Export 17 results:
Filters: Author is David Brumley  [Clear All Filters]
Brumley D.  2018.  The Future of Cyber-Autonomy. Enigma 2018 (Enigma 2018).
Burket J, Chapman P, Becker T, Ganas C, Brumley D.  2015.  Automatic Problem Generation for Capture-the-Flag Competitions. 2015 {USENIX} Summit on Gaming, Games, and Gamification in Security Education (3GSE 15).
Egele M, Woo M, Chapman P, Brumley D.  2014.  Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :303-317.
Bao T, Burket J, Woo M, Turner R, Brumley D.  2014.  BYTEWEIGHT: Learning to Recognize Functions in Binary Code. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :845--860.
Rebert A, Cha SKil, Avgerinos T, Foote J, Warren D, Grieco G, Brumley D.  2014.  Optimizing Seed Selection for Fuzzing. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :861--875.
Chapman P, Burket J, Brumley D.  2014.  PicoCTF: A Game-Based Computer Security Competition for High School Students. 2014 {USENIX} Summit on Gaming, Games, and Gamification in Security Education (3GSE 14).
Brumley D, Lee JH, Schwartz EJ, Woo M.  2013.  Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. 22nd {USENIX} Security Symposium ({USENIX} Security 13). :353--368.
Jang J, Woo M, Brumley D.  2013.  Towards Automatic Software Lineage Inference. 22nd {USENIX} Security Symposium ({USENIX} Security 13). :81--96.
Maurer M, Brumley D.  2012.  Tachyon: Tandem Execution for Efficient Live Patch Testing. 21st {USENIX} Security Symposium ({USENIX} Security 12). :617--630.
Schwartz EJ, Avgerinos T, Brumley D.  2011.  Q: Exploit Hardening Made Easy. 20th {USENIX} Security Symposium ({USENIX} Security 11).
Brumley D, Zalewski M.  2011.  Welcome and Best Paper Awards. 5th {USENIX} Workshop on Offensive Technologies ({WOOT} 11).
Cha SKil, Moraru I, Jang J, Truelove J, Brumley D, Andersen DG.  2010.  SplitScreen: Enabling Efficient, Distributed Malware Detection. 7th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 10).
Brumley D, Song D.  2006.  Towards Attack-Agnostic Defenses . First {USENIX} Workshop on Hot Topics in Security (HotSec 06).
Brumley D, Song D.  2004.  Privtrans: Automatically Partitioning Programs for Privilege Separation. 13th {USENIX} Security Symposium ({USENIX} Security 04).
Brumley D, Boneh D.  2003.  Remote Timing Attacks Are Practical. 12th {USENIX} Security Symposium ({USENIX} Security 03).
Sapuntzakis C, Brumley D, Chandra R, Zeldovich N, Chow J, Lam MS, Rosenblum M.  2003.  Virtual Appliances for Deploying and Maintaining Software. 17th Large Installation Systems Administration Conference ({LISA} 03).