Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tim Leek
@inproceedings{DBLP:conf/icst/BundtFDRL23, author = {Joshua Bundt and Andrew Fasano and Brendan Dolan{-}Gavitt and William K. Robertson and Tim Leek}, title = {Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis}, booktitle = {{IEEE} Conference on Software Testing, Verification and Validation, {ICST} 2023, Dublin, Ireland, April 16-20, 2023}, pages = {117--128}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICST57152.2023.00020}, doi = {10.1109/ICST57152.2023.00020}, timestamp = {Thu, 01 Jun 2023 13:31:05 +0200}, biburl = {https://dblp.org/rec/conf/icst/BundtFDRL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GavazziWKLKDL23, author = {Anthony Gavazzi and Ryan Williams and Engin Kirda and Long Lu and Andre King and Andy Davis and Tim Leek}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {A Study of Multi-Factor and Risk-Based Authentication Availability}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2043--2060}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/gavazzi}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GavazziWKLKDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WangIWL22, author = {Michael Wang and Alex Interrante{-}Grant and Ryan Whelan and Tim Leek}, editor = {Lorenzo Cavallaro and Daniel Gruss and Giancarlo Pellegrino and Giorgio Giacinto}, title = {{COBRA-GCN:} Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13358}, pages = {53--74}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09484-2\_4}, doi = {10.1007/978-3-031-09484-2\_4}, timestamp = {Fri, 01 Jul 2022 15:28:37 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WangIWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-11088, author = {Joshua Bundt and Andrew Fasano and Brendan Dolan{-}Gavitt and William K. Robertson and Tim Leek}, title = {Evaluating Synthetic Bugs}, journal = {CoRR}, volume = {abs/2208.11088}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.11088}, doi = {10.48550/ARXIV.2208.11088}, eprinttype = {arXiv}, eprint = {2208.11088}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-11088.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-11162, author = {Joshua Bundt and Andrew Fasano and Brendan Dolan{-}Gavitt and William K. Robertson and Tim Leek}, title = {Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis}, journal = {CoRR}, volume = {abs/2212.11162}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.11162}, doi = {10.48550/ARXIV.2212.11162}, eprinttype = {arXiv}, eprint = {2212.11162}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-11162.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/FasanoBMLBDEFLG21, author = {Andrew Fasano and Tiemoko Ballo and Marius Muench and Tim Leek and Alexander Bulekov and Brendan Dolan{-}Gavitt and Manuel Egele and Aur{\'{e}}lien Francillon and Long Lu and Nick Gregory and Davide Balzarotti and William Robertson}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {SoK: Enabling Security Analyses of Embedded Systems via Rehosting}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {687--701}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453093}, doi = {10.1145/3433210.3453093}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/FasanoBMLBDEFLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/BundtFD0L21, author = {Joshua Bundt and Andrew Fasano and Brendan Dolan{-}Gavitt and William Robertson and Tim Leek}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Evaluating Synthetic Bugs}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {716--730}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453096}, doi = {10.1145/3433210.3453096}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/BundtFD0L21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FasanoLDB19, author = {Andrew Fasano and Tim Leek and Brendan Dolan{-}Gavitt and Josh Bundt}, title = {The Rode0day to Less-Buggy Programs}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {84--88}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2933682}, doi = {10.1109/MSEC.2019.2933682}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/FasanoLDB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SeveriLD18, author = {Giorgio Severi and Tim Leek and Brendan Dolan{-}Gavitt}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {3--23}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_1}, doi = {10.1007/978-3-319-93411-2\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SeveriLD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/HulinDSFGSLD17, author = {Patrick Hulin and Andy Davis and Rahul Sridhar and Andrew Fasano and Cody Gallagher and Aaron Sedlacek and Tim Leek and Brendan Dolan{-}Gavitt}, editor = {William Enck and Collin Mulliner}, title = {AutoCTF: Creating Diverse Pwnables via Automated Bug Injection}, booktitle = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver, BC, Canada, August 14-15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/hulin}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/HulinDSFGSLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Dolan-GavittHKL16, author = {Brendan Dolan{-}Gavitt and Patrick Hulin and Engin Kirda and Tim Leek and Andrea Mambretti and William K. Robertson and Frederick Ulrich and Ryan Whelan}, title = {{LAVA:} Large-Scale Automated Vulnerability Addition}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {110--121}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.15}, doi = {10.1109/SP.2016.