David Brumley
David Brumley
Computer Science, Carnegie Mellon University
Verified email at
Cited by
Cited by
Remote timing attacks are practical
D Brumley, D Boneh
Computer Networks 48 (5), 701-716, 2005
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
EJ Schwartz, T Avgerinos, D Brumley
2010 IEEE symposium on Security and privacy, 317-331, 2010
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
Unleashing mayhem on binary code
SK Cha, T Avgerinos, A Rebert, D Brumley
2012 IEEE Symposium on Security and Privacy, 380-394, 2012
BAP: A binary analysis platform
D Brumley, I Jager, T Avgerinos, EJ Schwartz
Computer Aided Verification: 23rd International Conference, CAV 2011 …, 2011
An empirical study of cryptographic misuse in android applications
M Egele, D Brumley, Y Fratantonio, C Kruegel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Automatic exploit generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
Q: Exploit hardening made easy
EJ Schwartz, T Avgerinos, D Brumley
20th USENIX Security Symposium (USENIX Security 11), 2011
Towards automated dynamic analysis for linux-based embedded firmware.
DD Chen, M Woo, D Brumley, M Egele
NDSS 1, 1.1-8.1, 2016
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
Automatic patch-based exploit generation is possible: Techniques and implications
D Brumley, P Poosankam, D Song, J Zheng
2008 IEEE Symposium on Security and Privacy (sp 2008), 143-157, 2008
Bitshred: feature hashing malware for scalable triage and semantic analysis
J Jang, D Brumley, S Venkataraman
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Enhancing symbolic execution with veritesting
T Avgerinos, A Rebert, SK Cha, D Brumley
Proceedings of the 36th International Conference on Software Engineering …, 2014
{BYTEWEIGHT}: Learning to recognize functions in binary code
T Bao, J Burket, M Woo, R Turner, D Brumley
23rd USENIX Security Symposium (USENIX Security 14), 845-860, 2014
Program-adaptive mutational fuzzing
SK Cha, M Woo, D Brumley
2015 IEEE Symposium on Security and Privacy, 725-741, 2015
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection: Countering the Largest Security Threat, 65-88, 2008
Privtrans: Automatically partitioning programs for privilege separation
D Brumley, D Song
USENIX Security Symposium 57 (72), 2004
Optimizing seed selection for fuzzing
A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley
23rd USENIX Security Symposium (USENIX Security 14), 861-875, 2014
TIE: Principled reverse engineering of types in binary programs
JH Lee, T Avgerinos, D Brumley
Carnegie Mellon University, 2011
Network (In) Security Through IP Packet Filtering.
DB Chapman
USENIX Summer 21, 1992
The system can't perform the operation now. Try again later.
Articles 1–20