The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Brumley: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song
    Design space and analysis of worm defense strategies. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:125-137 [Conf]
  2. James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song
    Replayer: automatic protocol replay by binary analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:311-321 [Conf]
  3. Constantine P. Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum
    Virtual Appliances for Deploying and Maintaining Software. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:181-194 [Conf]
  4. James Newsome, David Brumley, Dawn Xiaodong Song
    Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  5. David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha
    Towards Automatic Generation of Vulnerability-Based Signatures. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:2-16 [Conf]
  6. David Brumley, Dawn Xiaodong Song
    Privtrans: Automatically Partitioning Programs for Privilege Separation. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:57-72 [Conf]
  7. David Brumley, Dan Boneh
    Remote timing attacks are practical. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:5, pp:701-716 [Journal]
  8. Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song
    Sweeper: a lightweight end-to-end system for defending against fast worms. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2007, pp:115-128 [Conf]

  9. Creating Vulnerability Signatures Using Weakest Preconditions. [Citation Graph (, )][DBLP]


  10. BitBlaze: A New Approach to Computer Security via Binary Analysis. [Citation Graph (, )][DBLP]


  11. Generic Application-Level Protocol Analyzer and its Language. [Citation Graph (, )][DBLP]


  12. RICH: Automatically Protecting Against Integer-Based Vulnerabilities. [Citation Graph (, )][DBLP]


  13. SplitScreen: Enabling Efficient, Distributed Malware Detection. [Citation Graph (, )][DBLP]


  14. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). [Citation Graph (, )][DBLP]


  15. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002