David Brumley
According to our database1,
David Brumley
authored at least 56 papers
between 2000 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
Proceedings of the Internet Measurement Conference 2018, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the Computer Aided Verification - 29th International Conference, 2017
2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Automatically deriving pointer reference expressions from binary code for memory dump analysis.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 USENIX Summit on Gaming, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
login Usenix Mag., 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
J. Commun. Networks, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Computer Aided Verification - 23rd International Conference, 2011
2010
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask).
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
IEEE Trans. Dependable Secur. Comput., 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
2007
Proceedings of the Malware Detection, 2007
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
2003
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003
2001
2000