Conference Design space and analysis of worm defense strategies 2006 125-137 Brumley D, Liu L-H, Poosankam P, Song D
Conference Replayer 2006 • Proceedings of the ACM Conference on Computer and Communications Security • 311-321 Newsome J, Brumley D, Franklin J, Song D
Journal Article Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures 2006 Brumley D, Newsome J, Song D, Wang H, Jha S
Conference Towards Attack-agnostic defenses 2006 • 1st USENIX Workshop on Hot Topics in Security, HotSec 2006 • 57-62 Brumley D, Song D
Conference Towards automatic generation of vulnerability-based signatures 2006 • IEEE Symposium on Security and Privacy: Proceedings • 2-+ Brumley D, Newsome J, Song D, Wang H, Jha S
Conference Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software 2006 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2006 Newsome J, Brumley D, Song D
Journal Article Remote timing attacks are practical 2005 • Computer Networks • 48(5):701-716 Brumley D, Boneh D
Conference Privtrans: Automatically partitioning programs for privilege separation 2004 • USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM • 57-71 Brumley D, Song D
Conference Privtrans: Automatically partitioning programs for privilege separation 2004 • Proceedings of the 13th USENIX Security Symposium Brumley D, Song D
Conference Remote timing attacks are practical 2003 • Proceedings of the 12th USENIX Security Symposium • 1-13 Brumley D, Boneh D
Conference Virtual appliances for deploying and maintaining software 2003 • 17th Large Installation Systems Administration Conference, LISA 2003 • 181-194 Sapuntzakis C, Brumley D, Chandra R, Zeldovich N, Chow J, Lam MS, Rosenblum M