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Dolan-GavittHKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Dolan-GavittHHL15, author = {Brendan Dolan{-}Gavitt and Josh Hodosh and Patrick Hulin and Tim Leek and Ryan Whelan}, editor = {Jeffrey Todd McDonald and Mila Dalla Preda and Natalia Stakhanova}, title = {Repeatable Reverse Engineering with {PANDA}}, booktitle = {Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015}, pages = {4:1--4:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2843859.2843867}, doi = {10.1145/2843859.2843867}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Dolan-GavittHHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DavisLZGL14, author = {Andy Davis and Tim Leek and Michael Zhivich and Kyle Gwinnup and William Leonard}, editor = {Zachary N. J. Peterson}, title = {The Fun and Future of {CTF}}, booktitle = {2014 {USENIX} Summit on Gaming, Games, and Gamification in Security Education, 3GSE '14, San Diego, CA, USA, August 18, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/3gse14/summit-program/presentation/davis}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/DavisLZGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cc/WhelanLK13, author = {Ryan Whelan and Tim Leek and David R. Kaeli}, editor = {Ranjit Jhala and Koen De Bosschere}, title = {Architecture-Independent Dynamic Information Flow Tracking}, booktitle = {Compiler Construction - 22nd International Conference, {CC} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7791}, pages = {144--163}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37051-9\_8}, doi = {10.1007/978-3-642-37051-9\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/cc/WhelanLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dolan-GavittLHL13, author = {Brendan Dolan{-}Gavitt and Tim Leek and Josh Hodosh and Wenke Lee}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Tappan Zee (north) bridge: mining memory accesses for introspection}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {839--850}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516697}, doi = {10.1145/2508859.2516697}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dolan-GavittLHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Dolan-GavittLZGL11, author = {Brendan Dolan{-}Gavitt and Tim Leek and Michael Zhivich and Jonathon T. Giffin and Wenke Lee}, title = {Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {297--312}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.11}, doi = {10.1109/SP.2011.11}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/Dolan-GavittLZGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WertherZLZ11, author = {Joseph Werther and Michael Zhivich and Tim Leek and Nickolai Zeldovich}, editor = {Sean Peisert and Stephen Schwab}, title = {Experiences in Cyber Security Education: The {MIT} Lincoln Laboratory Capture-the-Flag Exercise}, booktitle = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11, San Francisco, CA, USA, August 8, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/cset11/experiences-cyber-security-education-mit-lincoln-laboratory-capture-flag-exercise}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/WertherZLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/GaneshLR09, author = {Vijay Ganesh and Tim Leek and Martin C. Rinard}, title = {Taint-based directed whitebox fuzzing}, booktitle = {31st International Conference on Software Engineering, {ICSE} 2009, May 16-24, 2009, Vancouver, Canada, Proceedings}, pages = {474--484}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICSE.2009.5070546}, doi = {10.1109/ICSE.2009.5070546}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/GaneshLR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ZitserLL04, author = {Misha Zitser and Richard Lippmann and Tim Leek}, editor = {Richard N. Taylor and Matthew B. Dwyer}, title = {Testing static analysis tools using exploitable buffer overflows from open source code}, booktitle = {Proceedings of the 12th {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering, 2004, Newport Beach, CA, USA, October 31 - November 6, 2004}, pages = {97--106}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029894.1029911}, doi = {10.1145/1029894.1029911}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/ZitserLL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/MakhoulKLLNSS00, author = {John Makhoul and Francis Kubala and Tim Leek and Daben Liu and Long Nguyen and Richard M. Schwartz and Amit Srivastava}, title = {Speech and language technologies for audio indexing and retrieval}, journal = {Proc. {IEEE}}, volume = {88}, number = {8}, pages = {1338--1353}, year = {2000}, url = {https://doi.org/10.1109/5.880087}, doi = {10.1109/5.880087}, timestamp = {Mon, 28 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pieee/MakhoulKLLNSS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/MillerLS99, author = {David R. H. Miller and Tim Leek and Richard M. Schwartz}, editor = {Fredric C. Gey and Marti A. Hearst and Richard M. Tong}, title = {A Hidden Markov Model Information Retrieval System}, booktitle = {{SIGIR} '99: Proceedings of the 22nd Annual International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval, August 15-19, 1999, Berkeley, CA, {USA}}, pages = {214--221}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/312624.312680}, doi = {10.1145/312624.312680}, timestamp = {Tue, 06 Nov 2018 11:07:23 +0100}, biburl = {https://dblp.org/rec/conf/sigir/MillerLS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trec/MillerLS98, author = {David R. H. Miller and Tim Leek and Richard M. Schwartz}, editor = {Ellen M. Voorhees and Donna K. Harman}, title = {{BBN} at {TREC7:} Using Hidden Markov Models for Information Retrieval}, booktitle = {Proceedings of The Seventh Text REtrieval Conference, {TREC} 1998, Gaithersburg, Maryland, USA, November 9-11, 1998}, series = {{NIST} Special Publication}, volume = {500-242}, pages = {80--89}, publisher = {National Institute of Standards and Technology {(NIST)}}, year = {1998}, timestamp = {Wed, 07 Jul 2021 16:44:22 +0200}, biburl = {https://dblp.org/rec/conf/trec/MillerLS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.