Showing results 1 to 7 of 7
AEG: Automatic Exploit Generation Avgerinos, Thanassis; Cha, Sang Kil; Lim, Brent; Brumley, David, Network and Distributed System Security Symposium, Internet Society, 2011-02-06 |
Enhancing Symbolic Execution with Veritesting Avgerinos, Thanassis; Rebert, Alexandre; Cha, Sang Kil; Brumley, David, International Conference on Software Engineering, IEEE Computer Society and ACM SIGSOFT, 2014-06-06 |
Platform-Independent Programs Cha, Sang Kil; Pak, Brian; Brumley, David; Lipton, Richard J, ACM Conference on Computer and Communications Security, ACM, 2010-10-07 |
RecurFI: 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템 홍진아; Cha, Sang Kil; Kim, Kwangjo, 정보보호학회 동계학술대회, 한국정보보호학회, 2016-12-03 |
Scheduling Black-box Mutational Fuzzing Woo, Maverick; Cha, Sang Kil; Gottlieb, Samantha; Brumley, David, ACM Conference on Computer and Communications Security, ACM, 2013-11-06 |
SplitScreen: Enabling Efficient, Distributed Malware Detection Cha, Sang Kil; Moraru, Iulian; Jang, Ji Yong; Truelove, John; Brumley, David; Andersen, David G, USENIX Symposium on Networked Systems Design and Implementation, USENIX, 2010-04-30 |
Unleashing Mayhem on Binary Code Cha, Sang Kil; Avgerinos, Thanassis; Rebert, Alexandre; Brumley, David, IEEE Symposium on Security and Privacy, IEEE, 2012-05-02 |
Discover