David Brumley
Affiliations: | Electrical and Computer Engineering | Carnegie Mellon University, Pittsburgh, PA |
Area:
Computer Engineering, Computer ScienceGoogle:
"David Brumley"Children
Sign in to add traineeJiyong Jang | grad student | 2013 | Carnegie Mellon |
Edward J. Schwartz | grad student | 2014 | Carnegie Mellon |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Avgerinos T, Rebert A, Cha SK, et al. (2016) Enhancing symbolic execution with veritesting Communications of the Acm. 59: 93-100 |
Avgerinos T, Cha SK, Rebert A, et al. (2014) Automatic exploit generation Communications of the Acm. 57: 74-84 |
Jang J, Agrawal A, Brumley D. (2012) ReDeBug: Finding unpatched code clones in entire OS distributions Proceedings - Ieee Symposium On Security and Privacy. 48-62 |
Cha SK, Moraru I, Jang J, et al. (2011) SplitScreen: Enabling efficient, distributed malware detection Journal of Communications and Networks. 13: 187-200 |
Brumley D, Jager I, Avgerinos T, et al. (2011) BAP: A binary analysis platform Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6806: 463-469 |
Schwartz EJ, Avgerinos T, Brumley D. (2010) All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask) Proceedings - Ieee Symposium On Security and Privacy. 317-331 |
Brumley D, Newsome J, Song D, et al. (2008) Theory and techniques for automated generation of vulnerability-based signatures Ieee Transactions On Dependable and Secure Computing. 5: 224-241 |