Sung Deok Cha

According to our database1, Sung Deok Cha
  • authored at least 76 papers between 1995 and 2017.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 




Data-driven context-sensitivity for points-to analysis.
PACMPL, 2017

CAPTCHA-based image annotation.
Inf. Process. Lett., 2017

A Paradigm Shift for the CAPTCHA Race: Adding Uncertainty to the Process.
IEEE Software, 2016

An efficient approach to identify multiple and independent Move Method refactoring candidates.
Information & Software Technology, 2015

Generating various contexts from permissions for testing Android applications.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

Automated test case generation for FBD programs implementing reactor protection system software.
Softw. Test., Verif. Reliab., 2014

PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors.
IEICE Transactions, 2013

Automatic and lightweight grammar generation for fuzz testing.
Computers & Security, 2013

A quantitative approach to estimate a website security risk using whitelist.
Security and Communication Networks, 2012

Threat scenario-based security risk analysis using use case modeling in information systems.
Security and Communication Networks, 2012

Web robot detection based on pattern-matching technique.
J. Information Science, 2012

ASA: Agent-based secure ARP cache management.
IET Communications, 2012

A safety-focused verification using software fault trees.
Future Generation Comp. Syst., 2012

FBDtoVerilog: A Vendor-Independent Translation from FBDs into Verilog Programs.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

Testing of Safety-Critical Software Embedded in an Artificial Heart.
Proceedings of the Advances in Systems Safety, 2011

Formal Verification of DEV&DESS Formalism Using Symbolic Model Checker HyTech.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

A systematic representation of path constraints for implicit path enumeration technique.
Softw. Test., Verif. Reliab., 2010

FBDVerifier: Interactive and Visual Analysis of Counterexample in Formal Verification of Function Block Diagram.
Journal of Research and Practice in Information Technology, 2010

Automated Test Coverage Measurement for Reactor Protection System Software Implemented in Function Block Diagram.
Proceedings of the Computer Safety, 2010

VIS Analyzer: A Visual Assistant for VIS Verification and Analysis.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010

Customization of Scrum Methodology for Outsourced E-Commerce Projects.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

Formal Modeling and Verification of Safety-Critical Software.
IEEE Software, 2009

A data flow-based structural testing technique for FBD programs.
Information & Software Technology, 2009

Visualization and Formalization of User Constraints for Tight Estimation of Worst-Case Execution Time.
IEICE Transactions, 2009

Classification of web robots: An empirical study based on over one billion requests.
Computers & Security, 2009

ADAM: Web Anomaly Detection Assistant Based on Feature Matrix.
Proceedings of the Ninth International Conference on Quality Software, 2009

Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

A Verification Framework for FBD Based Software in Nuclear Power Plants.
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008

An Iterative Refinement Framework for Tighter Worst-Case Execution Time Calculation.
Proceedings of the Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 2007

Masquerade detection based on SVM and sequence-based user commands profile.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Timed High-Level Message Sequence Charts for Real-Time System Design.
Proceedings of the System Analysis and Modeling: Language Profiles, 2006

Testing of Timer Function Blocks in FBD.
Proceedings of the 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 2006

Synthesis of FBD-based PLC design from NuSCR formal specification.
Rel. Eng. & Sys. Safety, 2005

Software safety analysis of function block diagrams using fault trees.
Rel. Eng. & Sys. Safety, 2005

Fault tree construction of hybrid system requirements using qualitative formal method.
Rel. Eng. & Sys. Safety, 2005

An effective technique for the software requirements analysis of NPP safety-critical systems, based on software inspection, requirements traceability, and formal specification.
Rel. Eng. & Sys. Safety, 2005

Formal verification of functional properties of a SCR-style software requirements specification using PVS.
Rel. Eng. & Sys. Safety, 2005

A formal software requirements specification method for digital nuclear plant protection systems.
Journal of Systems and Software, 2005

Empirical evaluation of SVM-based masquerade detection using UNIX commands.
Computers & Security, 2005

Control and Data Flow Testing on Function Block Diagrams.
Proceedings of the Computer Safety, 2005

Comment on: development of a safety critical software requirements verification method with combined CPN and PVS: a nuclear power plant protection system application.
Rel. Eng. & Sys. Safety, 2004

Efficient Masquerade Detection Using SVM Based on Common Command Frequency in Sliding Windows.
IEICE Transactions, 2004

SAD: web session anomaly detection based on parameter estimation.
Computers & Security, 2004

Generating Reduced Finite State Machine from Concurrent Scenarios Using Static Partial Order Method.
Journal of Research and Practice in Information Technology, 2004

NuEditor - A Tool Suite for Specification and Verification of NuSCR.
Proceedings of the Software Engineering Research, 2004

PLC-Based Safety Critical Software Development for Nuclear Power Plants.
Proceedings of the Computer Safety, 2004

Web Server Attack Categorization based on Root Causes and Their Locations.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

An integrated environment of S/W specification and V&V for safety-critical systems.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Software Design Specification and Analysis Technique for the Safety Critical Software Based on Programmable Logic Controller (PLC).
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004

Systematic evaluation of fault trees using real-time model checker UPPAAL.
Rel. Eng. & Sys. Safety, 2003

Generating test sequences using symbolic execution for event-driven real-time systems.
Microprocessors and Microsystems, 2003

Generating test sequences from a set of MSCs.
Computer Networks, 2003

Data Flow Testing as Model Checking.
Proceedings of the 25th International Conference on Software Engineering, 2003

An empirical evaluation of six methods to detect faults in software.
Softw. Test., Verif. Reliab., 2002

A semantics of sequence diagrams.
Inf. Process. Lett., 2002

Empirical evaluation of a fuzzy logic-based software quality prediction model.
Fuzzy Sets and Systems, 2002

Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2002

Construction of global finite state machine for testing task interactions written in message sequence charts.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

Automated structural analysis of SCR-style software requirements specifications using PVS.
Softw. Test., Verif. Reliab., 2001

Extending the SCR Method for Real-Time Systems.
Real-Time Systems, 2001

Specification and validation of dynamic systems using temporal logic.
IEE Proceedings - Software, 2001

A test sequence selection method for statecharts.
Softw. Test., Verif. Reliab., 2000

A Slicing-based Approach to Enhance Petri Net Reachability Analysis.
Journal of Research and Practice in Information Technology, 2000

Test cases generation from UML state diagrams.
IEE Proceedings - Software, 1999

Safety Verification of Ada95 Programs Using Software Fault Trees.
Proceedings of the Computer Safety, 1999

Applying Model Checking to Concurrent Object-Oriented Software.
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999

Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering.
IEEE Trans. Software Eng., 1998

Towards Reusable Colored Petri Nets.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998

Behavior verification of hybrid real-time requirements by qualitative formalism.
Proceedings of the 4th International Workshop on Real-Time Computing Systems and Applications (RTCSA '97), 1997

Task.o object modeling approach for robot workcell programming.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

On the concurrent behaviour of SCR specifications.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

Detecting Common Mode Failures in N-Version Software Using Weakest Precondition Analysis.
Proceedings of the 4th Asia-Pacific Software Engineering and International Computer Science Conference (APSEC '97 / ICSC '97), 1997

Specification and analysis of real-time systems in Statecharts.
Proceedings of WORDS'96. The Second Workshop on Object-Oriented Real-Time Dependable Systems, 1996

Safety Analysis Using Coloured Petri Nets.
Proceedings of the 3rd Asia-Pacific Software Engineering Conference (APSEC '96), 1996

An Empirical Study on Software Error Detection: Voting, Instrumentation, and Fagan Inspection.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995

Testing of Object-Oriented Programs Based on Finite State Machines.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995