Brendan Dolan-Gavitt
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c11]Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon:
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. ACM Conference on Computer and Communications Security 2018: 1290-1305 - [c10]Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt:
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis. DIMVA 2018: 3-23 - [c9]Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg:
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks. RAID 2018: 273-294 - [c8]Subhajit Roy, Awanish Pandey, Brendan Dolan-Gavitt, Yu Hu:
Bug synthesis: challenging bug-finding tools with deep faults. ESEC/SIGSOFT FSE 2018: 224-234 - [i3]Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg:
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks. CoRR abs/1805.12185 (2018) - [i2]Zhenghao Hu, Yu Hu, Brendan Dolan-Gavitt:
Chaff Bugs: Deterring Attackers by Making Software Buggier. CoRR abs/1808.00659 (2018) - 2017
- [c7]Yiwen Li, Brendan Dolan-Gavitt, Sam Weber, Justin Cappos:
Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path. USENIX Annual Technical Conference 2017: 1-13 - [c6]Patrick Hulin, Andy Davis, Rahul Sridhar, Andrew Fasano, Cody Gallagher, Aaron Sedlacek, Tim Leek, Brendan Dolan-Gavitt:
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection. WOOT 2017 - [i1]Tianyu Gu, Brendan Dolan-Gavitt, Siddharth Garg:
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. CoRR abs/1708.06733 (2017) - 2016
- [c5]Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti, William K. Robertson, Frederick Ulrich, Ryan Whelan:
LAVA: Large-Scale Automated Vulnerability Addition. IEEE Symposium on Security and Privacy 2016: 110-121 - 2015
- [b1]Brendan Dolan-Gavitt:
Understanding and protecting closed-source systems through dynamic analysis. Georgia Institute of Technology, Atlanta, GA, USA 2015 - [c4]Brendan Dolan-Gavitt, Josh Hodosh, Patrick Hulin, Tim Leek, Ryan Whelan:
Repeatable Reverse Engineering with PANDA. PPREW@ACSAC 2015: 4:1-4:11 - 2013
- [c3]Brendan Dolan-Gavitt, Tim Leek, Josh Hodosh, Wenke Lee:
Tappan Zee (north) bridge: mining memory accesses for introspection. ACM Conference on Computer and Communications Security 2013: 839-850 - 2011
- [c2]Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon T. Giffin, Wenke Lee:
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. IEEE Symposium on Security and Privacy 2011: 297-312
2000 – 2009
- 2009
- [c1]Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon T. Giffin:
Robust signatures for kernel data structures. ACM Conference on Computer and Communications Security 2009: 566-577
Coauthor Index
last updated on 2018-11-22 21:04 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint