dblp.uni-trier.dewww.uni-trier.de

David Brumley

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
15EEDawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena: BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25
14EEDavid Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng: Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. IEEE Symposium on Security and Privacy 2008: 143-157
13EEDavid Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin: Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88
12EEDavid Brumley, James Newsome, D. Song, Hao Wang, Somesh Jha: Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. IEEE Trans. Dependable Sec. Comput. 5(4): 224-241 (2008)
2007
11EEDavid Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song: Creating Vulnerability Signatures Using Weakest Preconditions. CSF 2007: 311-325
10EEJoseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song: Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128
9EENikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo: Generic Application-Level Protocol Analyzer and its Language. NDSS 2007
8EEDavid Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin: RICH: Automatically Protecting Against Integer-Based Vulnerabilities. NDSS 2007
2006
7EEJames Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song: Replayer: automatic protocol replay by binary analysis. ACM Conference on Computer and Communications Security 2006: 311-321
6EEDavid Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song: Design space and analysis of worm defense strategies. ASIACCS 2006: 125-137
5EEDavid Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha: Towards Automatic Generation of Vulnerability-Based Signatures. IEEE Symposium on Security and Privacy 2006: 2-16
4EEJames Newsome, David Brumley, Dawn Xiaodong Song: Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. NDSS 2006
2005
3EEDavid Brumley, Dan Boneh: Remote timing attacks are practical. Computer Networks 48(5): 701-716 (2005)
2004
2EEDavid Brumley, Dawn Xiaodong Song: Privtrans: Automatically Partitioning Programs for Privilege Separation. USENIX Security Symposium 2004: 57-72
2003
1EEConstantine P. Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum: Virtual Appliances for Deploying and Maintaining Software. LISA 2003: 181-194

Coauthor Index

1Dan Boneh [3]
2Nikita Borisov [9]
3Juan Caballero [15]
4Ramesh Chandra [1]
5Tzi-cker Chiueh [8]
6Jim Chow [1]
7John Dunagan [9]
8Jason Franklin [7]
9Chuanxiong Guo [9]
10Cody Hartwig [13]
11Chengdu Huang [10]
12Ivan Jager [15]
13Somesh Jha [5] [11] [12]
14Rob Johnson [8]
15Pallavi Joshi [9]
16Min Gyung Kang [15]
17Monica S. Lam [1]
18Zhenkai Liang [13] [15]
19Huijia Lin [8]
20Li-Hao Liu [6]
21Shan Lu [10]
22James Newsome [4] [5] [7] [10] [12] [13] [15]
23Pongsin Poosankam [6] [14] [15]
24Mendel Rosenblum [1]
25Constantine P. Sapuntzakis [1]
26Prateek Saxena [15]
27D. Song [12]
28Dawn Xiaodong Song [2] [4] [5] [6] [7] [8] [10] [11] [13] [14] [15]
29Joseph Tucek [10]
30Hao Wang [5] [11] [12]
31Helen J. Wang [9]
32Spiros Xanthos [10]
33Heng Yin [13] [15]
34Nickolai Zeldovich [1]
35Jiang Zheng [14]
36Yuanyuan Zhou [10]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)