David Brumley

Results: 104



#Item
1

An Empirical Study of Cryptographic Misuse in Android Applications Manuel Egele, David Brumley Yanick Fratantonio, Christopher Kruegel

Add to Reading List

Source URL: www.s3.eurecom.fr

Language: English - Date: 2017-11-07 11:46:31
    2

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2010-06-04 16:24:13
      3

      AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

      Add to Reading List

      Source URL: users.ece.cmu.edu

      - Date: 2014-05-29 15:38:01
        4

        Alias Analysis for Assembly David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R

        Add to Reading List

        Source URL: reports-archive.adm.cs.cmu.edu

        - Date: 2007-09-24 18:53:05
          5

          All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

          Add to Reading List

          Source URL: users.ece.cmu.edu

          - Date: 2014-05-29 15:38:01
            6

            Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

            Add to Reading List

            Source URL: users.ece.cmu.edu

            - Date: 2014-05-29 15:38:01
              7

              Platform-Independent Programs Sang Kil Cha, Brian Pak, David Brumley Richard J. Lipton Carnegie Mellon University

              Add to Reading List

              Source URL: users.ece.cmu.edu

              - Date: 2014-05-29 15:38:01
                8

                Creating Vulnerability Signatures Using Weakest Preconditions David Brumley Hao Wang Somesh Jha

                Add to Reading List

                Source URL: users.ece.cmu.edu

                - Date: 2014-05-29 15:38:01
                  9

                  Privtrans: Automatically Partitioning Programs for Privilege Separation David Brumley and Dawn Song Carnegie Mellon University {david.brumley,dawn.song}@cs.cmu.edu ∗ Abstract Privilege separation partitions a single pr

                  Add to Reading List

                  Source URL: users.ece.cmu.edu

                  - Date: 2014-05-29 15:38:01
                    10

                    RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson , , Huijia Lin, Dawn Song el

                    Add to Reading List

                    Source URL: users.ece.cmu.edu

                    - Date: 2014-05-29 15:38:01
                      UPDATE