Dawn Song

Results: 140



#Item
101Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 17:23:31
102Predicate transformer semantics / Program logic / KeY / IP / NP / Symbolic execution / PP / Algorithm / Function / Theoretical computer science / Mathematics / Applied mathematics

Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
103Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
104Privilege separation / Ring / Privilege / System call / Interrupt flag / Monitor / Operating system / Variable / Computer architecture / Computing / Software engineering

Privtrans: Automatically Partitioning Programs for Privilege Separation David Brumley and Dawn Song Carnegie Mellon University {david.brumley,dawn.song}@cs.cmu.edu ∗ Abstract Privilege separation partitions a single pr

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
105Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
106Software testing / Predicate transformer semantics / Program logic / Fuzz testing / X Window System / Function / KeY / Errors and residuals in statistics / Network Time Protocol / Statistics / Software / Mathematics

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, Dawn Song Carnegie Mellon U

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
107Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu [removed] [removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
108Cyberwarfare / Botnet / Denial-of-service attack / Peer-to-peer / Tor / Malware / Public-key cryptography / Mobile IP / Node / Computer network security / Computing / Cryptography

Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
109Cyberwarfare / Buffer overflow / Stack buffer overflow / Vulnerability / PaX / Application checkpointing / Heap overflow / Valgrind / C standard library / Computing / Software bugs / Computer security

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
110HTTP / Computer network security / URI schemes / Uniform resource locator / Ajax / Cross-site request forgery / HTTP cookie / Cross-site scripting / DNS rebinding / Computing / Software / Internet

Towards a Formal Foundation of Web Security Devdatta Akhawe∗ , Adam Barth∗ , Peifung E. Lam† , John Mitchell† and Dawn Song∗ ∗ University of California, Berkeley {devdatta,abarth,dawnsong}@cs.berkeley.edu †

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2010-05-17 14:26:50
UPDATE