Director, Cyber Security Research Center (CSRC)
Associate Professor, Graduate School of Information Security and School
of Computing
Korea Advanced Institute of Science and Technology (KAIST)
Office: | #2319, N5 |
Phone: | +82-42-350-3569 |
Email: |
I am an experimental computer scientist whose research is at the intersection of computer security and software engineering. My research is mainly about building and evaluating systems that can analyze programs. I received ACM distinguished paper awards in 2014, 2020, and 2022, and I am currently leading CSRC and SoftSec Lab at KAIST.
BibTex: [bibtex], Google Scholar: [link].
[32] |
AsFuzzer: Differential Testing of Assemblers with Error-Driven Grammar InferenceHyungseok Kim, Soomin Kim, Jungwoo Lee, and Sang Kil Cha.In Proceedings of the International Symposium on Software Testing and Analysis , 2024 ( ACM Distinguished Paper Award), [pdf] |
[31] |
Evaluating Directed Fuzzers: Are We Heading in the Right Direction?Tae Eun Kim, Jaeseung Choi, Seongjae Im, Kihong Heo, and Sang Kil Cha.In Proceedings of the International Symposium on Foundations of Software Engineering , 2024, [pdf] |
[30] |
FunProbe: Probing Functions from Binary Code through Probabilistic AnalysisSoomin Kim, Hyungseok Kim, and Sang Kil Cha.In Proceedings of the International Symposium on Foundations of Software Engineering , 2023, [pdf] |
[29] |
DAFL: Directed Grey-box Fuzzing Guided by Data DependencyTae Eun Kim, Jaeseung Choi, Kihong Heo, and Sang Kil Cha.In Proceedings of the USENIX Security Symposium, 2023, [pdf] |
[28] |
BotScreen: Trust Everybody, but Cut the Aimbots YourselfMinyeop Choi, Gihyuk Ko, and Sang Kil Cha.In Proceedings of the USENIX Security Symposium, 2023 ( USENIX Distinguished Paper Award), [pdf] |
[27] |
Reassembly is Hard: A Reflection on Challenges and StrategiesHyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, and Sang Kil Cha.In Proceedings of the USENIX Security Symposium, 2023, [pdf] |
[26] |
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons LearnedDongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, and Yongdae Kim.IEEE Transactions on Software Engineering, vol. 49, no. 4, 2023 [pdf] |
[25] |
Fuzzle: Making a Puzzle for FuzzersHaeun Lee, Soomin Kim, and Sang Kil Cha.In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2022 ( ACM Distinguished Paper Award), [pdf] |
[24] |
How'd Security Benefit Reverse Engineers? — The Implication of Intel CET on Function IdentificationHyungseok Kim, Junoh Lee, Soomin Kim, Seungil Jung, and Sang Kil Cha.In Proceedings of the International Conference on Dependable Systems Networks, 2022, [pdf] |
[23] |
Smartian: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow AnalysesJaeseung Choi, Doyeon Kim, Soomin Kim, Gustavo Grieco, Alex Groce, and Sang Kil Cha.In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2021, [pdf] |
[22] |
NTFuzz: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary AnalysisJaeseung Choi, Kangsu Kim, Daejin Lee, and Sang Kil Cha.In Proceedings of the IEEE Symposium on Security and Privacy, 2021, [pdf] |
[21] |
The Art, Science, and Engineering of Fuzzing: A SurveyValentin Jean Marie Manès, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J. Schwartz, and Maverick Woo.IEEE Transactions on Software Engineering, vol. 47, no. 11, 2021 ( Best Paper Award), [pdf] |
[20] |
Boosting Fuzzer Efficiency: An Information Theoretic PerspectiveMarcel Böhme, Valentin Jean Marie Manès, and Sang Kil Cha.In Proceedings of the International Symposium on Foundations of Software Engineering , 2020 ( ACM Distinguished Paper Award), [pdf] |
[19] |
Ankou: Guiding Grey-box Fuzzing towards Combinatorial DifferenceValentin Jean Marie Manès, Soomin Kim, and Sang Kil Cha.In Proceedings of the International Conference on Software Engineering , 2020, [pdf] |
[18] |
Montage: A Neural Network Language Model-Guided JavaScript Engine FuzzerSuyoung Lee, HyungSeok Han, Sang Kil Cha, and Sooel Son.In Proceedings of the USENIX Security Symposium, 2020, [pdf] |
[17] |
Grey-box Concolic Testing on Binary CodeJaeseung Choi, Joonun Jang, Choongwoo Han, and Sang Kil Cha.In Proceedings of the International Conference on Software Engineering , 2019, [pdf] |
[16] |
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript EnginesHyungSeok Han, DongHyeon Oh, and Sang Kil Cha.In Proceedings of the Network and Distributed System Security Symposium, 2019, [pdf] |
[15] |
B2R2: Building an Efficient Front-End for Binary AnalysisMinkyu Jung, Soomin Kim, HyungSeok Han, Jaeseung Choi, and Sang Kil Cha.In Proceedings of the NDSS Workshop on Binary Analysis Research, 2019 ( Best Paper Award), [pdf] |
[14] |
Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security CompetitionSeongIl Wi, Jaeseung Choi, and Sang Kil Cha.In Proceedings of the USENIX Workshop on Advances in Security Education, 2018, [pdf] |
[13] |
IMF: Inferred Model-based FuzzerHyungSeok Han and Sang Kil Cha.In Proceedings of the ACM Conference on Computer and Communications Security, 2017, [pdf] |
[12] |
Testing Intermediate Representations for Binary AnalysisSoomin Kim, Markus Faerevaag, Minkyu Jung, Seungil Jung, DongYeop Oh, JongHyup Lee, and Sang Kil Cha.In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2017, [pdf] |
[11] |
RETracer: Triaging Crashes by Reverse Execution from Partial Memory DumpsWeidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, and Vasileios P. Kemerlis.In Proceedings of the International Conference on Software Engineering, 2016, [pdf] |
[10] |
Towards Resource-Aware Security Testing of SoftwareSang Kil Cha.Ph.D. Thesis, Carnegie Mellon University, 2015 |
[9] |
Program-Adaptive Mutational FuzzingSang Kil Cha, Maverick Woo, and David Brumley.In Proceedings of the IEEE Symposium on Security and Privacy, 2015, [pdf] |
[8] |
Optimizing Seed Selection for FuzzingAlexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley.In Proceedings of the USENIX Security Symposium, 2014, [pdf] |
[7] |
Enhancing Symbolic Execution with VeritestingThanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley.In Proceedings of the International Conference on Software Engineering, 2014 ( ACM Distinguished Paper Award), [pdf] |
[6] |
Automatic Exploit GenerationThanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumley.Communications of the ACM, 2014 |
[5] |
Scheduling Black-box Mutational FuzzingMaverick Woo, Sang Kil Cha, Samantha Gottlieb, and David Brumley.In Proceedings of the ACM Conference on Computer and Communications Security, 2013, [pdf] |
[4] |
Unleashing Mayhem on Binary CodeSang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, and David Brumley.In Proceedings of the IEEE Symposium on Security and Privacy, 2012, [pdf] |
[3] |
AEG: Automatic Exploit GenerationThanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley.In Proceedings of the Network and Distributed System Security Symposium, 2011, [pdf] |
[2] |
Platform-Independent ProgramsSang Kil Cha, Brian Pak, David Brumley, and Richard J. Lipton.In Proceedings of the ACM Conference on Computer and Communications Security, 2010, [pdf] |
[1] |
SplitScreen: Enabling Efficient, Distributed Malware DetectionSang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen.In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation, 2010, [pdf] |