David Brumley

Results: 104



#Item
1An Empirical Study of Cryptographic Misuse in Android Applications Manuel Egele, David Brumley Yanick Fratantonio, Christopher Kruegel

An Empirical Study of Cryptographic Misuse in Android Applications Manuel Egele, David Brumley Yanick Fratantonio, Christopher Kruegel

Add to Reading List

Source URL: www.s3.eurecom.fr

Language: English - Date: 2017-11-07 11:46:31
    2Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2010-06-04 16:24:13
      3AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu  Abstract

      AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

      Add to Reading List

      Source URL: users.ece.cmu.edu

      - Date: 2014-05-29 15:38:01
        4Alias Analysis for Assembly  David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R

        Alias Analysis for Assembly David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R

        Add to Reading List

        Source URL: reports-archive.adm.cs.cmu.edu

        - Date: 2007-09-24 18:53:05
          5All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

          All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

          Add to Reading List

          Source URL: users.ece.cmu.edu

          - Date: 2014-05-29 15:38:01
            6Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

            Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

            Add to Reading List

            Source URL: users.ece.cmu.edu

            - Date: 2014-05-29 15:38:01
              7Platform-Independent Programs Sang Kil Cha, Brian Pak, David Brumley Richard J. Lipton  Carnegie Mellon University

              Platform-Independent Programs Sang Kil Cha, Brian Pak, David Brumley Richard J. Lipton Carnegie Mellon University

              Add to Reading List

              Source URL: users.ece.cmu.edu

              - Date: 2014-05-29 15:38:01
                8Creating Vulnerability Signatures Using Weakest Preconditions David Brumley Hao Wang  Somesh Jha

                Creating Vulnerability Signatures Using Weakest Preconditions David Brumley Hao Wang Somesh Jha

                Add to Reading List

                Source URL: users.ece.cmu.edu

                - Date: 2014-05-29 15:38:01
                  9Privtrans: Automatically Partitioning Programs for Privilege Separation David Brumley and Dawn Song Carnegie Mellon University {david.brumley,dawn.song}@cs.cmu.edu ∗ Abstract Privilege separation partitions a single pr

                  Privtrans: Automatically Partitioning Programs for Privilege Separation David Brumley and Dawn Song Carnegie Mellon University {david.brumley,dawn.song}@cs.cmu.edu ∗ Abstract Privilege separation partitions a single pr

                  Add to Reading List

                  Source URL: users.ece.cmu.edu

                  - Date: 2014-05-29 15:38:01
                    10RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson , ,  Huijia Lin, Dawn Song el

                    RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson , , Huijia Lin, Dawn Song el

                    Add to Reading List

                    Source URL: users.ece.cmu.edu

                    - Date: 2014-05-29 15:38:01