Chia Yuan Cho
I'm a PhD student in Computer Science at UC Berkeley, advised by Professor Dawn Song.
I research on the security analysis of programs and computer networks.
My current research focuses on applying principled (formal) techniques to practical security analysis.
I was a Project Manager and Senior researcher at the Computer Security Lab of DSO National Laboratories, where I retain my position.
-
MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery
- Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu and Dawn Song.
- To appear in Proceedings of the 20th USENIX Security Symposium (USENIX Security '11), San Francisco, California.
-
Inference and Analysis of Formal Models of Botnet Command and Control Protocols
- Chia Yuan Cho, Domagoj Babic, Richard Shin and Dawn Song.
- Proceedings of the 17th ACM Conference on Computer and Communication Security (CCS 2010), Chicago, Illinois.
-
Insights from the Inside: A View of Botnet Management from Infiltration
- Chia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson and Dawn Song.
- Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2010), San Jose, California.
-
Identifying Unique Devices through Wireless Fingerprinting
- Desmond Chin Choong Loh, Chia Yuan Cho, Chung Pheng Tan and Ri Seng Lee.
- Proceedings of the ACM Conference on Wireless Network Security (WiSec 2008), Alexandria, Virginia.
-
Network Forensics on Packet Fingerprints
- Chia Yuan Cho, Sin Yeung Lee, Chung Pheng Tan and Yong Tai Tan.
- Proceedings of the IFIP Information Security Conference (SEC 2006), Karlstad, Sweden.
-
A Framework and Source Model for Design and Evaluation of Robust Header Compression
- Chia Yuan Cho, Winston Khoon Guan Seah and Yong Huat Chew.
- Elsevier Computer Networks, Vol. 50, Issue 15, pp. 2676 - 2712, October 2006.
-
Modeling and Analysis of Robust Header Compression Performance
- Chia Yuan Cho, Yong Huat Chew and Winston Khoon Guan Seah.
- Proceedings of the IEEE Intl. Symp. on a World of Wireless, Mobile and Multimedia Networks 2005 (WOWMOM 2005), Sicily, Italy.
-
Exploiting Inter-flow Redundancy: Context Replication in ROHC-TCP
- Chia Yuan Cho, Winston Khoon Guan Seah and Yong Huat Chew.
- Proceedings of the IEEE Global Telecommunications Conference 2004 (GLOBECOM 2004), Dallas, Texas.
Contact:
chiayuan AT cs DOT berkeley DOT edu