Brendan Dolan-Gavitt
Brendan Dolan-Gavitt
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Virtuoso: Narrowing the semantic gap in virtual machine introspection
B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee
2011 IEEE symposium on security and privacy, 297-312, 2011
3342011
Badnets: Identifying vulnerabilities in the machine learning model supply chain
T Gu, B Dolan-Gavitt, S Garg
arXiv preprint arXiv:1708.06733, 2017
1962017
Robust signatures for kernel data structures
B Dolan-Gavitt, A Srivastava, P Traynor, J Giffin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1742009
Lava: Large-scale automated vulnerability addition
B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ...
2016 IEEE Symposium on Security and Privacy (SP), 110-121, 2016
1272016
Forensic analysis of the Windows registry in memory
B Dolan-Gavitt
digital investigation 5, S26-S32, 2008
1152008
The VAD tree: A process-eye view of physical memory
B Dolan-Gavitt
digital investigation 4, 62-64, 2007
892007
Tappan zee (north) bridge: mining memory accesses for introspection
B Dolan-Gavitt, T Leek, J Hodosh, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
772013
Fine-pruning: Defending against backdooring attacks on deep neural networks
K Liu, B Dolan-Gavitt, S Garg
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
762018
Leveraging forensic tools for virtual machine introspection
B Dolan-Gavitt, B Payne, W Lee
Georgia Institute of Technology, 2011
662011
Repeatable reverse engineering with PANDA
B Dolan-Gavitt, J Hodosh, P Hulin, T Leek, R Whelan
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015
642015
Security systems and methods for distinguishing user-intended traffic from malicious traffic
BD Payne, B Dolan-Gavitt, W Lee
US Patent App. 13/232,830, 2012
382012
Badnets: Evaluating backdooring attacks on deep neural networks
T Gu, K Liu, B Dolan-Gavitt, S Garg
IEEE Access 7, 47230-47244, 2019
322019
Repeatable reverse engineering for the greater good with panda
BF Dolan-Gavitt, J Hodosh, P Hulin, T Leek, R Whelan
272014
Lock-in-Pop: securing privileged operating system kernels by keeping on the beaten path
Y Li, B Dolan-Gavitt, S Weber, J Cappos
2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17), 1-13, 2017
172017
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis
G Severi, T Leek, B Dolan-Gavitt
International Conference on Detection of Intrusions and Malware, and …, 2018
132018
Bug synthesis: challenging bug-finding tools with deep faults
S Roy, A Pandey, B Dolan-Gavitt, Y Hu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
92018
AutoCTF: creating diverse pwnables via automated bug injection
P Hulin, A Davis, R Sridhar, A Fasano, C Gallagher, A Sedlacek, T Leek, ...
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
92017
See No Evil: Evasions in Honeymonkey Systems
B Dolan-Gavitt, Y Nadji
Technical Report, 2010
62010
Chaff Bugs: Deterring Attackers by Making Software Buggier
Z Hu, Y Hu, B Dolan-Gavitt
arXiv preprint arXiv:1808.00659, 2018
42018
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser
K Gallagher, S Patil, B Dolan-Gavitt, D McCoy, N Memon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20