default search action
David Brumley
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j11]Thanassis Avgerinos, David Brumley, John Davis, Ryan Goulden, Tyler Nighswander, Alexandre Rebert, Ned Williamson:
The Mayhem Cyber Reasoning System. IEEE Secur. Priv. 16(2): 52-60 (2018) - [j10]David Brumley:
The Cyber Grand Challenge and the Future of Cyber-Autonomy. login Usenix Mag. 43(2) (2018) - [c45]Arjun Roy, Deepak Bansal, David Brumley, Harish Kumar Chandrappa, Parag Sharma, Rishabh Tewari, Behnaz Arzani, Alex C. Snoeren:
Cloud Datacenter SDN Monitoring: Experiences and Challenges. Internet Measurement Conference 2018: 464-470 - 2017
- [c44]Andrew Reynolds, Maverick Woo, Clark W. Barrett, David Brumley, Tianyi Liang, Cesare Tinelli:
Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification. CAV (2) 2017: 453-474 - [c43]Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley:
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games. CSF 2017: 7-21 - [c42]Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, David Brumley:
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. IEEE Symposium on Security and Privacy 2017: 824-839 - 2016
- [j9]Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley:
Enhancing symbolic execution with veritesting. Commun. ACM 59(6): 93-100 (2016) - [c41]Daming D. Chen, Maverick Woo, David Brumley, Manuel Egele:
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. NDSS 2016 - [e2]William L. Scherlis, David Brumley:
Proceedings of the Symposium and Bootcamp on the Science of Security, Pittsburgh, PA, USA, April 19-21, 2016. ACM 2016, ISBN 978-1-4503-4277-3 [contents] - 2015
- [j8]David Brumley:
Invisible Intruders: Rootkits in Practice. login Usenix Mag. 40(2) (2015) - [c40]Yangchun Fu, Zhiqiang Lin, David Brumley:
Automatically deriving pointer reference expressions from binary code for memory dump analysis. ESEC/SIGSOFT FSE 2015: 614-624 - [c39]Sang Kil Cha, Maverick Woo, David Brumley:
Program-Adaptive Mutational Fuzzing. IEEE Symposium on Security and Privacy 2015: 725-741 - 2014
- [j7]Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley:
Automatic exploit generation. Commun. ACM 57(2): 74-84 (2014) - [c38]Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley:
Enhancing symbolic execution with veritesting. ICSE 2014: 1083-1094 - [c37]Manuel Egele, Maverick Woo, Peter Chapman, David Brumley:
Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. USENIX Security Symposium 2014: 303-317 - [c36]Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley:
BYTEWEIGHT: Learning to Recognize Functions in Binary Code. USENIX Security Symposium 2014: 845-860 - [c35]Peter Chapman, Jonathan Burket, David Brumley:
PicoCTF: A Game-Based Computer Security Competition for High School Students. 3GSE 2014 - [c34]Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley:
Optimizing Seed Selection for Fuzzing. USENIX Security Symposium 2014: 861-875 - 2013
- [c33]Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel:
An empirical study of cryptographic misuse in android applications. CCS 2013: 73-84 - [c32]Maverick Woo, Sang Kil Cha, Samantha Gottlieb, David Brumley:
Scheduling black-box mutational fuzzing. CCS 2013: 511-522 - [c31]Shobha Venkataraman, David Brumley, Subhabrata Sen, Oliver Spatscheck:
Automatically Inferring the Evolution of Malicious Activity on the Internet. NDSS 2013 - [c30]Jiyong Jang, Maverick Woo, David Brumley:
Towards Automatic Software Lineage Inference. USENIX Security Symposium 2013: 81-96 - [c29]David Brumley, JongHyup Lee, Edward J. Schwartz, Maverick Woo:
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. USENIX Security Symposium 2013: 353-368 - 2012
- [j6]Jiyong Jang, Maverick Woo, David Brumley:
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions. login Usenix Mag. 37(6) (2012) - [c28]Tyler Nighswander, Brent M. Ledvina, Jonathan Diamond, Robert Brumley, David Brumley:
GPS software attacks. CCS 2012: 450-461 - [c27]Jiyong Jang, Abeer Agrawal, David Brumley:
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions. IEEE Symposium on Security and Privacy 2012: 48-62 - [c26]Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, David Brumley:
Unleashing Mayhem on Binary Code. IEEE Symposium on Security and Privacy 2012: 380-394 - [c25]Matthew Maurer, David Brumley:
Tachyon: Tandem Execution for Efficient Live Patch Testing. USENIX Security Symposium 2012: 617-630 - 2011
- [j5]Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, David G. Andersen:
SplitScreen: Enabling efficient, distributed malware detection. J. Commun. Networks 13(2): 187-200 (2011) - [c24]David Brumley, Ivan Jager, Thanassis Avgerinos, Edward J. Schwartz:
BAP: A Binary Analysis Platform. CAV 2011: 463-469 - [c23]Jiyong Jang, David Brumley, Shobha Venkataraman:
BitShred: feature hashing malware for scalable triage and semantic analysis. CCS 2011: 309-320 - [c22]Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley:
AEG: Automatic Exploit Generation. NDSS 2011 - [c21]JongHyup Lee, Thanassis Avgerinos, David Brumley:
TIE: Principled Reverse Engineering of Types in Binary Programs. NDSS 2011 - [c20]Edward J. Schwartz, Thanassis Avgerinos, David Brumley:
Q: Exploit Hardening Made Easy. USENIX Security Symposium 2011 - [e1]David Brumley, Michal Zalewski:
5th USENIX Workshop on Offensive Technologies, WOOT'11, August 8, 2011, San Francisco, CA, USA, Proceedings. USENIX Association 2011 [contents] - [r1]David Brumley:
Static Analysis. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1254-1256 - 2010
- [c19]Sang Kil Cha, Brian Pak, David Brumley, Richard Jay Lipton:
Platform-independent programs. CCS 2010: 547-558 - [c18]Edward J. Schwartz, David Brumley, Jonathan M. McCune:
Contractual Anonymity. NDSS 2010 - [c17]Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, David G. Andersen:
SplitScreen: Enabling Efficient, Distributed Malware Detection. NSDI 2010: 377-390 - [c16]Edward J. Schwartz, Thanassis Avgerinos, David Brumley:
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). IEEE Symposium on Security and Privacy 2010: 317-331
2000 – 2009
- 2008
- [j4]David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha:
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. IEEE Trans. Dependable Secur. Comput. 5(4): 224-241 (2008) - [c15]Dawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25 - [c14]David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng:
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. SP 2008: 143-157 - [p2]David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin:
Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88 - 2007
- [c13]David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song:
Creating Vulnerability Signatures Using Weakest Preconditions. CSF 2007: 311-325 - [c12]Joseph A. Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song:
Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128 - [c11]Nikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo:
Generic Application-Level Protocol Analyzer and its Language. NDSS 2007 - [c10]David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin:
RICH: Automatically Protecting Against Integer-Based Vulnerabilities. NDSS 2007 - [c9]David Brumley, Juan Caballero, Zhenkai Liang, James Newsome:
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. USENIX Security Symposium 2007 - [p1]David Brumley, James Newsome, Dawn Song:
Sting: An End-to-End Self-Healing System for Defending against Internet Worms. Malware Detection 2007: 147-170 - 2006
- [c8]David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song:
Design space and analysis of worm defense strategies. AsiaCCS 2006: 125-137 - [c7]James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song:
Replayer: automatic protocol replay by binary analysis. CCS 2006: 311-321 - [c6]James Newsome, David Brumley, Dawn Xiaodong Song:
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. NDSS 2006 - [c5]David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha:
Towards Automatic Generation of Vulnerability-Based Signatures. S&P 2006: 2-16 - [c4]David Brumley, Dawn Song:
Towards Attack-Agnostic Defenses. HotSec 2006 - 2005
- [j3]David Brumley, Dan Boneh:
Remote timing attacks are practical. Comput. Networks 48(5): 701-716 (2005) - 2004
- [c3]David Brumley, Dawn Xiaodong Song:
Privtrans: Automatically Partitioning Programs for Privilege Separation. USENIX Security Symposium 2004: 57-72 - 2003
- [c2]Constantine P. Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum:
Virtual Appliances for Deploying and Maintaining Software. LISA 2003: 181-194 - [c1]David Brumley, Dan Boneh:
Remote Timing Attacks Are Practical. USENIX Security Symposium 2003 - 2001
- [j2]David Brumley:
A CrashCourse in Managing Security. login Usenix Mag. 26(7) (2001) - 2000
- [j1]David Brumley:
Repeatable Security. login Usenix Mag. 25(7) (2000)
Coauthor Index
aka: Dawn Xiaodong Song
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint