"Towards Automatic Discovery of Deviations in Binary Implementations with
Applications to Error Detection and Fingerprint Generation." David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song. To appear in Proceedings of USENIX Security Symposium, Aug 2007. |
BIB | Project | ||||
"Creating Vulnerability Signatures Using Weakest Pre-conditions." David Brumley, Hao Wang, Somesh Jha, and Dawn Song. To appear in Proceedings of Computer Security Foundations Symposium, Jul 2007. |
BIB | Project | ||||
"Dynamic Spyware Analysis." Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, and Dawn Song. To appear in Proceedings of USENIX Annual Technical Conference, Jun 2007. |
BIB | Project | ||||
"Sweeper: a Lightweight End-to-End System for Defending against Fast Worms." Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, and Dawn Song. In Proceedings of European Conference on Computer Systems (EuroSys), Mar 2007. |
BIB | Project | ||||
"Replayer: Automatic Protocol Replay by Binary Analysis." James Newsome, David Brumley, Jason Franklin, and Dawn Song. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), October 2006. |
BIB | Project | ||||
"Towards Automatic Generation of Vulnerability Signatures." David Brumley, James Newsome, Dawn Song, Hao Wang, and Somesh Jha. In the Proceedings of the IEEE Symposium on Security and Privacy, May 2006. |
BIB | Project | ||||
"Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software." James Newsome, David Brumley, and Dawn Song. In the Proceedings of the 13th Annual Network and Distributed Systems Security Symposium (NDSS), 2006. |
BIB | Project | ||||
"Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software" James Newsome and Dawn Song. In the Proceedings of theNetwork and Distributed Systems Security Symposium, Feb 2005. |
BIB | Project |