2008 |
15 | EE | Dawn Xiaodong Song,
David Brumley,
Heng Yin,
Juan Caballero,
Ivan Jager,
Min Gyung Kang,
Zhenkai Liang,
James Newsome,
Pongsin Poosankam,
Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis.
ICISS 2008: 1-25 |
14 | EE | David Brumley,
Pongsin Poosankam,
Dawn Xiaodong Song,
Jiang Zheng:
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
IEEE Symposium on Security and Privacy 2008: 143-157 |
13 | EE | David Brumley,
Cody Hartwig,
Zhenkai Liang,
James Newsome,
Dawn Xiaodong Song,
Heng Yin:
Automatically Identifying Trigger-based Behavior in Malware.
Botnet Detection 2008: 65-88 |
12 | EE | David Brumley,
James Newsome,
D. Song,
Hao Wang,
Somesh Jha:
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
IEEE Trans. Dependable Sec. Comput. 5(4): 224-241 (2008) |
2007 |
11 | EE | David Brumley,
Hao Wang,
Somesh Jha,
Dawn Xiaodong Song:
Creating Vulnerability Signatures Using Weakest Preconditions.
CSF 2007: 311-325 |
10 | EE | Joseph Tucek,
James Newsome,
Shan Lu,
Chengdu Huang,
Spiros Xanthos,
David Brumley,
Yuanyuan Zhou,
Dawn Xiaodong Song:
Sweeper: a lightweight end-to-end system for defending against fast worms.
EuroSys 2007: 115-128 |
9 | EE | Nikita Borisov,
David Brumley,
Helen J. Wang,
John Dunagan,
Pallavi Joshi,
Chuanxiong Guo:
Generic Application-Level Protocol Analyzer and its Language.
NDSS 2007 |
8 | EE | David Brumley,
Dawn Xiaodong Song,
Tzi-cker Chiueh,
Rob Johnson,
Huijia Lin:
RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
NDSS 2007 |
2006 |
7 | EE | James Newsome,
David Brumley,
Jason Franklin,
Dawn Xiaodong Song:
Replayer: automatic protocol replay by binary analysis.
ACM Conference on Computer and Communications Security 2006: 311-321 |
6 | EE | David Brumley,
Li-Hao Liu,
Pongsin Poosankam,
Dawn Xiaodong Song:
Design space and analysis of worm defense strategies.
ASIACCS 2006: 125-137 |
5 | EE | David Brumley,
James Newsome,
Dawn Xiaodong Song,
Hao Wang,
Somesh Jha:
Towards Automatic Generation of Vulnerability-Based Signatures.
IEEE Symposium on Security and Privacy 2006: 2-16 |
4 | EE | James Newsome,
David Brumley,
Dawn Xiaodong Song:
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
NDSS 2006 |
2005 |
3 | EE | David Brumley,
Dan Boneh:
Remote timing attacks are practical.
Computer Networks 48(5): 701-716 (2005) |
2004 |
2 | EE | David Brumley,
Dawn Xiaodong Song:
Privtrans: Automatically Partitioning Programs for Privilege Separation.
USENIX Security Symposium 2004: 57-72 |
2003 |
1 | EE | Constantine P. Sapuntzakis,
David Brumley,
Ramesh Chandra,
Nickolai Zeldovich,
Jim Chow,
Monica S. Lam,
Mendel Rosenblum:
Virtual Appliances for Deploying and Maintaining Software.
LISA 2003: 181-194 |