David Brumley
David Brumley
Computer Science, Carnegie Mellon University
Email verificata su cmu.edu
TitoloCitata daAnno
Remote timing attacks are practical
D Brumley, D Boneh
Computer Networks 48 (5), 701-716, 2005
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
International Conference on Information Systems Security, 1-25, 2008
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
EJ Schwartz, T Avgerinos, D Brumley
2010 IEEE symposium on Security and privacy, 317-331, 2010
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
Unleashing mayhem on binary code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
BAP: A binary analysis platform
D Brumley, I Jager, T Avgerinos, EJ Schwartz
International Conference on Computer Aided Verification, 463-469, 2011
AEG: Automatic exploit generation
T Avgerinos, SK Cha, BLT Hao, D Brumley
Internet Society, 2011
An empirical study of cryptographic misuse in android applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Bitshred: feature hashing malware for scalable triage and semantic analysis
J Jang, D Brumley, S Venkataraman
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Automatic patch-based exploit generation is possible: Techniques and implications
D Brumley, P Poosankam, D Song, J Zheng
2008 IEEE Symposium on Security and Privacy (sp 2008), 143-157, 2008
Virtual appliance management
MSL Lam, CP Sapuntzakis, RUV Chandra, NB Zeldovich, M Rosenblum, ...
US Patent 7,890,689, 2011
Virtual Appliances for Deploying and Maintaining Software.
CP Sapuntzakis, D Brumley, R Chandra, N Zeldovich, J Chow, MS Lam, ...
LISA 3, 181-194, 2003
Privtrans: Automatically partitioning programs for privilege separation
D Brumley, D Song
USENIX Security Symposium, 57-72, 2004
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection, 65-88, 2008
Q: Exploit Hardening Made Easy.
EJ Schwartz, T Avgerinos, D Brumley
USENIX Security Symposium, 25-41, 2011
Enhancing symbolic execution with veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
TIE: Principled Reverse Engineering of Types in Binary Programs.
JH Lee, T Avgerinos, D Brumley
NDSS, 2011
Cache-based system management architecture with virtual appliances, network repositories, and virtual appliance transceivers
MSL Lam, CP Sapuntzakis, RUV Chandra, NB Zeldovich, M Rosenblum, ...
US Patent 7,373,451, 2008
Generic Application-Level Protocol Analyzer and its Language.
N Borisov, D Brumley, HJ Wang, J Dunagan, P Joshi, C Guo
NDSS, 2007
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
D Brumley, J Caballero, Z Liang, J Newsome, D Song
USENIX Security Symposium, 15, 2007
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20