Conference Cloud Datacenter SDN Monitoring 2018 464-470 Roy A, Bansal D, Brumley D, Chandrappa HK, Sharma P, Tewari R, Arzani B, Snoeren AC
Journal Article The Mayhem Cyber Reasoning System 2018 • IEEE Security and Privacy • 16(2):52-60 Avgerinos T, Brumley D, Davis J, Goulden R, Nighswander T, Rebert A, Williamson N
Conference How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games 2017 • Proceedings of the Computer Security Foundations Workshop • 7-21 Bao T, Shoshitaishvili Y, Wang R, Kruegel C, Vigna G, Brumley D
Conference Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification 2017 • Lecture Notes in Computer Science • 10427:453-474 Reynolds A, Woo M, Barrett C, Brumley D, Liang T, Tinelli C
Conference Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits 2017 • IEEE Symposium on Security and Privacy: Proceedings • 824-839 Bao T, Wang R, Shoshitaishvili Y, Brumley D
Journal Article Enhancing Symbolic Execution with Veritesting 2016 • Communications of the ACM • 59(6):93-100 Avgerinos T, Rebert A, Cha SK, Brumley D
Conference Towards Automated Dynamic Analysis for Linux-based Embedded Firmware 2016 • 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016) Chen DD, Egele M, Woo M, Brumley D
Conference Automatic problem generation for capture-the-flag competitions 2015 • 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education, 3GSE 2015 Burket J, Chapman P, Becker T, Ganas C, Brumley D
Conference Automatically Deriving Pointer Reference Expressions from Binary Code for Memory Dump Analysis 2015 • 2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS • 614-624 Fu Y, Lin Z, Brumley D
Conference Program-Adaptive Mutational Fuzzing 2015 • IEEE Symposium on Security and Privacy: Proceedings • 725-741 Cha SK, Woo M, Brumley D
Journal Article Automatic Exploit Generation 2014 • Communications of the ACM • 57(2):74-84 Avgerinos T, Cha SK, Rebert A, Schwartz EJ, Woo M, Brumley D
Conference Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components 2014 • PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM • 303-317 Egele M, Woo M, Chapman P, Brumley D
Conference BYTEWEIGHT: Learning to Recognize Functions in Binary Code 2014 • PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM • 845-860 Bao T, Burket J, Woo M, Turner R, Brumley D
Conference Enhancing Symbolic Execution with Veritesting 2014 • Proceedings - International Conference on Software Engineering • 1083-1094 Avgerinos T, Rebert A, Cha SK, Brumley D
Conference Optimizing Seed Selection for Fuzzing 2014 • PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM • 861-875 Rebert A, Cha SK, Avgerinos T, Foote J, Warren D, Grieco G, Brumley D
Conference PicoCTF: A game-based computer security competition for high school students 2014 • 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education, 3GSE 2014 Chapman P, Burket J, Brumley D
Conference An empirical study of cryptographic misuse in android applications 2013 • Proceedings of the ACM Conference on Computer and Communications Security • 73-84 Egele M, Brumley D, Fratantonio Y, Kruegel C
Journal Article Automatically Inferring the Evolution of Malicious Activity on the Internet 2013 • 20th Annual Network and Distributed System Security Symposium, NDSS 2013 Venkataraman S, Brumley D, Spatscheck O, Sen S
Conference Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring 2013 • Proceedings of the 22nd USENIX Security Symposium • 353-368 Schwartz EJ, Lee JH, Woo M, Brumley D
Conference Scheduling black-box mutational fuzzing 2013 • Proceedings of the ACM Conference on Computer and Communications Security • 511-522 Woo M, Kil S, Gottlieb S, Brumley D
Conference Towards automatic software lineage inference 2013 • Proceedings of the 22nd USENIX Security Symposium • 81-96 Jang J, Woo M, Brumley D
Conference GPS software attacks 2012 • Proceedings of the ACM Conference on Computer and Communications Security • 450-461 Nighswander T, Ledvina B, Diamond J, Brumley R, Brumley D
Conference ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions 2012 • IEEE Symposium on Security and Privacy: Proceedings • 48-62 Jang J, Agrawal A, Brumley D
Conference Tachyon: Tandem execution for efficient live patch testing 2012 • Proceedings of the 21st USENIX Security Symposium • 617-630 Maurer M, Brumley D
Conference Unleashing MAYHEM on Binary Code 2012 • IEEE Symposium on Security and Privacy: Proceedings • 380-394 Cha SK, Avgerinos T, Rebert A, Brumley D