Please consider using our BiBTeX file if you reference one of our papers.
Peer reviewed
-
Tachyon: Tandem Execution for Efficient Live Patch
Testing
By Matthew Maurer and David Brumley.
In the Proceedings of the USENIX Security Symposium, 2012. PDF -
Unleashing Mayhem on Binary Code
By Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, and David Brumley.
In the Proceedings of the IEEE Security and Privacy Symposium, 2012. PDF -
ReDeBug: Finding Unpatched Code Clones in Entire OS
Distributions
By Jiyong Jang, Abeer Agrawal, and David Brumley.
In the Proceedings of the IEEE Security and Privacy Symposium, 2012. PDF -
BitShred: Feature Hashing Malware for Scalable
By Jiyong Jang, David Brumley, and Shobha Venkataraman.
In the Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2011. PDF -
Q: Exploit Hardening Made Easy
By Edward J. Schwartz, Thanassis Avgerinos, and David Brumley.
In Proceedings of the 2011 Usenix Security Symposium, August 2011, San Francisco, CA. PDF -
BAP: Binary Analysis Platform
By David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J. Schwartz.
In Proceedings of the 2011 Conference on Computer Aided Verification (CAV 11), July 2011, Snowbird, UT. PDF -
AEG: Automatic Exploit Generation
By Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley.
In Proceedings of the 2011 Network and Distributed System Security Symposium (NDSS 11), Feb. 2011, San Diego, CA. PDF -
TIE: Principled Reverse Engineering of Types in Binary
Programs
By JongHyup Lee, Thanassis Avgerinos and David Brumley.
In Proceedings of the 2011 Network and Distributed System Security Symposium (NDSS 11), Feb. 2011, San Diego, CA. PDF -
Platform-Independent Programs
By Sang Kil Cha, Brian Pak, David Brumley, and Richard J. Lipton.
In Proceedings of 17th ACM Conference on Computer and Communications Security (CCS 10), Oct. 2010, Chicago, IL. PDF -
SplitScreen: Enabling Efficient, Distributed Malware Detection
By Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen.
In the Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10) San Jose, CA, Apr. 2010. PDF - All You Ever Wanted to Know About Dynamic Taint
Analysis and Forward Symbolic Execution (but might have
been afraid to ask)
By Edward J. Schwartz, Thanassis Avgerinos, and David Brumley
In the Proceedings of the 31st IEEE Symposium on Security and Privacy (S&P 10), May 2010, Oakland, CA. PDF - Contractual Anonymity
By Edward J. Schwartz, David Brumley and Jonathan M. McCune
In the Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS 10), March 2010, San Diego, CA. PDF
Technical Reports
- Efficient Directionless Weakest Preconditions
By Ivan Jager and David Brumley
Techincal report, Carnegie Mellon University CyLab, CMU-CyLab-10-002 PDF