|
Search the dblp DataBase
Chongkyung Kil:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt
Automatic diagnosis and response to memory corruption vulnerabilities. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:223-234 [Conf]
- XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi
Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf]
- Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:339-348 [Conf]
Automated Security Debugging Using Program Structural Constraints. [Citation Graph (, )][DBLP]
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. [Citation Graph (, )][DBLP]
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|