Curriculum Vitae (in PDF)
Carnegie Mellon University, Pittsburgh, PA (expected 2015)
Carnegie Mellon University, Pittsburgh, PA
Korea University, Seoul, Korea
Software security; systems security; software engineering; program analysis.
ICSE, Hyderabad, India
CCS, Berlin, Germany
Carnegie Mellon University, Pittsburgh, PA
CCS, Chicago, IL
Korean Computer Scientists and Engineers Association in America, Vienna, VA
Korea University, Seoul, Korea
[1] | Sang Kil Cha, Maverick Woo, and David Brumley. Program-Adaptive Mutational Fuzzing. In Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P), 2015 |
[2] | Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, and David Brumley. Optimizing Seed Selection for Fuzzing. In Proceedings of the USENIX Security Symposium (USENIX Security), pages 861–875, 2014. |
[3] | Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley. Enhancing Symbolic Execution with Veritesting. In Proceedings of the International Conference on Software Engineering (ICSE), pages 1083–1094, 2014. ACM Distinguished Paper Award |
[4] | Maverick Woo, Sang Kil Cha, Samantha Gottlieb, and David Brumley. Scheduling Black-box Mutational Fuzzing. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages 511–522, 2013. |
[5] | Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, and David Brumley. Unleashing Mayhem on Binary Code. In Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P), pages 380–394, 2012. |
[6] | Thanassis Avgerinos, Sang Kil Cha, Brent L.T. Hao, and David Brumley. AEG: Automatic Exploit Generation. In Proceedings of the Network and Distributed System Security Symposium (NDSS), pages 283–300, 2011. |
[7] | Sang Kil Cha, Brian Pak, David Brumley, and Richard J. Lipton. Platform-Independent Programs. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages 547–558, 2010. |
[8] | Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen. SplitScreen: Enabling Efficient, Distributed Malware Detection. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), pages 377–390, 2010. |
[9] | Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumley. Automatic Exploit Generation. Communications of the ACM (CACM), 57(2):74–84, 2014. |
[10] | Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen. SplitScreen: Enabling Efficient, Distributed Malware Detection. Journal of Communications and Networks, 13(2):187–200, 2011. |
[11] | David Brumley, Sang Kil Cha, Thanassis Avgerinos, and Alexandre Rebert. Detecting Exploitable Bugs in Binary Code. Patent App. US 20130312103, 2013. |
[12] | Weidong Cui, David Molnar, and Sang Kil Cha. Computer Memory Access Monitoring and Error Checking. Patent App. US 20130152053, 2013. |
[13] | David Brumley, Thanassis Avgerinos, and Sang Kil Cha. Automated Exploit Generation. Patent App. US 20120317647, 2012. |
Vulnerability, Defense Systems, and Malware Analysis
Carnegie Mellon University, Pittsburgh, PA
Worked with professor David Brumley
Introduction to Reversing and Offensive Computing
Korea University, Seoul, Korea
BK21 Short-Course Lecture on Software (12/27–12/31, 2010)
Introduction to Computer and Network Security and Applied Cryptography
Carnegie Mellon University, Pittsburgh, PA
Worked with professor David Brumley
Mechatronic Design
Carnegie Mellon University, Pittsburgh, PA
Worked with Professor Charles Neuman and John Dolan
Data Structure & Algorithm
Korea University, Seoul, Korea
Gave lectures to undergraduate peers for a semester
Internet Programming
Korea University, Seoul, Korea
Gave lectures to undergraduate peers for a semester
Microsoft Research, Redmond, WA
Worked with Weidong Cui and Marcus Peinado
Microsoft Research, Redmond, WA
Worked with David Molnar and Weidong Cui
Carnegie Mellon University, Pittsburgh, PA
Worked with professor David Brumley
Office of Education, SeongNam, Korea
Worked at the office of education as part of Korean military duty
International Workshop on Information Security Applications (WISA) 2013, 2014
2 papers in IEEE Transactions on Information Forensics & Security
1 paper in Journal of Computer Virology and Hacking Techniques
1 paper in KSII Transaction on Internet and Information Systems
ACM CCS 2013
ACSAC 2013
ASIACCS 2010, 2011
IEEE S&P 2011, 2012, 2013
NDSS 2014
USENIX ATC 2014
with Plaid Parliament of Pwning (PPP)
2011, 7th place at Defcon 19 Final
2010, 1st place at 9th HUST Hacking Festival
2010, 1st place at RootedCon CTF
2010, 1st place at 8th HUST Hacking Festival
2009, 4th place at iCTF
2009, 3rd place at HackJam
Plaid Parliament of Pwning (PPP), Carnegie Mellon University, Pittsburgh, PA.
Polytechnic Institute of New York University, New York, NY.
USENIX Security, San Diego, CA
KAIST Seminar, Daejeon, Korea
Security Workshop, Sejong University, Seoul, Korea
Korea University Seminar, Seoul, Korea
IEEE S&P, San Francisco, CA
Microsoft Research Seminar, Redmond, WA
CCS, Chicago, IL
NSDI, San Jose, CA