David Brumley

Results: 104



#Item
91Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
92Computer Networks[removed]–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Computer Networks[removed]–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
93A Generic Application-Level Protocol Analyzer and its Language Nikita Borisov UIUC [removed]  David J. Brumley

A Generic Application-Level Protocol Analyzer and its Language Nikita Borisov UIUC [removed] David J. Brumley

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
94Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos, and David Brumley Carnegie Mellon University[removed]

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos, and David Brumley Carnegie Mellon University[removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
95Alias Analysis for Assembly  David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R

Alias Analysis for Assembly David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
96Creating Vulnerability Signatures Using Weakest Preconditions David Brumley Hao Wang  Somesh Jha

Creating Vulnerability Signatures Using Weakest Preconditions David Brumley Hao Wang Somesh Jha

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
97The BAP Handbook David Brumley, Ivan Jager, Edward J. Schwartz, and Spencer Whitman April 10, 2014 2

The BAP Handbook David Brumley, Ivan Jager, Edward J. Schwartz, and Spencer Whitman April 10, 2014 2

Add to Reading List

Source URL: bap.ece.cmu.edu

Language: English - Date: 2014-04-10 17:39:32
98Enhancing Symbolic Execution with Veritesting Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley Carnegie Mellon University {thanassis, alexandre, sangkilc, dbrumley}@cmu.edu

Enhancing Symbolic Execution with Veritesting Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley Carnegie Mellon University {thanassis, alexandre, sangkilc, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-03-17 03:36:49
99Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
100Unleashing M AYHEM on Binary Code Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert and David Brumley Carnegie Mellon University Pittsburgh, PA {sangkilc, thanassis, alexandre.rebert, dbrumley}@cmu.edu

Unleashing M AYHEM on Binary Code Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert and David Brumley Carnegie Mellon University Pittsburgh, PA {sangkilc, thanassis, alexandre.rebert, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-02-15 14:07:11