Sang Kil Cha / 차상길

KAIST 정보보호대학원
전산학부 조교수

Office: N5동 2319호
Phone: +82-42-350-3569
Email:

 

Misc: CVPGP KeyGitHubDBLP

 

 

소개

차상길 교수는 카네기멜론 대학교에서 2015년에 박사학위를 취득하였다. 현재 주 연구분야는 소프트웨어 보안 및 프로그램 분석이며, 최근에는 차세대 바이너리 플랫폼을 만드는 연구를 수행하고 있다. 차상길 교수는 해커이며, 그의 연구는 대개 해커의 입장에서 사물을 관찰하는 것에서부터 시작한다. 현재는 카이스트 내 해킹그룹인 KaisHack의 지도교수로 활동하고 있다. 차상길 교수는 다양한 국내외 해킹대회에서 우승을 차지하였을 뿐 아니라, 2014년에는 바이너리 분석을 통한 취약점 탐지에 관한 논문으로 ACM distinguished paper award를 수상한 바 있다.

 

수업

  • (IS-561) 바이너리 코드 분석과 소프트웨어 보안 2016S 2017F 2018F
  • (IS-893) 고급 소프트웨어 보안: 2016F
  • (IS-511) 정보보호론: 2017S 2018S
  • (IS-521) 정보보호 실습: 2017S 2018S

 

주요 논문 목록

BibTex: [bibtex], Google Scholar: [link].

 

[14]

Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition

SeongIl Wi, Jaeseung Choi, and Sang Kil Cha.
In Proceedings of the USENIX Workshop on Advances in Security Education, 2018, [pdf]
 
[13]

IMF: Inferred Model-based Fuzzer

HyungSeok Han and Sang Kil Cha.
In Proceedings of the ACM Conference on Computer and Communications Security, 2017, [pdf]
 
[12]

Testing Intermediate Representations for Binary Analysis

Soomin Kim, Markus Faerevaag, Minkyu Jung, Seungil Jung, DongYeop Oh, JongHyup Lee, and Sang Kil Cha.
In Proceedings of the IEEE/ACM International Conference On Automated Software Engineering, 2017, [pdf]
 
[11]

RETracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps

Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, and Vasileios P. Kemerlis.
In Proceedings of the International Conference on Software Engineering, 2016, [pdf]
 
[10]

Towards Resource-Aware Security Testing of Software

Sang Kil Cha.
Ph.D. Thesis, Carnegie Mellon University, 2015
 
[9]

Program-Adaptive Mutational Fuzzing

Sang Kil Cha, Maverick Woo, and David Brumley.
In Proceedings of the IEEE Symposium on Security and Privacy, 2015, [pdf]
 
[8]

Optimizing Seed Selection for Fuzzing

Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley.
In Proceedings of the USENIX Security Symposium, 2014, [pdf]
 
[7]

Enhancing Symbolic Execution with Veritesting

Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley.
In Proceedings of the International Conference on Software Engineering, 2014 (ACM Distinguished Paper Award), [pdf]
 
[6]

Automatic Exploit Generation

Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumley.
Communications of the ACM, 2014
 
[5]

Scheduling Black-box Mutational Fuzzing

Maverick Woo, Sang Kil Cha, Samantha Gottlieb, and David Brumley.
In Proceedings of the ACM Conference on Computer and Communications Security, 2013, [pdf]
 
[4]

Unleashing Mayhem on Binary Code

Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, and David Brumley.
In Proceedings of the IEEE Symposium on Security and Privacy, 2012, [pdf]
 
[3]

AEG: Automatic Exploit Generation

Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley.
In Proceedings of the Network and Distributed System Security Symposium, 2011, [pdf]
 
[2]

Platform-Independent Programs

Sang Kil Cha, Brian Pak, David Brumley, and Richard J. Lipton.
In Proceedings of the ACM Conference on Computer and Communications Security, 2010, [pdf]
 
[1]

SplitScreen: Enabling Efficient, Distributed Malware Detection

Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen.
In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation, 2010, [pdf]