Patents by Inventor Sang Kil Cha

Sang Kil Cha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240176623
    Abstract: A method for determining a binary function entry includes distinguishing a text section and an exception handling section by parsing a binary code, disassembling the text section to determine an address of an end branch instruction, an address of a direct call target, and an address of a direct jump target, determining an indirect return function call address from the addresses of the end branch instructions, determining an exception handling block address from the addresses of the end branch instructions, excluding the indirect return function call address and the exception handling block address from the addresses of the end branch instructions and determining a tail call corresponding to the binary function entry from the addresses of the direct jump targets.
    Type: Application
    Filed: July 27, 2023
    Publication date: May 30, 2024
    Applicant: Korea Advanced Institute of Science and Technology
    Inventors: Sang Kil CHA, Hyungseok KIM, Junoh LEE, Soomin KIM
  • Patent number: 11860765
    Abstract: Disclosed is a window kernel fuzzing technique utilizing type information obtained through binary static analysis. The method of fuzzing a kernel of a computer operating system performed by a fuzzing system may include the steps of: automatically inferring type information of a system call using a library file provided by the computer operating system; and performing system call fuzzing on the basis of the type information of the system call obtained through the inference.
    Type: Grant
    Filed: November 5, 2021
    Date of Patent: January 2, 2024
    Assignee: KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGY
    Inventors: Sang Kil Cha, Jaeseung Choi, Daejin Lee, Kangsu Kim
  • Publication number: 20230051654
    Abstract: Disclosed is a window kernel fuzzing technique utilizing type information obtained through binary static analysis. The method of fuzzing a kernel of a computer operating system performed by a fuzzing system may include the steps of: automatically inferring type information of a system call using a library file provided by the computer operating system; and performing system call fuzzing on the basis of the type information of the system call obtained through the inference.
    Type: Application
    Filed: November 5, 2021
    Publication date: February 16, 2023
    Inventors: Sang Kil Cha, Jaeseung Choi, Daejin Lee, Kangsu Kim
  • Publication number: 20180278635
    Abstract: Disclosed are an apparatus, a method, and a computer program by which it is determined whether a target network program generated in a software defined network is malicious by extracting a feature of a behavior graph of the target network program and applying machine learning to the behavior graph. Accordingly, a security and safety of a software defined network may be improved by detecting whether a computer program is malicious before the malware is installed.
    Type: Application
    Filed: November 13, 2017
    Publication date: September 27, 2018
    Applicant: Korea Advanced Institute of Science and Technology
    Inventors: Seungwon Shin, Chanhee Lee, Changhoon Yoon, Sang Kil Cha
  • Patent number: 9542559
    Abstract: Systems and methods for performing hybrid symbolic execution to detect exploitable bugs in binary code are described. In some example embodiments, the systems and methods determine that resources associated with an execution client performing symbolic execution of a target program are below, at, or above a threshold performance level, generate checkpoints for active executing paths of the online symbolic execution, and cause the execution client to perform symbolic execution in response to the determination that the resources are at or above the threshold performance level.
    Type: Grant
    Filed: August 17, 2015
    Date of Patent: January 10, 2017
    Assignee: Carnegie Mellon University
    Inventors: David Brumley, Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert
  • Publication number: 20160196433
    Abstract: Systems and methods for performing hybrid symbolic execution to detect exploitable bugs in binary code are described. In some example embodiments, the systems and methods determine that resources associated with an execution client performing symbolic execution of a target program are below, at, or above a threshold performance level, generate checkpoints for active executing paths of the online symbolic execution, and cause the execution client to perform symbolic execution in response to the determination that the resources are at or above the threshold performance level.
    Type: Application
    Filed: August 17, 2015
    Publication date: July 7, 2016
    Inventors: David Brumley, Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert
  • Patent number: 9183396
    Abstract: Systems and methods for performing hybrid symbolic execution to detect exploitable bugs in binary code are described. In some example embodiments, the systems and methods determine that resources associated with an execution client performing symbolic execution of a target program are below, at, or above a threshold performance level, generate checkpoints for active executing paths of the online symbolic execution, and cause the execution client to perform symbolic execution in response to the determination that the resources are at or above the threshold performance level.
    Type: Grant
    Filed: May 21, 2013
    Date of Patent: November 10, 2015
    Assignee: Carnegie Mellon University
    Inventors: David Brumley, Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert
  • Patent number: 9135405
    Abstract: A system and method for automatically generating exploits, such as exploits for target code, is described. In some implementations, the system received binary code and/or source code of a software applications, finds one or more exploitable bugs within the software application, and automatically generates exploits for the exploitable bugs.
    Type: Grant
    Filed: May 25, 2012
    Date of Patent: September 15, 2015
    Assignee: Carnegie Mellon University
    Inventors: David Brumley, Sang Kil Cha, Thanassis Avgerinos
  • Publication number: 20130312103
    Abstract: Systems and methods for performing hybrid symbolic execution to detect exploitable bugs in binary code are described. In some example embodiments, the systems and methods determine that resources associated with an execution client performing symbolic execution of a target program are below, at, or above a threshold performance level, generate checkpoints for active executing paths of the online symbolic execution, and cause the execution client to perform symbolic execution in response to the determination that the resources are at or above the threshold performance level.
    Type: Application
    Filed: May 21, 2013
    Publication date: November 21, 2013
    Applicant: Carnegie Mellon University
    Inventors: David Brumley, Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert
  • Publication number: 20130152053
    Abstract: Computer memory access monitoring and error checking systems and processes are disclosed herein. In one embodiment, a computer implemented method includes executing a computer program having a first object in a first memory location and having a value corresponding to a second memory location holding a second object. The method also includes, during a memory read from the second memory location, performing a comparison of a first version of the first memory location and a second version of the second memory location. The method further includes determining if an error exists in the computer program based on the comparison between the first version and the second version.
    Type: Application
    Filed: December 12, 2011
    Publication date: June 13, 2013
    Applicant: Microsoft Corporation
    Inventors: Weidong Cui, David Molnar, Sang Kil Cha
  • Publication number: 20120317647
    Abstract: A system and method for automatically generating exploits, such as exploits for target code, is described. In some implementations, the system received binary code and/or source code of a software applications, finds one or more exploitable bugs within the software application, and automatically generates exploits for the exploitable bugs.
    Type: Application
    Filed: May 25, 2012
    Publication date: December 13, 2012
    Applicant: CARNEGIE MELLON UNIVERSITY
    Inventors: David Brumley, Sang Kil Cha, Thanassis Avgerinos