Lock-in-pop: Securing privileged operating system kernels by keeping on the beaten path

Justin Cappos , Brendan Dolan-Gavitt , Sam Weber , Yiwen Li
usenix annual technical conference 1 -13

8
2017
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain.

Brendan Dolan-Gavitt , Siddharth Garg , Tianyu Gu
arXiv: Cryptography and Security

960
2017
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks

Brendan Dolan-Gavitt , Siddharth Garg , Kang Liu
arXiv: Cryptography and Security

579
2018
SoK: Enabling Security Analyses of Embedded Systems via Rehosting

Davide Balzarotti , Manuel Egele , Brendan Dolan-Gavitt , Tim Leek
computer and communications security

17
2021
Evaluating Synthetic Bugs

Joshua Bundt , Brendan Dolan-Gavitt , Tim Leek , Andrew Fasano
computer and communications security

2021
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis

Giorgio Severi , Tim Leek , Brendan Dolan-Gavitt
international conference on detection of intrusions and malware, and vulnerability assessment 3 -23

40
2018
Tappan Zee (north) bridge: mining memory accesses for introspection

Brendan Dolan-Gavitt , Tim Leek , Josh Hodosh , Wenke Lee
computer and communications security 839 -850

49
2013
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser

Kevin Gallagher , Sameer Patil , Brendan Dolan-Gavitt , Damon McCoy
computer and communications security 1290 -1305

19
2018
HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities

Zekun Shen , Brendan Dolan-Gavitt
annual computer security applications conference 454 -465

2020
Repeatable Reverse Engineering with PANDA

Brendan Dolan-Gavitt , Josh Hodosh , Patrick Hulin , Tim Leek
Proceedings of the 5th Program Protection and Reverse Engineering Workshop 4

147
2015
BadNets: Evaluating Backdooring Attacks on Deep Neural Networks

Tianyu Gu , Kang Liu , Brendan Dolan-Gavitt , Siddharth Garg
IEEE Access 7 47230 -47244

488
2019
Robust signatures for kernel data structures

Brendan Dolan-Gavitt , Abhinav Srivastava , Patrick Traynor , Jonathon Giffin
computer and communications security 566 -577

134
2009
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection

Brendan Dolan-Gavitt , Tim Leek , Michael Zhivich , Jonathon Giffin
ieee symposium on security and privacy 297 -312

412
2011
LAVA: Large-Scale Automated Vulnerability Addition

Brendan Dolan-Gavitt , Patrick Hulin , Engin Kirda , Tim Leek
2016 IEEE Symposium on Security and Privacy (SP) 110 -121

136
2016
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps

Qingchuan Zhao , Chaoshun Zuo , Brendan Dolan-Gavitt , Giancarlo Pellegrino
2020 IEEE Symposium on Security and Privacy (SP) 1106 -1120

2
2020
The Rode0day to Less-Buggy Programs

Andrew Fasano , Tim Leek , Brendan Dolan-Gavitt , Josh Bundt
ieee symposium on security and privacy 17 ( 6) 84 -88

3
2019
Bug synthesis: challenging bug-finding tools with deep faults

Subhajit Roy , Awanish Pandey , Brendan Dolan-Gavitt , Yu Hu
foundations of software engineering 224 -234

14
2018
Nnoculation: Catching badnets in the wild

Akshaj Kumar Veldanda , Kang Liu , Benjamin Tan , Prashanth Krishnamurthy
Smpte Journal 49 -60

6
2021
Asleep at the keyboard? assessing the security of github copilot’s code contributions

Hammond Pearce , Baleegh Ahmad , Benjamin Tan , Brendan Dolan-Gavitt
Smpte Journal 754 -768

40
2022
Pop Quiz! Can a Large Language Model Help With Reverse Engineering?

Hammond Pearce , Benjamin Tan , Prashanth Krishnamurthy , Farshad Khorrami
arXiv preprint arXiv:2202.01142

4
2022