David Brumley
Orcid: 0000-0003-2233-3538
  According to our database1,
  David Brumley
  authored at least 56 papers
  between 2000 and 2018.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2018
    Proceedings of the Internet Measurement Conference 2018, 2018
    
  
  2017
    Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
    
  
    Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
    
  
    Proceedings of the Computer Aided Verification - 29th International Conference, 2017
    
  
  2016
    Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
    
  
  2015
    Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
    
  
Automatically deriving pointer reference expressions from binary code for memory dump analysis.
    
  
    Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
    
  
  2014
    Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
    
  
    Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
    
  
    Proceedings of the 2014 USENIX Summit on Gaming, 2014
    
  
    Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
    
  
    Proceedings of the 36th International Conference on Software Engineering, 2014
    
  
  2013
    Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
    
  
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring.
    
  
    Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
    
  
    Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
    
  
    Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
    
  
    Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
    
  
  2012
    login Usenix Mag., 2012
    
  
    Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
    
  
    Proceedings of the IEEE Symposium on Security and Privacy, 2012
    
  
    Proceedings of the IEEE Symposium on Security and Privacy, 2012
    
  
    Proceedings of the ACM Conference on Computer and Communications Security, 2012
    
  
  2011
    Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
    
  
    Proceedings of the 20th USENIX Security Symposium, 2011
    
  
    Proceedings of the Network and Distributed System Security Symposium, 2011
    
  
    Proceedings of the Network and Distributed System Security Symposium, 2011
    
  
    Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
    
  
    Proceedings of the Computer Aided Verification - 23rd International Conference, 2011
    
  
  2010
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask).
    
  
    Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
    
  
    Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010
    
  
    Proceedings of the Network and Distributed System Security Symposium, 2010
    
  
    Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
    
  
  2008
    Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
    
  
    IEEE Trans. Dependable Secur. Comput., 2008
    
  
    Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
    
  
    Proceedings of the Information Systems Security, 4th International Conference, 2008
    
  
  2007
    Proceedings of the Malware Detection, 2007
    
  
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
    
  
    Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
    
  
    Proceedings of the Network and Distributed System Security Symposium, 2007
    
  
    Proceedings of the Network and Distributed System Security Symposium, 2007
    
  
    Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007
    
  
    Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
    
  
  2006
    Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
    
  
    Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
    
  
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
    
  
    Proceedings of the Network and Distributed System Security Symposium, 2006
    
  
    Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
    
  
    Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
    
  
  2004
    Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
    
  
  2003
    Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
    
  
    Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003
    
  
  2001
  2000