David Brumley - Publications

Affiliations: 
Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Engineering, Computer Science

7 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Avgerinos T, Rebert A, Cha SK, Brumley D. Enhancing symbolic execution with veritesting Communications of the Acm. 59: 93-100. DOI: 10.1145/2927924  0.31
2014 Avgerinos T, Cha SK, Rebert A, Schwartz EJ, Woo M, Brumley D. Automatic exploit generation Communications of the Acm. 57: 74-84. DOI: 10.1145/2560217.2560219  0.487
2012 Jang J, Agrawal A, Brumley D. ReDeBug: Finding unpatched code clones in entire OS distributions Proceedings - Ieee Symposium On Security and Privacy. 48-62. DOI: 10.1109/SP.2012.13  0.301
2011 Cha SK, Moraru I, Jang J, Truelove J, Brumley D, Andersen DG. SplitScreen: Enabling efficient, distributed malware detection Journal of Communications and Networks. 13: 187-200. DOI: 10.1109/Jcn.2011.6157418  0.447
2011 Brumley D, Jager I, Avgerinos T, Schwartz EJ. BAP: A binary analysis platform Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6806: 463-469. DOI: 10.1007/978-3-642-22110-1_37  0.49
2010 Schwartz EJ, Avgerinos T, Brumley D. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask) Proceedings - Ieee Symposium On Security and Privacy. 317-331. DOI: 10.1109/SP.2010.26  0.475
2008 Brumley D, Newsome J, Song D, Wang H, Jha S. Theory and techniques for automated generation of vulnerability-based signatures Ieee Transactions On Dependable and Secure Computing. 5: 224-241. DOI: 10.1109/Tdsc.2008.55  0.342
Show low-probability matches.