Biblio

Export 17 results:
Filters: Author is David Brumley  [Clear All Filters]
2018
Brumley D.  2018.  The Future of Cyber-Autonomy. Enigma 2018 (Enigma 2018).
2015
Burket J, Chapman P, Becker T, Ganas C, Brumley D.  2015.  Automatic Problem Generation for Capture-the-Flag Competitions. 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15).
2014
Egele M, Woo M, Chapman P, Brumley D.  2014.  Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. 23rd USENIX Security Symposium (USENIX Security 14). :303-317.
Bao T, Burket J, Woo M, Turner R, Brumley D.  2014.  BYTEWEIGHT: Learning to Recognize Functions in Binary Code. 23rd USENIX Security Symposium (USENIX Security 14). :845--860.
Rebert A, Cha SKil, Avgerinos T, Foote J, Warren D, Grieco G, Brumley D.  2014.  Optimizing Seed Selection for Fuzzing. 23rd USENIX Security Symposium (USENIX Security 14). :861--875.
Chapman P, Burket J, Brumley D.  2014.  PicoCTF: A Game-Based Computer Security Competition for High School Students. 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14).
2013
Brumley D, Lee JH, Schwartz EJ, Woo M.  2013.  Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. 22nd USENIX Security Symposium (USENIX Security 13). :353--368.
Jang J, Woo M, Brumley D.  2013.  Towards Automatic Software Lineage Inference. 22nd USENIX Security Symposium (USENIX Security 13). :81--96.
2012
Maurer M, Brumley D.  2012.  Tachyon: Tandem Execution for Efficient Live Patch Testing. 21st USENIX Security Symposium (USENIX Security 12). :617--630.
2011
Schwartz EJ, Avgerinos T, Brumley D.  2011.  Q: Exploit Hardening Made Easy. 20th USENIX Security Symposium (USENIX Security 11).
Brumley D, Zalewski M.  2011.  Welcome and Best Paper Awards. 5th USENIX Workshop on Offensive Technologies (WOOT 11).
2010
Cha SKil, Moraru I, Jang J, Truelove J, Brumley D, Andersen DG.  2010.  SplitScreen: Enabling Efficient, Distributed Malware Detection. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
2006
Brumley D, Song D.  2006.  Towards Attack-Agnostic Defenses . First USENIX Workshop on Hot Topics in Security (HotSec 06).
2004
Brumley D, Song D.  2004.  Privtrans: Automatically Partitioning Programs for Privilege Separation. 13th USENIX Security Symposium (USENIX Security 04).
2003
Brumley D, Boneh D.  2003.  Remote Timing Attacks Are Practical. 12th USENIX Security Symposium (USENIX Security 03).
Sapuntzakis C, Brumley D, Chandra R, Zeldovich N, Chow J, Lam MS, Rosenblum M.  2003.  Virtual Appliances for Deploying and Maintaining Software. 17th Large Installation Systems Administration Conference (LISA 03).