David Brumley

According to our database1, David Brumley authored at least 56 papers between 2000 and 2018.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
The Cyber Grand Challenge and the Future of Cyber-Autonomy.
login Usenix Mag., 2018

The Mayhem Cyber Reasoning System.
IEEE Secur. Priv., 2018

Cloud Datacenter SDN Monitoring: Experiences and Challenges.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification.
Proceedings of the Computer Aided Verification - 29th International Conference, 2017

2016
Enhancing symbolic execution with veritesting.
Commun. ACM, 2016

Towards Automated Dynamic Analysis for Linux-based Embedded Firmware.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Invisible Intruders: Rootkits in Practice.
login Usenix Mag., 2015

Program-Adaptive Mutational Fuzzing.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Automatically deriving pointer reference expressions from binary code for memory dump analysis.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

2014
Automatic exploit generation.
Commun. ACM, 2014

Optimizing Seed Selection for Fuzzing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

PicoCTF: A Game-Based Computer Security Competition for High School Students.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

BYTEWEIGHT: Learning to Recognize Functions in Binary Code.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Towards Automatic Software Lineage Inference.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Automatically Inferring the Evolution of Malicious Activity on the Internet.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Scheduling black-box mutational fuzzing.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

An empirical study of cryptographic misuse in android applications.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions.
login Usenix Mag., 2012

Tachyon: Tandem Execution for Efficient Live Patch Testing.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Unleashing Mayhem on Binary Code.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

GPS software attacks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Static Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

SplitScreen: Enabling efficient, distributed malware detection.
J. Commun. Networks, 2011

Q: Exploit Hardening Made Easy.
Proceedings of the 20th USENIX Security Symposium, 2011

TIE: Principled Reverse Engineering of Types in Binary Programs.
Proceedings of the Network and Distributed System Security Symposium, 2011

AEG: Automatic Exploit Generation.
Proceedings of the Network and Distributed System Security Symposium, 2011

BitShred: feature hashing malware for scalable triage and semantic analysis.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

BAP: A Binary Analysis Platform.
Proceedings of the Computer Aided Verification - 23rd International Conference, 2011

2010
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask).
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Contractual Anonymity.
Proceedings of the Network and Distributed System Security Symposium, 2010

Platform-independent programs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2008
Automatically Identifying Trigger-based Behavior in Malware.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
IEEE Trans. Dependable Secur. Comput., 2008

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

BitBlaze: A New Approach to Computer Security via Binary Analysis.
Proceedings of the Information Systems Security, 4th International Conference, 2008

2007
Sting: An End-to-End Self-Healing System for Defending against Internet Worms.
Proceedings of the Malware Detection, 2007

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2007

Generic Application-Level Protocol Analyzer and its Language.
Proceedings of the Network and Distributed System Security Symposium, 2007

Sweeper: a lightweight end-to-end system for defending against fast worms.
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007

Creating Vulnerability Signatures Using Weakest Preconditions.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Towards Attack-Agnostic Defenses.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Towards Automatic Generation of Vulnerability-Based Signatures.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2006

Replayer: automatic protocol replay by binary analysis.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Design space and analysis of worm defense strategies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Remote timing attacks are practical.
Comput. Networks, 2005

2004
Privtrans: Automatically Partitioning Programs for Privilege Separation.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

2003
Virtual Appliances for Deploying and Maintaining Software.
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003

2001
A CrashCourse in Managing Security.
login Usenix Mag., 2001

2000
Repeatable Security.
login Usenix Mag., 2000


  Loading...