Remote timing attacks are practical D Brumley, D Boneh Computer Networks 48 (5), 701-716, 2005 | 1371 | 2005 |
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask) EJ Schwartz, T Avgerinos, D Brumley 2010 IEEE symposium on Security and privacy, 317-331, 2010 | 1134 | 2010 |
BitBlaze: A new approach to computer security via binary analysis D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ... Information Systems Security: 4th International Conference, ICISS 2008 …, 2008 | 1086 | 2008 |
Unleashing mayhem on binary code SK Cha, T Avgerinos, A Rebert, D Brumley 2012 IEEE Symposium on Security and Privacy, 380-394, 2012 | 805 | 2012 |
BAP: A binary analysis platform D Brumley, I Jager, T Avgerinos, EJ Schwartz Computer Aided Verification: 23rd International Conference, CAV 2011 …, 2011 | 679 | 2011 |
An empirical study of cryptographic misuse in android applications M Egele, D Brumley, Y Fratantonio, C Kruegel Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 633 | 2013 |
Automatic exploit generation T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley Communications of the ACM 57 (2), 74-84, 2014 | 616 | 2014 |
Q: Exploit hardening made easy EJ Schwartz, T Avgerinos, D Brumley 20th USENIX Security Symposium (USENIX Security 11), 2011 | 560* | 2011 |
Towards automated dynamic analysis for linux-based embedded firmware. DD Chen, M Woo, D Brumley, M Egele NDSS 1, 1.1-8.1, 2016 | 519 | 2016 |
Automatic patch-based exploit generation is possible: Techniques and implications D Brumley, P Poosankam, D Song, J Zheng 2008 IEEE Symposium on Security and Privacy (sp 2008), 143-157, 2008 | 416 | 2008 |
Towards automatic generation of vulnerability-based signatures D Brumley, J Newsome, D Song, H Wang, S Jha 2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006 | 416 | 2006 |
Bitshred: feature hashing malware for scalable triage and semantic analysis J Jang, D Brumley, S Venkataraman Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 397 | 2011 |
Enhancing symbolic execution with veritesting T Avgerinos, A Rebert, SK Cha, D Brumley Proceedings of the 36th International Conference on Software Engineering …, 2014 | 355 | 2014 |
{BYTEWEIGHT}: Learning to recognize functions in binary code T Bao, J Burket, M Woo, R Turner, D Brumley 23rd USENIX Security Symposium (USENIX Security 14), 845-860, 2014 | 348 | 2014 |
Program-adaptive mutational fuzzing SK Cha, M Woo, D Brumley 2015 IEEE Symposium on Security and Privacy, 725-741, 2015 | 337 | 2015 |
Automatically identifying trigger-based behavior in malware D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin Botnet Detection: Countering the Largest Security Threat, 65-88, 2008 | 337 | 2008 |
Privtrans: Automatically partitioning programs for privilege separation D Brumley, D Song USENIX Security Symposium 57 (72), 2004 | 328 | 2004 |
Optimizing seed selection for fuzzing A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley 23rd USENIX Security Symposium (USENIX Security 14), 861-875, 2014 | 324 | 2014 |
TIE: Principled reverse engineering of types in binary programs JH Lee, T Avgerinos, D Brumley Carnegie Mellon University, 2011 | 299 | 2011 |
ReDeBug: finding unpatched code clones in entire os distributions J Jang, A Agrawal, D Brumley 2012 IEEE Symposium on Security and Privacy, 48-62, 2012 | 296 | 2012 |