Sang Kil Cha

Assistant Professor
Graduate School of Information Security, School of Computing
Korea Advanced Institute of Science and Technology (KAIST)

Office: #2319, N5
Phone: +82-42-350-3569
Email:

 

Misc: CVPGP KeyGitHubDBLP

 

 

About Me

I am currently leading SoftSec Lab in KAIST. My current research interests revolve mainly around software security, software engineering, software systems, and program analysis. I received an ACM distinguished paper award in 2014. I am also one of the founders of Plaid Parliament of Pwning, the hacking team at CMU.

 

Teaching

  • (IS-561) Binary Code Analysis and Secure Software Systems: 2016S 2017F
  • (IS-893) Advanced Software Security: 2016F
  • (IS-511) Introduction to Information Security: 2017S
  • (IS-521) Information Security Laboratory: 2017S

 

Selected Publications

BibTex: [bibtex], Google Scholar: [link].

 

[13]

IMF: Inferred Model-based Fuzzer

HyungSeok Han and Sang Kil Cha.
In Proceedings of the ACM Conference on Computer and Communications Security, 2017, [pdf]
 
[12]

Testing Intermediate Representations for Binary Analysis

Soomin Kim, Markus Faerevaag, Minkyu Jung, Seungil Jung, DongYeop Oh, JongHyup Lee, and Sang Kil Cha.
In Proceedings of the IEEE/ACM International Conference On Automated Software Engineering, 2017, [pdf]
 
[11]

RETracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps

Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, and Vasileios P. Kemerlis.
In Proceedings of the International Conference on Software Engineering, 2016, [pdf]
 
[10]

Towards Resource-Aware Security Testing of Software

Sang Kil Cha.
Ph.D. Thesis, Carnegie Mellon University, 2015
 
[9]

Program-Adaptive Mutational Fuzzing

Sang Kil Cha, Maverick Woo, and David Brumley.
In Proceedings of the IEEE Symposium on Security and Privacy, 2015, [pdf]
 
[8]

Optimizing Seed Selection for Fuzzing

Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley.
In Proceedings of the USENIX Security Symposium, 2014, [pdf]
 
[7]

Enhancing Symbolic Execution with Veritesting

Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley.
In Proceedings of the International Conference on Software Engineering, 2014 (ACM Distinguished Paper Award), [pdf]
 
[6]

Automatic Exploit Generation

Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumley.
Communications of the ACM, 2014
 
[5]

Scheduling Black-box Mutational Fuzzing

Maverick Woo, Sang Kil Cha, Samantha Gottlieb, and David Brumley.
In Proceedings of the ACM Conference on Computer and Communications Security, 2013, [pdf]
 
[4]

Unleashing Mayhem on Binary Code

Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, and David Brumley.
In Proceedings of the IEEE Symposium on Security and Privacy, 2012, [pdf]
 
[3]

AEG: Automatic Exploit Generation

Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley.
In Proceedings of the Network and Distributed System Security Symposium, 2011, [pdf]
 
[2]

Platform-Independent Programs

Sang Kil Cha, Brian Pak, David Brumley, and Richard J. Lipton.
In Proceedings of the ACM Conference on Computer and Communications Security, 2010, [pdf]
 
[1]

SplitScreen: Enabling Efficient, Distributed Malware Detection

Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen.
In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation, 2010, [pdf]