Tim Leek
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c13]Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt:
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis. DIMVA 2018: 3-23 - 2017
- [c12]Patrick Hulin, Andy Davis, Rahul Sridhar, Andrew Fasano, Cody Gallagher, Aaron Sedlacek, Tim Leek, Brendan Dolan-Gavitt:
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection. WOOT 2017 - 2016
- [c11]Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti, William K. Robertson, Frederick Ulrich, Ryan Whelan:
LAVA: Large-Scale Automated Vulnerability Addition. IEEE Symposium on Security and Privacy 2016: 110-121 - 2015
- [c10]Brendan Dolan-Gavitt, Josh Hodosh, Patrick Hulin, Tim Leek, Ryan Whelan:
Repeatable Reverse Engineering with PANDA. PPREW@ACSAC 2015: 4:1-4:11 - 2014
- [c9]Andy Davis, Tim Leek, Michael Zhivich, Kyle Gwinnup, William Leonard:
The Fun and Future of CTF. 3GSE 2014 - 2013
- [c8]Ryan Whelan, Tim Leek, David R. Kaeli:
Architecture-Independent Dynamic Information Flow Tracking. CC 2013: 144-163 - [c7]Brendan Dolan-Gavitt, Tim Leek, Josh Hodosh, Wenke Lee:
Tappan Zee (north) bridge: mining memory accesses for introspection. ACM Conference on Computer and Communications Security 2013: 839-850 - 2011
- [c6]Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon T. Giffin, Wenke Lee:
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. IEEE Symposium on Security and Privacy 2011: 297-312 - [c5]Joseph Werther, Michael Zhivich, Tim Leek, Nickolai Zeldovich:
Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise. CSET 2011
2000 – 2009
- 2009
- [c4]
- 2004
- [c3]Misha Zitser, Richard Lippmann, Tim Leek:
Testing static analysis tools using exploitable buffer overflows from open source code. SIGSOFT FSE 2004: 97-106
1990 – 1999
- 1999
- [c2]David R. H. Miller, Tim Leek, Richard M. Schwartz:
A Hidden Markov Model Information Retrieval System. SIGIR 1999: 214-221 - 1998
- [c1]David R. H. Miller, Tim Leek, Richard M. Schwartz:
BBN at TREC7: Using Hidden Markov Models for Information Retrieval. TREC 1998: 80-89
Coauthor Index
last updated on 2018-11-07 22:27 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint