BibTeX records: Tim Leek

download as .bib file

@inproceedings{DBLP:conf/icst/BundtFDRL23,
  author       = {Joshua Bundt and
                  Andrew Fasano and
                  Brendan Dolan{-}Gavitt and
                  William K. Robertson and
                  Tim Leek},
  title        = {Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis},
  booktitle    = {{IEEE} Conference on Software Testing, Verification and Validation,
                  {ICST} 2023, Dublin, Ireland, April 16-20, 2023},
  pages        = {117--128},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICST57152.2023.00020},
  doi          = {10.1109/ICST57152.2023.00020},
  timestamp    = {Thu, 01 Jun 2023 13:31:05 +0200},
  biburl       = {https://dblp.org/rec/conf/icst/BundtFDRL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GavazziWKLKDL23,
  author       = {Anthony Gavazzi and
                  Ryan Williams and
                  Engin Kirda and
                  Long Lu and
                  Andre King and
                  Andy Davis and
                  Tim Leek},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {A Study of Multi-Factor and Risk-Based Authentication Availability},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {2043--2060},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/gavazzi},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GavazziWKLKDL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WangIWL22,
  author       = {Michael Wang and
                  Alex Interrante{-}Grant and
                  Ryan Whelan and
                  Tim Leek},
  editor       = {Lorenzo Cavallaro and
                  Daniel Gruss and
                  Giancarlo Pellegrino and
                  Giorgio Giacinto},
  title        = {{COBRA-GCN:} Contrastive Learning to Optimize Binary Representation
                  Analysis with Graph Convolutional Networks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June
                  29 - July 1, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13358},
  pages        = {53--74},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09484-2\_4},
  doi          = {10.1007/978-3-031-09484-2\_4},
  timestamp    = {Fri, 01 Jul 2022 15:28:37 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WangIWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-11088,
  author       = {Joshua Bundt and
                  Andrew Fasano and
                  Brendan Dolan{-}Gavitt and
                  William K. Robertson and
                  Tim Leek},
  title        = {Evaluating Synthetic Bugs},
  journal      = {CoRR},
  volume       = {abs/2208.11088},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.11088},
  doi          = {10.48550/ARXIV.2208.11088},
  eprinttype    = {arXiv},
  eprint       = {2208.11088},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-11088.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-11162,
  author       = {Joshua Bundt and
                  Andrew Fasano and
                  Brendan Dolan{-}Gavitt and
                  William K. Robertson and
                  Tim Leek},
  title        = {Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis},
  journal      = {CoRR},
  volume       = {abs/2212.11162},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.11162},
  doi          = {10.48550/ARXIV.2212.11162},
  eprinttype    = {arXiv},
  eprint       = {2212.11162},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-11162.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/FasanoBMLBDEFLG21,
  author       = {Andrew Fasano and
                  Tiemoko Ballo and
                  Marius Muench and
                  Tim Leek and
                  Alexander Bulekov and
                  Brendan Dolan{-}Gavitt and
                  Manuel Egele and
                  Aur{\'{e}}lien Francillon and
                  Long Lu and
                  Nick Gregory and
                  Davide Balzarotti and
                  William Robertson},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {SoK: Enabling Security Analyses of Embedded Systems via Rehosting},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {687--701},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453093},
  doi          = {10.1145/3433210.3453093},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/FasanoBMLBDEFLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/BundtFD0L21,
  author       = {Joshua Bundt and
                  Andrew Fasano and
                  Brendan Dolan{-}Gavitt and
                  William Robertson and
                  Tim Leek},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Evaluating Synthetic Bugs},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {716--730},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453096},
  doi          = {10.1145/3433210.3453096},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/BundtFD0L21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FasanoLDB19,
  author       = {Andrew Fasano and
                  Tim Leek and
                  Brendan Dolan{-}Gavitt and
                  Josh Bundt},
  title        = {The Rode0day to Less-Buggy Programs},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {84--88},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2933682},
  doi          = {10.1109/MSEC.2019.2933682},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FasanoLDB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SeveriLD18,
  author       = {Giorgio Severi and
                  Tim Leek and
                  Brendan Dolan{-}Gavitt},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {Malrec: Compact Full-Trace Malware Recording for Retrospective Deep
                  Analysis},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_1},
  doi          = {10.1007/978-3-319-93411-2\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SeveriLD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/HulinDSFGSLD17,
  author       = {Patrick Hulin and
                  Andy Davis and
                  Rahul Sridhar and
                  Andrew Fasano and
                  Cody Gallagher and
                  Aaron Sedlacek and
                  Tim Leek and
                  Brendan Dolan{-}Gavitt},
  editor       = {William Enck and
                  Collin Mulliner},
  title        = {AutoCTF: Creating Diverse Pwnables via Automated Bug Injection},
  booktitle    = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
                  BC, Canada, August 14-15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/woot17/workshop-program/presentation/hulin},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/HulinDSFGSLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Dolan-GavittHKL16,
  author       = {Brendan Dolan{-}Gavitt and
                  Patrick Hulin and
                  Engin Kirda and
                  Tim Leek and
                  Andrea Mambretti and
                  William K. Robertson and
                  Frederick Ulrich and
                  Ryan Whelan},
  title        = {{LAVA:} Large-Scale Automated Vulnerability Addition},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {110--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.15},
  doi          = {10.1109/SP.2016.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Dolan-GavittHKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Dolan-GavittHHL15,
  author       = {Brendan Dolan{-}Gavitt and
                  Josh Hodosh and
                  Patrick Hulin and
                  Tim Leek and
