David Brumley
David Brumley
Computer Science, Carnegie Mellon University
Email verificata su cmu.edu
TitoloCitata daAnno
Remote timing attacks are practical
D Brumley, D Boneh
Computer Networks 48 (5), 701-716, 2005
9952005
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
International Conference on Information Systems Security, 1-25, 2008
8072008
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
EJ Schwartz, T Avgerinos, D Brumley
2010 IEEE symposium on Security and privacy, 317-331, 2010
6912010
Unleashing mayhem on binary code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
3882012
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
3672006
BAP: A binary analysis platform
D Brumley, I Jager, T Avgerinos, EJ Schwartz
International Conference on Computer Aided Verification, 463-469, 2011
3642011
AEG: Automatic exploit generation
T Avgerinos, SK Cha, BLT Hao, D Brumley
Carnegie Mellon University, 2011
335*2011
An empirical study of cryptographic misuse in android applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3232013
Bitshred: feature hashing malware for scalable triage and semantic analysis
J Jang, D Brumley, S Venkataraman
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2652011
Automatic patch-based exploit generation is possible: Techniques and implications
D Brumley, P Poosankam, D Song, J Zheng
2008 IEEE Symposium on Security and Privacy (sp 2008), 143-157, 2008
2622008
Virtual Appliances for Deploying and Maintaining Software.
CP Sapuntzakis, D Brumley, R Chandra, N Zeldovich, J Chow, MS Lam, ...
LISA 3, 181-194, 2003
2462003
Privtrans: Automatically partitioning programs for privilege separation
D Brumley, D Song
USENIX Security Symposium 57 (72), 2004
2392004
Virtual appliance management
MSL Lam, CP Sapuntzakis, RUV Chandra, NB Zeldovich, M Rosenblum, ...
US Patent 7,890,689, 2011
2372011
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection, 65-88, 2008
2372008
Q: Exploit Hardening Made Easy.
EJ Schwartz, T Avgerinos, D Brumley
USENIX Security Symposium, 25-41, 2011
2362011
Enhancing symbolic execution with veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
1952014
TIE: Principled reverse engineering of types in binary programs
JH Lee, T Avgerinos, D Brumley
Carnegie Mellon University, 2011
1802011
Cache-based system management architecture with virtual appliances, network repositories, and virtual appliance transceivers
MSL Lam, CP Sapuntzakis, RUV Chandra, NB Zeldovich, M Rosenblum, ...
US Patent 7,373,451, 2008
1582008
Generic Application-Level Protocol Analyzer and its Language.
N Borisov, D Brumley, HJ Wang, J Dunagan, P Joshi, C Guo
NDSS, 2007
1482007
{BYTEWEIGHT}: Learning to Recognize Functions in Binary Code
T Bao, J Burket, M Woo, R Turner, D Brumley
23rd {USENIX} Security Symposium ({USENIX} Security 14), 845-860, 2014
1372014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20