David Carnegie

Results: 214



#Item
91Database trigger / Trigger / Computer virus / Pointer / Computing / Software engineering / Computer programming / Abstract interpretation / Symbolic execution / Malware

1 Automatically Identifying Trigger-based Behavior in Malware David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, Heng Yin Carnegie Mellon University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
92Data / Database management systems / Cache / CPU cache / Central processing unit / Computer memory / Relational database / PaX / Tar / Data management / Computing / Database theory

Weaving Relations for Cache Performance Anastassia Ailamaki ‡ Carnegie Mellon University David J. DeWitt

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2001-06-09 13:12:00
93Predicate transformer semantics / Program logic / KeY / IP / NP / Symbolic execution / PP / Algorithm / Function / Theoretical computer science / Mathematics / Applied mathematics

Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
94Software testing / Automated theorem proving / Concolic testing / Software metrics / KeY / Symbolic execution / Code coverage / Control flow graph / Algorithm / Software / Computing / Formal methods

Enhancing Symbolic Execution with Veritesting Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley Carnegie Mellon University {thanassis, alexandre, sangkilc, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
95C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
96Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
97Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
98Symbolic execution / Symbol / Algorithm / Computing / KeY / Dynamical system / Applied mathematics / Formal methods / Computer programming / Taint checking

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
99Cross-platform software / Debian / Portable software / Ubuntu / Deb / Man page / Patch / Stat / Bloom filter / Software / Computing / Dpkg

ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions Jiyong Jang, Abeer Agrawal, and David Brumley Carnegie Mellon University Pittsburgh, PA, USA {jiyongj, abeer, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
100Symbolic execution / Symbol / Algorithm / Computing / KeY / Dynamical system / Applied mathematics / Formal methods / Computer programming / Taint checking

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2012-03-12 11:18:03
UPDATE