dblp.uni-trier.dewww.uni-trier.de

Chongkyung Kil

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
6EEXiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil: Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Trans. Inf. Syst. Secur. 12(2): (2008)
2007
5EEEmre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu: Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2007: 562-572
4EEChongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang: Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462
2006
3EEXiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi: Packet vaccine: black-box exploit detection and signature generation. ACM Conference on Computer and Communications Security 2006: 37-46
2EEChongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning: Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. ACSAC 2006: 339-348
2005
1EEJun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt: Automatic diagnosis and response to memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2005: 223-234

Coauthor Index

1Christopher Bookholt [1] [2]
2Jong Youl Choi [3] [6]
3Jinsuk Jun [2]
4Zhuowei Li [3] [6]
5Peng Ning [1] [2] [4] [5]
6Michael K. Reiter [3] [6]
7Emre Can Sezer [4] [5]
8XiaoFeng Wang [3] [6]
9Jun Xu [1] [2] [3] [5] [6]
10Yan Zhai [1]
11Xiaolan Zhang (Xiaolan (Catherine) Zhang) [4]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)