                  Ryan Whelan},
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda and
                  Natalia Stakhanova},
  title        = {Repeatable Reverse Engineering with {PANDA}},
  booktitle    = {Proceedings of the 5th Program Protection and Reverse Engineering
                  Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015},
  pages        = {4:1--4:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2843859.2843867},
  doi          = {10.1145/2843859.2843867},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Dolan-GavittHHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DavisLZGL14,
  author       = {Andy Davis and
                  Tim Leek and
                  Michael Zhivich and
                  Kyle Gwinnup and
                  William Leonard},
  editor       = {Zachary N. J. Peterson},
  title        = {The Fun and Future of {CTF}},
  booktitle    = {2014 {USENIX} Summit on Gaming, Games, and Gamification in Security
                  Education, 3GSE '14, San Diego, CA, USA, August 18, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/3gse14/summit-program/presentation/davis},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DavisLZGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cc/WhelanLK13,
  author       = {Ryan Whelan and
                  Tim Leek and
                  David R. Kaeli},
  editor       = {Ranjit Jhala and
                  Koen De Bosschere},
  title        = {Architecture-Independent Dynamic Information Flow Tracking},
  booktitle    = {Compiler Construction - 22nd International Conference, {CC} 2013,
                  Held as Part of the European Joint Conferences on Theory and Practice
                  of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7791},
  pages        = {144--163},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37051-9\_8},
  doi          = {10.1007/978-3-642-37051-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/cc/WhelanLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dolan-GavittLHL13,
  author       = {Brendan Dolan{-}Gavitt and
                  Tim Leek and
                  Josh Hodosh and
                  Wenke Lee},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Tappan Zee (north) bridge: mining memory accesses for introspection},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {839--850},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516697},
  doi          = {10.1145/2508859.2516697},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Dolan-GavittLHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Dolan-GavittLZGL11,
  author       = {Brendan Dolan{-}Gavitt and
                  Tim Leek and
                  Michael Zhivich and
                  Jonathon T. Giffin and
                  Wenke Lee},
  title        = {Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {297--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.11},
  doi          = {10.1109/SP.2011.11},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Dolan-GavittLZGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WertherZLZ11,
  author       = {Joseph Werther and
                  Michael Zhivich and
                  Tim Leek and
                  Nickolai Zeldovich},
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {Experiences in Cyber Security Education: The {MIT} Lincoln Laboratory
                  Capture-the-Flag Exercise},
  booktitle    = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11,
                  San Francisco, CA, USA, August 8, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/cset11/experiences-cyber-security-education-mit-lincoln-laboratory-capture-flag-exercise},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WertherZLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GaneshLR09,
  author       = {Vijay Ganesh and
                  Tim Leek and
                  Martin C. Rinard},
  title        = {Taint-based directed whitebox fuzzing},
  booktitle    = {31st International Conference on Software Engineering, {ICSE} 2009,
                  May 16-24, 2009, Vancouver, Canada, Proceedings},
  pages        = {474--484},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICSE.2009.5070546},
  doi          = {10.1109/ICSE.2009.5070546},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/GaneshLR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ZitserLL04,
  author       = {Misha Zitser and
                  Richard Lippmann and
                  Tim Leek},
  editor       = {Richard N. Taylor and
                  Matthew B. Dwyer},
  title        = {Testing static analysis tools using exploitable buffer overflows from
                  open source code},
  booktitle    = {Proceedings of the 12th {ACM} {SIGSOFT} International Symposium on
                  Foundations of Software Engineering, 2004, Newport Beach, CA, USA,
                  October 31 - November 6, 2004},
  pages        = {97--106},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029894.1029911},
  doi          = {10.1145/1029894.1029911},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ZitserLL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/MakhoulKLLNSS00,
  author       = {John Makhoul and
                  Francis Kubala and
                  Tim Leek and
                  Daben Liu and
                  Long Nguyen and
                  Richard M. Schwartz and
                  Amit Srivastava},
  title        = {Speech and language technologies for audio indexing and retrieval},
  journal      = {Proc. {IEEE}},
  volume       = {88},
  number       = {8},
  pages        = {1338--1353},
  year         = {2000},
  url          = {https://doi.org/10.1109/5.880087},
  doi          = {10.1109/5.880087},
  timestamp    = {Mon, 28 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pieee/MakhoulKLLNSS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/MillerLS99,
  author       = {David R. H. Miller and
                  Tim Leek and
                  Richard M. Schwartz},
  editor       = {Fredric C. Gey and
                  Marti A. Hearst and
                  Richard M. Tong},
  title        = {A Hidden Markov Model Information Retrieval System},
  booktitle    = {{SIGIR} '99: Proceedings of the 22nd Annual International {ACM} {SIGIR}
                  Conference on Research and Development in Information Retrieval, August
                  15-19, 1999, Berkeley, CA, {USA}},
  pages        = {214--221},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/312624.312680},
  doi          = {10.1145/312624.312680},
  timestamp    = {Tue, 06 Nov 2018 11:07:23 +0100},
  biburl       = {https://dblp.org/rec/conf/sigir/MillerLS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trec/MillerLS98,
  author       = {David R. H. Miller and
                  Tim Leek and
                  Richard M. Schwartz},
  editor       = {Ellen M. Voorhees and
                  Donna K. Harman},
  title        = {{BBN} at {TREC7:} Using Hidden Markov Models for Information Retrieval},
  booktitle    = {Proceedings of The Seventh Text REtrieval Conference, {TREC} 1998,
                  Gaithersburg, Maryland, USA, November 9-11, 1998},
  series       = {{NIST} Special Publication},
  volume       = {500-242},
  pages        = {80--89},
  publisher    = {National Institute of Standards and Technology {(NIST)}},
  year         = {1998},
  timestamp    = {Wed, 07 Jul 2021 16:44:22 +0200},
  biburl       = {https://dblp.org/rec/conf/trec/MillerLS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics