Remote timing attacks are practical D Brumley, D Boneh Computer Networks 48 (5), 701-716, 2005 | 1204 | 2005 |
BitBlaze: A new approach to computer security via binary analysis D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ... International conference on information systems security, 1-25, 2008 | 999 | 2008 |
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask) EJ Schwartz, T Avgerinos, D Brumley 2010 IEEE symposium on Security and privacy, 317-331, 2010 | 909 | 2010 |
Unleashing mayhem on binary code SK Cha, T Avgerinos, A Rebert, D Brumley 2012 IEEE Symposium on Security and Privacy, 380-394, 2012 | 584 | 2012 |
BAP: A binary analysis platform D Brumley, I Jager, T Avgerinos, EJ Schwartz International Conference on Computer Aided Verification, 463-469, 2011 | 531 | 2011 |
An empirical study of cryptographic misuse in android applications M Egele, D Brumley, Y Fratantonio, C Kruegel Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 492 | 2013 |
Automatic exploit generation T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley Communications of the ACM 57 (2), 74-84, 2014 | 467 | 2014 |
Towards automatic generation of vulnerability-based signatures D Brumley, J Newsome, D Song, H Wang, S Jha 2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006 | 394 | 2006 |
Bitshred: feature hashing malware for scalable triage and semantic analysis J Jang, D Brumley, S Venkataraman Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 353 | 2011 |
Automatic patch-based exploit generation is possible: Techniques and implications D Brumley, P Poosankam, D Song, J Zheng 2008 IEEE Symposium on Security and Privacy (sp 2008), 143-157, 2008 | 334 | 2008 |
Q: Exploit hardening made easy EJ Schwartz, T Avgerinos, D Brumley 20th USENIX Security Symposium (USENIX Security 11), 2011 | 318 | 2011 |
Automatically identifying trigger-based behavior in malware D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin Botnet Detection, 65-88, 2008 | 298 | 2008 |
Enhancing symbolic execution with veritesting T Avgerinos, A Rebert, SK Cha, D Brumley Proceedings of the 36th International Conference on Software Engineering …, 2014 | 285 | 2014 |
Privtrans: Automatically partitioning programs for privilege separation D Brumley, D Song USENIX Security Symposium 57 (72), 2004 | 283 | 2004 |
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. DD Chen, M Woo, D Brumley, M Egele NDSS 1, 1.1-8.1, 2016 | 280 | 2016 |
Virtual Appliances for Deploying and Maintaining Software. CP Sapuntzakis, D Brumley, R Chandra, N Zeldovich, J Chow, MS Lam, ... LISA 3, 181-194, 2003 | 267 | 2003 |
{BYTEWEIGHT}: Learning to recognize functions in binary code T Bao, J Burket, M Woo, R Turner, D Brumley 23rd USENIX Security Symposium (USENIX Security 14), 845-860, 2014 | 252 | 2014 |
Virtual appliance management MSL Lam, CP Sapuntzakis, RUV Chandra, NB Zeldovich, M Rosenblum, ... US Patent 7,890,689, 2011 | 252 | 2011 |
TIE: Principled reverse engineering of types in binary programs JH Lee, T Avgerinos, D Brumley Carnegie Mellon University, 2011 | 239 | 2011 |
Program-adaptive mutational fuzzing SK Cha, M Woo, D Brumley 2015 IEEE Symposium on Security and Privacy, 725-741, 2015 | 236 | 2015 |