Follow
David Brumley
David Brumley
Computer Science, Carnegie Mellon University
Verified email at cmu.edu
Title
Cited by
Cited by
Year
Remote timing attacks are practical
D Brumley, D Boneh
Computer Networks 48 (5), 701-716, 2005
12672005
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
10492008
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
EJ Schwartz, T Avgerinos, D Brumley
2010 IEEE symposium on Security and privacy, 317-331, 2010
10052010
Unleashing mayhem on binary code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
6932012
BAP: A binary analysis platform
D Brumley, I Jager, T Avgerinos, EJ Schwartz
Computer Aided Verification: 23rd International Conference, CAV 2011 …, 2011
5882011
An empirical study of cryptographic misuse in android applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
5472013
Automatic exploit generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
5312014
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
4082006
Automatic patch-based exploit generation is possible: Techniques and implications
D Brumley, P Poosankam, D Song, J Zheng
2008 IEEE Symposium on Security and Privacy (sp 2008), 143-157, 2008
3772008
Bitshred: feature hashing malware for scalable triage and semantic analysis
J Jang, D Brumley, S Venkataraman
Proceedings of the 18th ACM conference on Computer and communications …, 2011
3682011
Towards automated dynamic analysis for linux-based embedded firmware.
DD Chen, M Woo, D Brumley, M Egele
NDSS 1, 1.1-8.1, 2016
3632016
Q: Exploit Hardening Made Easy.
EJ Schwartz, T Avgerinos, D Brumley
USENIX Security Symposium 10 (2028067), 2028092, 2011
3442011
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection: Countering the Largest Security Threat, 65-88, 2008
3212008
Enhancing symbolic execution with veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
3152014
Privtrans: Automatically partitioning programs for privilege separation
D Brumley, D Song
USENIX Security Symposium 57 (72), 2004
3002004
{BYTEWEIGHT}: Learning to recognize functions in binary code
T Bao, J Burket, M Woo, R Turner, D Brumley
23rd {USENIX} Security Symposium ({USENIX} Security 14), 845-860, 2014
2952014
Program-adaptive mutational fuzzing
SK Cha, M Woo, D Brumley
2015 IEEE Symposium on Security and Privacy, 725-741, 2015
2802015
Virtual Appliances for Deploying and Maintaining Software.
CP Sapuntzakis, D Brumley, R Chandra, N Zeldovich, J Chow, MS Lam, ...
LISA 3, 181-194, 2003
2682003
Optimizing seed selection for fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
23rd {USENIX} Security Symposium ({USENIX} Security 14), 861-875, 2014
2652014
TIE: Principled reverse engineering of types in binary programs
JH Lee, T Avgerinos, D Brumley
Carnegie Mellon University, 2011
2612011
The system can't perform the operation now. Try again later.
Articles 1–20