Follow
David Brumley
David Brumley
Computer Science, Carnegie Mellon University
Verified email at cmu.edu
Title
Cited by
Cited by
Year
Remote timing attacks are practical
D Brumley, D Boneh
Computer Networks 48 (5), 701-716, 2005
13582005
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
EJ Schwartz, T Avgerinos, D Brumley
2010 IEEE symposium on Security and privacy, 317-331, 2010
11242010
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
10822008
Unleashing mayhem on binary code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
7902012
BAP: A binary analysis platform
D Brumley, I Jager, T Avgerinos, EJ Schwartz
Computer Aided Verification: 23rd International Conference, CAV 2011 …, 2011
6672011
An empirical study of cryptographic misuse in android applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
6252013
Automatic exploit generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
6062014
Q: Exploit hardening made easy
EJ Schwartz, T Avgerinos, D Brumley
20th USENIX Security Symposium (USENIX Security 11), 2011
550*2011
Towards automated dynamic analysis for linux-based embedded firmware.
DD Chen, M Woo, D Brumley, M Egele
NDSS 1, 1.1-8.1, 2016
5012016
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
4152006
Automatic patch-based exploit generation is possible: Techniques and implications
D Brumley, P Poosankam, D Song, J Zheng
2008 IEEE Symposium on Security and Privacy (sp 2008), 143-157, 2008
4102008
Bitshred: feature hashing malware for scalable triage and semantic analysis
J Jang, D Brumley, S Venkataraman
Proceedings of the 18th ACM conference on Computer and communications …, 2011
3922011
Enhancing symbolic execution with veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
3512014
{BYTEWEIGHT}: Learning to recognize functions in binary code
T Bao, J Burket, M Woo, R Turner, D Brumley
23rd USENIX Security Symposium (USENIX Security 14), 845-860, 2014
3382014
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection: Countering the Largest Security Threat, 65-88, 2008
3362008
Program-adaptive mutational fuzzing
SK Cha, M Woo, D Brumley
2015 IEEE Symposium on Security and Privacy, 725-741, 2015
3332015
Privtrans: Automatically partitioning programs for privilege separation
D Brumley, D Song
USENIX Security Symposium 57 (72), 2004
3232004
Optimizing seed selection for fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
23rd USENIX Security Symposium (USENIX Security 14), 861-875, 2014
3162014
TIE: Principled reverse engineering of types in binary programs
JH Lee, T Avgerinos, D Brumley
Carnegie Mellon University, 2011
2942011
ReDeBug: finding unpatched code clones in entire os distributions
J Jang, A Agrawal, D Brumley
2012 IEEE Symposium on Security and Privacy, 48-62, 2012
2932012
The system can't perform the operation now. Try again later.
Articles 1–20