Home
Binary
Malware
AEG
TIE
Anonymity
Verification
PIP
People
Publications
David Brumley's
Research Home
Binary Analysis
Security of the code you execute
Malware Analysis
Are these programs bad or good?
Automatic Exploit Generation
Given a program, generate exploits automatically
Type Inference on Binaries
Recovering source types from binary executables
Anonymity
Balancing anonymity vs. accountability
Verification
Making verification faster
Multi-arch Program
A single binary that runs on multiple platforms
People
Research team members, past and present
Publications
Read about it
Copyright 2009, 2010 David Brumley