    = {13},
  number    = {2},
  pages     = {187--200},
  year      = {2011},
  url       = {https://doi.org/10.1109/JCN.2011.6157418},
  doi       = {10.1109/JCN.2011.6157418},
  timestamp = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcn/ChaMJTBA11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AvgerinosCHB11,
  author    = {Thanassis Avgerinos and
               Sang Kil Cha and
               Brent Lim Tze Hao and
               David Brumley},
  title     = {{AEG:} Automatic Exploit Generation},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
               2011},
  publisher = {The Internet Society},
  year      = {2011},
  url       = {https://www.ndss-symposium.org/ndss2011/aeg-automatic-exploit-generation},
  timestamp = {Wed, 16 Oct 2019 16:49:08 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/AvgerinosCHB11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChaPBL10,
  author    = {Sang Kil Cha and
               Brian Pak and
               David Brumley and
               Richard Jay Lipton},
  editor    = {Ehab Al{-}Shaer and
               Angelos D. Keromytis and
               Vitaly Shmatikov},
  title     = {Platform-independent programs},
  booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages     = {547--558},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/1866307.1866369},
  doi       = {10.1145/1866307.1866369},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/ChaPBL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/ChaMJTBA10,
  author    = {Sang Kil Cha and
               Iulian Moraru and
               Jiyong Jang and
               John Truelove and
               David Brumley and
               David G. Andersen},
  title     = {SplitScreen: Enabling Efficient, Distributed Malware Detection},
  booktitle = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design
               and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA,
               {USA}},
  pages     = {377--390},
  publisher = {{USENIX} Association},
  year      = {2010},
  url       = {http://www.usenix.org/events/nsdi10/tech/full\_papers/cha.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/nsdi/ChaMJTBA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics