Brendan Dolan-Gavitt

According to our database1, Brendan Dolan-Gavitt authored at least 19 papers between 2009 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
NNoculation: Broad Spectrum and Targeted Treatment of Backdoored DNNs.
CoRR, 2020

Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
The Rode0day to Less-Buggy Programs.
IEEE Secur. Priv., 2019

BadNets: Evaluating Backdooring Attacks on Deep Neural Networks.
IEEE Access, 2019

2018
Chaff Bugs: Deterring Attackers by Making Software Buggier.
CoRR, 2018

Bug synthesis: challenging bug-finding tools with deep faults.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain.
CoRR, 2017

AutoCTF: Creating Diverse Pwnables via Automated Bug Injection.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

2016
LAVA: Large-Scale Automated Vulnerability Addition.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Understanding and protecting closed-source systems through dynamic analysis.
PhD thesis, 2015

Repeatable Reverse Engineering with PANDA.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

2013
Tappan Zee (north) bridge: mining memory accesses for introspection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2009
Robust signatures for kernel data structures.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009


  Loading...