Journal Article AEG: Automatic Exploit Generation 2011 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2011 Avgerinos T, Cha SK, Hao BLT, Brumley D
Conference BAP: A binary analysis platform 2011 • Lecture Notes in Computer Science • 6806 LNCS:463-469 Brumley D, Jager I, Avgerinos T, Schwartz EJ
Conference BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis 2011 • Proceedings of the ACM Conference on Computer and Communications Security • 309-320 Jang J, Brumley D, Venkataraman S
Conference Q: Exploit hardening made easy 2011 • Proceedings of the 20th USENIX Security Symposium • 379-394 Schwartz EJ, Avgerinos T, Brumley D
Journal Article SplitScreen: Enabling Efficient, Distributed Malware Detection 2011 • Journal of Communications and Networks • 13(2):187-200 Cha SK, Moraru I, Jang J, Truelove J, Brumley D, Andersen DG
Journal Article TIE: Principled Reverse Engineering of Types in Binary Programs 2011 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2011 Lee JH, Avgerinos T, Brumley D
Journal Article A Contractual Anonymity System 2010 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2010 Schwartz EJ, Brumley D, McCune JM
Conference All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) 2010 • IEEE Symposium on Security and Privacy: Proceedings • 317-331 Schwartz EJ, Avgerinos T, Brumley D
Journal Article Efficient Directionless Weakest Preconditions (CMU-CyLab-10-002) 2010 Brumley D, Jager I
Conference Platform-Independent Programs 2010 • PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10) • 547-558 Cha SK, Pak B, Brumley D, Lipton RJ
Conference Platform-independent programs 2010 • Proceedings of the ACM Conference on Computer and Communications Security • 547-558 Cha SK, Pak B, Brumley D, Lipton RJ
Conference SplitScreen: Enabling efficient, distributed malware detection 2010 • Proceedings of NSDI 2010: 7th USENIX Symposium on Networked Systems Design and Implementation • 377-390 Cha SK, Moraru I, Jang J, Truelove J, Brumley D, Andersen DG
Journal Article BitShred: Fast, Scalable Code Reuse Detection in Binary Code (CMU-CyLab-10-006) 2009 Jang J, Brumley D
Conference Automatic patch-based exploit generation is possible: Techniques and implications 2008 • IEEE Symposium on Security and Privacy: Proceedings • 143-+ Brumley D, Poosankam P, Song D, Zheng J
Journal Article Automatically identifying trigger-based behavior in malware 2008 • Advances in Information Security • 36:65-88 Brumley D, Hartwig C, Liang Z, Newsome J, Song D, Yin H
Conference BitBlaze: A New Approach to Computer Security via Binary Analysis 2008 • Lecture Notes in Computer Science • 5352:1-+ Song D, Brumley D, Yin H, Caballero J, Jager I, Kang MG, Liang Z, Newsome J, Poosankam P, Saxena P
Journal Article Theory and Techniques for Automated Generation of Vulnerability-Based Signatures 2008 • IEEE Transactions on Dependable and Secure Computing • 5(4):224-241 Brumley D, Newsome J, Song D, Wang H, Jha S
Conference A Generic Application-Level Protocol Analyzer and its Language 2007 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007 Borisov N, Brumley DJ, Wang HJ, Dunagan J, Joshi P, Guo C
Conference Creating vulnerability signatures using weakest preconditions 2007 • Proceedings - IEEE Computer Security Foundations Symposium • 311-325 Brumley D, Wang H, Jha S, Song D
Conference RICH: Automatically Protecting Against Integer-Based Vulnerabilities 2007 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007 Brumley D, Chiueh TC, Johnson R, Lin H, Song D
Journal Article Sting: An End-to-End Self-Healing System for Defending against Internet Worms 2007 • Advances in Information Security • 27:147-170 Brumley D, Newsome J, Song D
Journal Article Sweeper 2007 • Operating Systems Review • 41(3):115-128 Tucek J, Newsome J, Lu S, Huang C, Xanthos S, Brumley D, Zhou Y, Song D
Conference Sweeper: A lightweight end-to-end system for defending against fast worms 2007 • Operating Systems Review • 115-128 Tucek J, Lu S, Huang C, Xanthos S, Zhou Y, Newsome J, Brumley D, Song D
Journal Article Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation 2007 • USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM • 213-228 Brumley D, Caballero J, Liang Z, Newsome J, Song D