David Brumley

Results: 104



#Item
81BAP: A Binary Analysis Platform David Brumley Ivan Jager Thanassis Avgerinos Edward J. Schwartz Carnegie Mellon University

BAP: A Binary Analysis Platform David Brumley Ivan Jager Thanassis Avgerinos Edward J. Schwartz Carnegie Mellon University

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
82Unleashing M AYHEM on Binary Code Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert and David Brumley Carnegie Mellon University Pittsburgh, PA {sangkilc, thanassis, alexandre.rebert, dbrumley}@cmu.edu

Unleashing M AYHEM on Binary Code Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert and David Brumley Carnegie Mellon University Pittsburgh, PA {sangkilc, thanassis, alexandre.rebert, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2012-09-22 22:22:15
83BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis Jiyong Jang David Brumley

BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis Jiyong Jang David Brumley

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
84A Contractual Anonymity System  Edward J. Schwartz, David Brumley and Jonathan M. McCune Carnegie Mellon University, CyLab NDSS 2010: March 2nd, 2010

A Contractual Anonymity System Edward J. Schwartz, David Brumley and Jonathan M. McCune Carnegie Mellon University, CyLab NDSS 2010: March 2nd, 2010

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
    85All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) (Yes, we were trying to overflow the title length field

    All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) (Yes, we were trying to overflow the title length field

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-12-17 15:18:11
    86Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu  Abstract

    Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    87Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu  Pongsin Poosankam

    Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin Poosankam

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    88Platform-Independent Programs Sang Kil Cha, Brian Pak, David Brumley Richard J. Lipton  Carnegie Mellon University

    Platform-Independent Programs Sang Kil Cha, Brian Pak, David Brumley Richard J. Lipton Carnegie Mellon University

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    89Virtual Appliances for Deploying and Maintaining Software Constantine Sapuntzakis David Brumley Ramesh Chandra Nickolai Zeldovich Jim Chow

    Virtual Appliances for Deploying and Maintaining Software Constantine Sapuntzakis David Brumley Ramesh Chandra Nickolai Zeldovich Jim Chow

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    90Creating Vulnerability Signatures Using Weakest Preconditions David Brumley Hao Wang  Somesh Jha

    Creating Vulnerability Signatures Using Weakest Preconditions David Brumley Hao Wang Somesh Jha

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01