default search action
Sang Kil Cha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Tae Eun Kim, Jaeseung Choi, Seongjae Im, Kihong Heo, Sang Kil Cha:
Evaluating Directed Fuzzers: Are We Heading in the Right Direction? Proc. ACM Softw. Eng. 1(FSE): 316-337 (2024) - [c30]Hyungseok Kim, Soomin Kim, Jungwoo Lee, Sang Kil Cha:
AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar Inference. ISSTA 2024: 1099-1111 - [c29]Jung Hyun Kim, Steve Gustaman, Sang Kil Cha:
PoE: A Domain-Specific Language for Exploitation. SVCC 2024: 1-6 - 2023
- [j8]Marcel Böhme, Valentin J. M. Manès, Sang Kil Cha:
Boosting Fuzzer Efficiency: An Information Theoretic Perspective. Commun. ACM 66(11): 89-97 (2023) - [j7]Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim:
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned. IEEE Trans. Software Eng. 49(4): 1661-1682 (2023) - [c28]Haeun Lee, Hee Dong Yang, Su Geun Ji, Sang Kil Cha:
On the Effectiveness of Synthetic Benchmarks for Evaluating Directed Grey-Box Fuzzers. APSEC 2023: 11-20 - [c27]Soomin Kim, Hyungseok Kim, Sang Kil Cha:
FunProbe: Probing Functions from Binary Code through Probabilistic Analysis. ESEC/SIGSOFT FSE 2023: 1419-1430 - [c26]Minyeop Choi, Gihyuk Ko, Sang Kil Cha:
BotScreen: Trust Everybody, but Cut the Aimbots Yourself. USENIX Security Symposium 2023: 481-498 - [c25]Hyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, Sang Kil Cha:
Reassembly is Hard: A Reflection on Challenges and Strategies. USENIX Security Symposium 2023: 1469-1486 - [c24]Tae Eun Kim, Jaeseung Choi, Kihong Heo, Sang Kil Cha:
DAFL: Directed Grey-box Fuzzing guided by Data Dependency. USENIX Security Symposium 2023: 4931-4948 - 2022
- [c23]Hyungseok Kim, Junoh Lee, Soomin Kim, Seungil Jung, Sang Kil Cha:
How'd Security Benefit Reverse Engineers? : The Implication of Intel CET on Function Identification. DSN 2022: 559-566 - [c22]Haeun Lee, Soomin Kim, Sang Kil Cha:
Fuzzle: Making a Puzzle for Fuzzers. ASE 2022: 45:1-45:12 - 2021
- [j6]Sang-Ok Park, Ohmin Kwon, Yonggon Kim, Sang Kil Cha, Hyunsoo Yoon:
Mind control attack: Undermining deep learning with GPU memory exploitation. Comput. Secur. 102: 102115 (2021) - [j5]Valentin J. M. Manès, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J. Schwartz, Maverick Woo:
The Art, Science, and Engineering of Fuzzing: A Survey. IEEE Trans. Software Eng. 47(11): 2312-2331 (2021) - [c21]Jaeseung Choi, Doyeon Kim, Soomin Kim, Gustavo Grieco, Alex Groce, Sang Kil Cha:
SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses. ASE 2021: 227-239 - [c20]Jaeseung Choi, Kangsu Kim, Daejin Lee, Sang Kil Cha:
NtFuzz: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis. SP 2021: 677-693 - 2020
- [j4]Sang Kil Cha, Zhenkai Liang:
Asia's surging interest in binary analysis. Commun. ACM 63(4): 86-88 (2020) - [c19]Valentin J. M. Manès, Soomin Kim, Sang Kil Cha:
Ankou: guiding grey-box fuzzing towards combinatorial difference. ICSE 2020: 1024-1036 - [c18]Marcel Böhme, Valentin J. M. Manès, Sang Kil Cha:
Boosting fuzzer efficiency: an information theoretic perspective. ESEC/SIGSOFT FSE 2020: 678-689 - [c17]Suyoung Lee, HyungSeok Han, Sang Kil Cha, Sooel Son:
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer. USENIX Security Symposium 2020: 2613-2630 - [i3]Suyoung Lee, HyungSeok Han, Sang Kil Cha, Sooel Son:
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer. CoRR abs/2001.04107 (2020) - [i2]Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim:
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned. CoRR abs/2011.10749 (2020)
2010 – 2019
- 2019
- [c16]Jaeseung Choi, Joonun Jang, Choongwoo Han, Sang Kil Cha:
Grey-box concolic testing on binary code. ICSE 2019: 736-747 - [c15]HyungSeok Han, DongHyeon Oh, Sang Kil Cha:
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines. NDSS 2019 - 2018
- [c14]Chanhee Lee, Changhoon Yoon, Seungwon Shin, Sang Kil Cha:
INDAGO: A New Framework For Detecting Malicious SDN Applications. ICNP 2018: 220-230 - [c13]SeongIl Wi, Jaeseung Choi, Sang Kil Cha:
Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition. ASE @ USENIX Security Symposium 2018 - [c12]Jina Hong, JinKi Lee, HyunKyu Lee, YoonHa Chang, KwangHo Choi, Sang Kil Cha:
AlertVision: Visualizing Security Alerts. WISA 2018: 173-184 - [i1]Valentin J. M. Manès, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J. Schwartz, Maverick Woo:
Fuzzing: Art, Science, and Engineering. CoRR abs/1812.00140 (2018) - 2017
- [c11]HyungSeok Han, Sang Kil Cha:
IMF: Inferred Model-based Fuzzer. CCS 2017: 2345-2358 - [c10]Soomin Kim, Markus Faerevaag, Minkyu Jung, Seungil Jung, DongYeop Oh, JongHyup Lee, Sang Kil Cha:
Testing intermediate representations for binary analysis. ASE 2017: 353-364 - 2016
- [j3]Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley:
Enhancing symbolic execution with veritesting. Commun. ACM 59(6): 93-100 (2016) - [c9]Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, Vasileios P. Kemerlis:
RETracer: triaging crashes by reverse execution from partial memory dumps. ICSE 2016: 820-831 - 2015
- [c8]Sang Kil Cha, Maverick Woo, David Brumley:
Program-Adaptive Mutational Fuzzing. IEEE Symposium on Security and Privacy 2015: 725-741 - 2014
- [j2]Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley:
Automatic exploit generation. Commun. ACM 57(2): 74-84 (2014) - [c7]Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley:
Enhancing symbolic execution with veritesting. ICSE 2014: 1083-1094 - [c6]Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley:
Optimizing Seed Selection for Fuzzing. USENIX Security Symposium 2014: 861-875 - 2013
- [c5]Maverick Woo, Sang Kil Cha, Samantha Gottlieb, David Brumley:
Scheduling black-box mutational fuzzing. CCS 2013: 511-522 - 2012
- [c4]Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, David Brumley:
Unleashing Mayhem on Binary Code. IEEE Symposium on Security and Privacy 2012: 380-394 - 2011
- [j1]Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, David G. Andersen:
SplitScreen: Enabling efficient, distributed malware detection. J. Commun. Networks 13(2): 187-200 (2011) - [c3]Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley:
AEG: Automatic Exploit Generation. NDSS 2011 - 2010
- [c2]Sang Kil Cha, Brian Pak, David Brumley, Richard Jay Lipton:
Platform-independent programs. CCS 2010: 547-558 - [c1]Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, David G. Andersen:
SplitScreen: Enabling Efficient, Distributed Malware Detection. NSDI 2010: 377-390
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint