Follow
Brendan Dolan-Gavitt
Brendan Dolan-Gavitt
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Badnets: Identifying vulnerabilities in the machine learning model supply chain
T Gu, B Dolan-Gavitt, S Garg
arXiv preprint arXiv:1708.06733, 2017
16962017
Fine-pruning: Defending against backdooring attacks on deep neural networks
K Liu, B Dolan-Gavitt, S Garg
International symposium on research in attacks, intrusions, and defenses …, 2018
10602018
Badnets: Evaluating backdooring attacks on deep neural networks
T Gu, K Liu, B Dolan-Gavitt, S Garg
IEEE Access 7, 47230-47244, 2019
9742019
Starcoder: may the source be with you!
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
arXiv preprint arXiv:2305.06161, 2023
4572023
Virtuoso: Narrowing the semantic gap in virtual machine introspection
B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee
2011 IEEE symposium on security and privacy, 297-312, 2011
4282011
Lava: Large-scale automated vulnerability addition
B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ...
2016 IEEE symposium on security and privacy (SP), 110-121, 2016
4122016
Asleep at the keyboard? assessing the security of github copilot’s code contributions
H Pearce, B Ahmad, B Tan, B Dolan-Gavitt, R Karri
2022 IEEE Symposium on Security and Privacy (SP), 754-768, 2022
357*2022
Examining zero-shot vulnerability repair with large language models
H Pearce, B Tan, B Ahmad, R Karri, B Dolan-Gavitt
2023 IEEE Symposium on Security and Privacy (SP), 2339-2356, 2023
239*2023
Robust signatures for kernel data structures
B Dolan-Gavitt, A Srivastava, P Traynor, J Giffin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2182009
Repeatable reverse engineering with PANDA
B Dolan-Gavitt, J Hodosh, P Hulin, T Leek, R Whelan
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015
1862015
Forensic analysis of the Windows registry in memory
B Dolan-Gavitt
digital investigation 5, S26-S32, 2008
1362008
The VAD tree: A process-eye view of physical memory
B Dolan-Gavitt
digital investigation 4, 62-64, 2007
1252007
Tappan zee (north) bridge: mining memory accesses for introspection
B Dolan-Gavitt, T Leek, J Hodosh, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1102013
Lost at c: A user study on the security implications of large language model code assistants
G Sandoval, H Pearce, T Nys, R Karri, S Garg, B Dolan-Gavitt
32nd USENIX Security Symposium (USENIX Security 23), 2205-2222, 2023
98*2023
Leveraging forensic tools for virtual machine introspection
B Dolan-Gavitt, B Payne, W Lee
Gt-cs-11-05, Georgia Institute of Technology, 2011
792011
Bug synthesis: Challenging bug-finding tools with deep faults
S Roy, A Pandey, B Dolan-Gavitt, Y Hu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
752018
Nnoculation: Catching badnets in the wild
AK Veldanda, K Liu, B Tan, P Krishnamurthy, F Khorrami, R Karri, ...
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
71*2021
Danish Contractor
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
Siva Reddy, Daniel Fried, Dzmitry Bahdanau, Yacine Jernite, Carlos Muñoz …, 2023
702023
Benchmarking large language models for automated verilog rtl code generation
S Thakur, B Ahmad, Z Fan, H Pearce, B Tan, R Karri, B Dolan-Gavitt, ...
2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2023
672023
Security systems and methods for distinguishing user-intended traffic from malicious traffic
BD Payne, B Dolan-Gavitt, W Lee
US Patent App. 13/232,830, 2012
662012
The system can't perform the operation now. Try again later.
Articles 1–20