David Brumley

Results: 104



#Item
51Database trigger / Trigger / Computer virus / Pointer / Computing / Software engineering / Computer programming / Abstract interpretation / Symbolic execution / Malware

1 Automatically Identifying Trigger-based Behavior in Malware David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, Heng Yin Carnegie Mellon University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
52Symbolic execution / Software engineering / Programming language implementation / Malware / Algorithm / Assembly language / KeY / Computer program / Software bug / Computing / Formal methods / Abstract interpretation

BitScope: Automatically Dissecting Malicious Binaries David Brumley, Cody Hartwig, Min Gyung Kang, Zhenkai Liang James Newsome, Pongsin Poosankam, Dawn Song, Heng Yin March 18, 2007 Last Modified: May 23, 2007 CMU-CS-07-

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
53Cyberwarfare / Morris worm / Parasitic worm / Antibody / Computer security / Failure / Computer worms / Warhol worm / SQL Slammer

Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin Poosankam

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
54Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 17:23:31
55Predicate transformer semantics / Program logic / KeY / IP / NP / Symbolic execution / PP / Algorithm / Function / Theoretical computer science / Mathematics / Applied mathematics

Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
56Software testing / Automated theorem proving / Concolic testing / Software metrics / KeY / Symbolic execution / Code coverage / Control flow graph / Algorithm / Software / Computing / Formal methods

Enhancing Symbolic Execution with Veritesting Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley Carnegie Mellon University {thanassis, alexandre, sangkilc, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
57C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
58RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

Remote Timing Attacks are Practical David Brumley Stanford University [removed] Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
59Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
60Spamming / Internet standards / Routing / Border Gateway Protocol / IP address / Classless Inter-Domain Routing / Email spam / Botnet / Spam / Internet / Computing / Network architecture

Automatically Inferring the Evolution of Malicious Activity on the Internet Shobha Venkataraman AT&T Labs – Research [removed] David Brumley

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE