Follow
Brendan Dolan-Gavitt
Brendan Dolan-Gavitt
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Badnets: Identifying vulnerabilities in the machine learning model supply chain
T Gu, B Dolan-Gavitt, S Garg
arXiv preprint arXiv:1708.06733, 2017
15392017
Fine-pruning: Defending against backdooring attacks on deep neural networks
K Liu, B Dolan-Gavitt, S Garg
International symposium on research in attacks, intrusions, and defenses …, 2018
9652018
Badnets: Evaluating backdooring attacks on deep neural networks
T Gu, K Liu, B Dolan-Gavitt, S Garg
IEEE Access 7, 47230-47244, 2019
8712019
Virtuoso: Narrowing the semantic gap in virtual machine introspection
B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee
2011 IEEE symposium on security and privacy, 297-312, 2011
4272011
Lava: Large-scale automated vulnerability addition
B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ...
2016 IEEE symposium on security and privacy (SP), 110-121, 2016
3982016
Starcoder: may the source be with you!
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
arXiv preprint arXiv:2305.06161, 2023
2742023
Asleep at the keyboard? assessing the security of github copilot’s code contributions
H Pearce, B Ahmad, B Tan, B Dolan-Gavitt, R Karri
2022 IEEE Symposium on Security and Privacy (SP), 754-768, 2022
273*2022
Robust signatures for kernel data structures
B Dolan-Gavitt, A Srivastava, P Traynor, J Giffin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2172009
Repeatable reverse engineering with PANDA
B Dolan-Gavitt, J Hodosh, P Hulin, T Leek, R Whelan
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015
1832015
Examining zero-shot vulnerability repair with large language models
H Pearce, B Tan, B Ahmad, R Karri, B Dolan-Gavitt
2023 IEEE Symposium on Security and Privacy (SP), 2339-2356, 2023
164*2023
Forensic analysis of the Windows registry in memory
B Dolan-Gavitt
digital investigation 5, S26-S32, 2008
1322008
The VAD tree: A process-eye view of physical memory
B Dolan-Gavitt
digital investigation 4, 62-64, 2007
1212007
Tappan zee (north) bridge: mining memory accesses for introspection
B Dolan-Gavitt, T Leek, J Hodosh, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1102013
Leveraging forensic tools for virtual machine introspection
B Dolan-Gavitt, B Payne, W Lee
Gt-cs-11-05, Georgia Institute of Technology, 2011
792011
Bug synthesis: Challenging bug-finding tools with deep faults
S Roy, A Pandey, B Dolan-Gavitt, Y Hu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
712018
Nnoculation: Catching badnets in the wild
AK Veldanda, K Liu, B Tan, P Krishnamurthy, F Khorrami, R Karri, ...
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
68*2021
Security systems and methods for distinguishing user-intended traffic from malicious traffic
BD Payne, B Dolan-Gavitt, W Lee
US Patent App. 13/232,830, 2012
642012
Lost at c: A user study on the security implications of large language model code assistants
G Sandoval, H Pearce, T Nys, R Karri, S Garg, B Dolan-Gavitt
32nd USENIX Security Symposium (USENIX Security 23), 2205-2222, 2023
63*2023
Danish Contractor
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
Siva Reddy, Daniel Fried, Dzmitry Bahdanau, Yacine Jernite, Carlos Muņoz …, 2023
502023
Danish Contractor, Siva Reddy, Daniel Fried, Dzmitry Bahdanau, Yacine Jernite, Carlos Muņoz Ferrandis, Sean Hughes, Thomas Wolf, Arjun Guha, Leandro von Werra, and Harm de Vries
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
Starcoder: may the source be with you 3 (6), 2023
452023
The system can't perform the operation now. Try again later.
Articles 1–20