USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 17 results:
Filters: Author is David Brumley [Clear All Filters]
The Future of Cyber-Autonomy. Enigma 2018 (Enigma 2018).
.
2018. Automatic Problem Generation for Capture-the-Flag Competitions. 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15).
.
2015. Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. 23rd USENIX Security Symposium (USENIX Security 14). :303-317.
.
2014. BYTEWEIGHT: Learning to Recognize Functions in Binary Code. 23rd USENIX Security Symposium (USENIX Security 14). :845--860.
.
2014. Optimizing Seed Selection for Fuzzing. 23rd USENIX Security Symposium (USENIX Security 14). :861--875.
.
2014. PicoCTF: A Game-Based Computer Security Competition for High School Students. 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14).
.
2014. Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. 22nd USENIX Security Symposium (USENIX Security 13). :353--368.
.
2013. Towards Automatic Software Lineage Inference. 22nd USENIX Security Symposium (USENIX Security 13). :81--96.
.
2013. Tachyon: Tandem Execution for Efficient Live Patch Testing. 21st USENIX Security Symposium (USENIX Security 12). :617--630.
.
2012. Q: Exploit Hardening Made Easy. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. Welcome and Best Paper Awards. 5th USENIX Workshop on Offensive Technologies (WOOT 11).
.
2011. SplitScreen: Enabling Efficient, Distributed Malware Detection. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
.
2010. Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. 16th USENIX Security Symposium (USENIX Security 07).
.
2007. Towards Attack-Agnostic Defenses . First USENIX Workshop on Hot Topics in Security (HotSec 06).
.
2006. Privtrans: Automatically Partitioning Programs for Privilege Separation. 13th USENIX Security Symposium (USENIX Security 04).
.
2004. Remote Timing Attacks Are Practical. 12th USENIX Security Symposium (USENIX Security 03).
.
2003. Virtual Appliances for Deploying and Maintaining Software. 17th Large Installation Systems Administration Conference (LISA 03).
.
2003.