2008 |
6 | EE | XiaoFeng Wang,
Zhuowei Li,
Jong Youl Choi,
Jun Xu,
Michael K. Reiter,
Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
ACM Trans. Inf. Syst. Secur. 12(2): (2008) |
2007 |
5 | EE | Emre Can Sezer,
Peng Ning,
Chongkyung Kil,
Jun Xu:
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities.
ACM Conference on Computer and Communications Security 2007: 562-572 |
4 | EE | Chongkyung Kil,
Emre Can Sezer,
Peng Ning,
Xiaolan Zhang:
Automated Security Debugging Using Program Structural Constraints.
ACSAC 2007: 453-462 |
2006 |
3 | EE | XiaoFeng Wang,
Zhuowei Li,
Jun Xu,
Michael K. Reiter,
Chongkyung Kil,
Jong Youl Choi:
Packet vaccine: black-box exploit detection and signature generation.
ACM Conference on Computer and Communications Security 2006: 37-46 |
2 | EE | Chongkyung Kil,
Jinsuk Jun,
Christopher Bookholt,
Jun Xu,
Peng Ning:
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software.
ACSAC 2006: 339-348 |
2005 |
1 | EE | Jun Xu,
Peng Ning,
Chongkyung Kil,
Yan Zhai,
Christopher Bookholt:
Automatic diagnosis and response to memory corruption vulnerabilities.
ACM Conference on Computer and Communications Security 2005: 223-234 |