David Brumley
David Brumley
Computer Science, Carnegie Mellon University
Verified email at
Cited by
Cited by
Remote timing attacks are practical
D Brumley, D Boneh
Computer Networks 48 (5), 701-716, 2005
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
EJ Schwartz, T Avgerinos, D Brumley
2010 IEEE symposium on Security and privacy, 317-331, 2010
Unleashing mayhem on binary code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
BAP: A binary analysis platform
D Brumley, I Jager, T Avgerinos, EJ Schwartz
Computer Aided Verification: 23rd International Conference, CAV 2011 …, 2011
An empirical study of cryptographic misuse in android applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Automatic exploit generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
Automatic patch-based exploit generation is possible: Techniques and implications
D Brumley, P Poosankam, D Song, J Zheng
2008 IEEE Symposium on Security and Privacy (sp 2008), 143-157, 2008
Bitshred: feature hashing malware for scalable triage and semantic analysis
J Jang, D Brumley, S Venkataraman
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Towards automated dynamic analysis for linux-based embedded firmware.
DD Chen, M Woo, D Brumley, M Egele
NDSS 1, 1.1-8.1, 2016
Q: Exploit Hardening Made Easy.
EJ Schwartz, T Avgerinos, D Brumley
USENIX Security Symposium 10 (2028067), 2028092, 2011
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection: Countering the Largest Security Threat, 65-88, 2008
Enhancing symbolic execution with veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
Privtrans: Automatically partitioning programs for privilege separation
D Brumley, D Song
USENIX Security Symposium 57 (72), 2004
{BYTEWEIGHT}: Learning to recognize functions in binary code
T Bao, J Burket, M Woo, R Turner, D Brumley
23rd {USENIX} Security Symposium ({USENIX} Security 14), 845-860, 2014
Program-adaptive mutational fuzzing
SK Cha, M Woo, D Brumley
2015 IEEE Symposium on Security and Privacy, 725-741, 2015
Virtual Appliances for Deploying and Maintaining Software.
CP Sapuntzakis, D Brumley, R Chandra, N Zeldovich, J Chow, MS Lam, ...
LISA 3, 181-194, 2003
Optimizing seed selection for fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
23rd {USENIX} Security Symposium ({USENIX} Security 14), 861-875, 2014
TIE: Principled reverse engineering of types in binary programs
JH Lee, T Avgerinos, D Brumley
Carnegie Mellon University, 2011
The system can't perform the operation now. Try again later.
Articles 1–20