1![An Empirical Study of Cryptographic Misuse in Android Applications Manuel Egele, David Brumley Yanick Fratantonio, Christopher Kruegel An Empirical Study of Cryptographic Misuse in Android Applications Manuel Egele, David Brumley Yanick Fratantonio, Christopher Kruegel](https://www.pdfsearch.io/img/e4d329f3845634e78bd1cc3df4a398a6.jpg) | Add to Reading ListSource URL: www.s3.eurecom.frLanguage: English - Date: 2017-11-07 11:46:31
|
---|
2![Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing](https://www.pdfsearch.io/img/418e17f9371f6d005879da93c820a2ec.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2010-06-04 16:24:13
|
---|
3![AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract](https://www.pdfsearch.io/img/22bbd1d33d88927a91ab235755aea68e.jpg) | Add to Reading ListSource URL: users.ece.cmu.edu- Date: 2014-05-29 15:38:01
|
---|
4![Alias Analysis for Assembly David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R Alias Analysis for Assembly David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R](https://www.pdfsearch.io/img/2b94558214552f75378d605ea946dd89.jpg) | Add to Reading ListSource URL: reports-archive.adm.cs.cmu.edu- Date: 2007-09-24 18:53:05
|
---|
5![All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA](https://www.pdfsearch.io/img/bc4d12a4ca3a774c3a387fecf8d5fbce.jpg) | Add to Reading ListSource URL: users.ece.cmu.edu- Date: 2014-05-29 15:38:01
|
---|
6![Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song](https://www.pdfsearch.io/img/21af87576b4bb15dff5fe83d304c8df5.jpg) | Add to Reading ListSource URL: users.ece.cmu.edu- Date: 2014-05-29 15:38:01
|
---|
7![Platform-Independent Programs Sang Kil Cha, Brian Pak, David Brumley Richard J. Lipton Carnegie Mellon University Platform-Independent Programs Sang Kil Cha, Brian Pak, David Brumley Richard J. Lipton Carnegie Mellon University](https://www.pdfsearch.io/img/eb4e8c10128311a2886210dca2c167ef.jpg) | Add to Reading ListSource URL: users.ece.cmu.edu- Date: 2014-05-29 15:38:01
|
---|
8![Creating Vulnerability Signatures Using Weakest Preconditions David Brumley Hao Wang Somesh Jha Creating Vulnerability Signatures Using Weakest Preconditions David Brumley Hao Wang Somesh Jha](https://www.pdfsearch.io/img/016b62f33f830135130eb1bdb3a1f1a0.jpg) | Add to Reading ListSource URL: users.ece.cmu.edu- Date: 2014-05-29 15:38:01
|
---|
9![Privtrans: Automatically Partitioning Programs for Privilege Separation David Brumley and Dawn Song Carnegie Mellon University {david.brumley,dawn.song}@cs.cmu.edu ∗ Abstract Privilege separation partitions a single pr Privtrans: Automatically Partitioning Programs for Privilege Separation David Brumley and Dawn Song Carnegie Mellon University {david.brumley,dawn.song}@cs.cmu.edu ∗ Abstract Privilege separation partitions a single pr](https://www.pdfsearch.io/img/027d4b02bc2832c43bb57f373d1a6dbb.jpg) | Add to Reading ListSource URL: users.ece.cmu.edu- Date: 2014-05-29 15:38:01
|
---|
10![RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson , , Huijia Lin, Dawn Song el RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson , , Huijia Lin, Dawn Song el](https://www.pdfsearch.io/img/45cc86d93372ac1694ae30f34e618d99.jpg) | Add to Reading ListSource URL: users.ece.cmu.edu- Date: 2014-05-29 15:38:01
|
---|