Min Gyung Kang
Min Gyung Kang
Dirección de correo verificada de google.com
Citado por
Citado por
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
International Conference on Information Systems Security, 1-25, 2008
Renovo: A hidden code extractor for packed executables
MG Kang, P Poosankam, H Yin
Proceedings of the 2007 ACM workshop on Recurring malcode, 46-53, 2007
Dta++: dynamic taint analysis with targeted control-flow propagation.
MG Kang, S McCamant, P Poosankam, D Song
NDSS, 2011
Emulating emulation-resistant malware
MG Kang, H Yin, S Hanna, S McCamant, D Song
Proceedings of the 1st ACM workshop on Virtual machine security, 11-22, 2009
BitScope: Automatically dissecting malicious binaries
D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ...
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007
FiG: Automatic fingerprint generation
J Caballero, S Venkataraman, P Poosankam, MG Kang, D Song, A Blum
Carnegie Mellon University, 2007
Distributed evasive scan techniques and countermeasures
MG Kang, J Caballero, D Song
International Conference on Detection of Intrusions and Malware, and …, 2007
Crash analysis with BitBlaze
C Miller, J Caballero, NM Johnson, MG Kang, S McCamant, ...
at BlackHat USA, 2010
BitBlaze: Binary analysis for computer security
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Advanced binary analysis techniques for malware defense
MG Kang
Carnegie Mellon University, 2010
Challenges in Building an Internet-Wide Monitoring Infrastructure for Network Security
MG Kang, S Moon
MalSolver: In-depth Malware Analysis through Layered Symbolic Execution
H Yin, C Hartwig, MG Kang, D Song
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–12