David Brumley - Publications
Affiliations: | Electrical and Computer Engineering | Carnegie Mellon University, Pittsburgh, PA |
Area:
Computer Engineering, Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2016 | Avgerinos T, Rebert A, Cha SK, Brumley D. Enhancing symbolic execution with veritesting Communications of the Acm. 59: 93-100. DOI: 10.1145/2927924 | 0.31 | |||
2014 | Avgerinos T, Cha SK, Rebert A, Schwartz EJ, Woo M, Brumley D. Automatic exploit generation Communications of the Acm. 57: 74-84. DOI: 10.1145/2560217.2560219 | 0.487 | |||
2012 | Jang J, Agrawal A, Brumley D. ReDeBug: Finding unpatched code clones in entire OS distributions Proceedings - Ieee Symposium On Security and Privacy. 48-62. DOI: 10.1109/SP.2012.13 | 0.301 | |||
2011 | Cha SK, Moraru I, Jang J, Truelove J, Brumley D, Andersen DG. SplitScreen: Enabling efficient, distributed malware detection Journal of Communications and Networks. 13: 187-200. DOI: 10.1109/Jcn.2011.6157418 | 0.447 | |||
2011 | Brumley D, Jager I, Avgerinos T, Schwartz EJ. BAP: A binary analysis platform Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6806: 463-469. DOI: 10.1007/978-3-642-22110-1_37 | 0.49 | |||
2010 | Schwartz EJ, Avgerinos T, Brumley D. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask) Proceedings - Ieee Symposium On Security and Privacy. 317-331. DOI: 10.1109/SP.2010.26 | 0.475 | |||
2008 | Brumley D, Newsome J, Song D, Wang H, Jha S. Theory and techniques for automated generation of vulnerability-based signatures Ieee Transactions On Dependable and Secure Computing. 5: 224-241. DOI: 10.1109/Tdsc.2008.55 | 0.342 | |||
Show low-probability matches. |