Please consider using our BiBTeX file if you reference one of our papers.

Peer reviewed

  1. Tachyon: Tandem Execution for Efficient Live Patch Testing
    By Matthew Maurer and David Brumley.
    In the Proceedings of the USENIX Security Symposium, 2012.
    PDF
  2. Unleashing Mayhem on Binary Code
    By Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, and David Brumley.
    In the Proceedings of the IEEE Security and Privacy Symposium, 2012. PDF
  3. ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
    By Jiyong Jang, Abeer Agrawal, and David Brumley.
    In the Proceedings of the IEEE Security and Privacy Symposium, 2012. PDF
  4. BitShred: Feature Hashing Malware for Scalable
    By Jiyong Jang, David Brumley, and Shobha Venkataraman.
    In the Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2011. PDF
  5. Q: Exploit Hardening Made Easy
    By Edward J. Schwartz, Thanassis Avgerinos, and David Brumley.
    In Proceedings of the 2011 Usenix Security Symposium, August 2011, San Francisco, CA. PDF
  6. BAP: Binary Analysis Platform
    By David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J. Schwartz.
    In Proceedings of the 2011 Conference on Computer Aided Verification (CAV 11), July 2011, Snowbird, UT. PDF
  7. AEG: Automatic Exploit Generation
    By Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley.
    In Proceedings of the 2011 Network and Distributed System Security Symposium (NDSS 11), Feb. 2011, San Diego, CA. PDF
  8. TIE: Principled Reverse Engineering of Types in Binary Programs
    By JongHyup Lee, Thanassis Avgerinos and David Brumley.
    In Proceedings of the 2011 Network and Distributed System Security Symposium (NDSS 11), Feb. 2011, San Diego, CA. PDF
  9. Platform-Independent Programs
    By Sang Kil Cha, Brian Pak, David Brumley, and Richard J. Lipton.
    In Proceedings of 17th ACM Conference on Computer and Communications Security (CCS 10), Oct. 2010, Chicago, IL. PDF
  10. SplitScreen: Enabling Efficient, Distributed Malware Detection
    By Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Truelove, David Brumley, and David G. Andersen.
    In the Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10) San Jose, CA, Apr. 2010. PDF
  11. All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask)
    By Edward J. Schwartz, Thanassis Avgerinos, and David Brumley
    In the Proceedings of the 31st IEEE Symposium on Security and Privacy (S&P 10), May 2010, Oakland, CA. PDF
  12. Contractual Anonymity
    By Edward J. Schwartz, David Brumley and Jonathan M. McCune
    In the Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS 10), March 2010, San Diego, CA. PDF

Technical Reports

  1. Efficient Directionless Weakest Preconditions
    By Ivan Jager and David Brumley
    Techincal report, Carnegie Mellon University CyLab, CMU-CyLab-10-002
    PDF