{AutoCTF}: Creating diverse pwnables via automated bug injection

Patrick Hulin , Andy Davis , Rahul Sridhar , Andrew Fasano
11th USENIX Workshop on Offensive Technologies (WOOT 17)

22
2017
Towards Deceptive Defense in Software Security with Chaff Bugs

Zhenghao Hu , Yu Hu , Brendan Dolan-Gavitt
43 -55

19
2022
Drifuzz: Harvesting bugs in device drivers from golden seeds

Zekun Shen , Ritik Roongta , Brendan Dolan-Gavitt
31st USENIX Security Symposium (USENIX Security 22) 1275 -1290

13
2022
What the fork? finding and analyzing malware in github forks

Alan Cao , Brendan Dolan-Gavitt
Proc. of NDSS 22

13
2022
PyPANDA: taming the pandamonium of whole system dynamic analysis

Luke Craig , Andrew Fasano , Tiemoko Ballo , Tim Leek
NDSS Binary Analysis Research Workshop

10
2021
Beyond the C: Retargetable decompilation using neural machine translation

Iman Hosseini , Brendan Dolan-Gavitt
arXiv preprint arXiv:2212.08950

7
2022
Of bugs and baselines

Brendan Dolan-Gavitt

7
2018
See no evil: Evasions in honeymonkey systems

Brendan Dolan-Gavitt , Yacin Nadji
Technical report, Technical Report

7
2010
Irqdebloat: Reducing driver attack surface in embedded devices

Zhenghao Hu , Brendan Dolan-Gavitt
2022 IEEE Symposium on Security and Privacy (SP) 1608 -1622

5
2022
Breaking Spotify DRM with PANDA

Brendan Dolan-Gavitt
Push the Red Button blog 3

5
2014
“Fuzzing with afl is an art

Brendan Dolan-Gavitt
July

4
2016
Repeatable Reverse Engineering with the Platform for Architecture-Neutral Dynamic Analysis

Ryan J Whelan , Timothy R Leek , Joshua E Hodosh , Patrick A Hulin
Lincoln Laboratory Journal 22 ( 1)

4
2016
Characterizing and improving bug-finders with synthetic bugs

Yu Hu , Zekun Shen , Brendan Dolan-Gavitt
2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) 971 -982

3
2022
(Security) Assertions by Large Language Models

Rahul Kande , Hammond Pearce , Benjamin Tan , Brendan Dolan-Gavitt
IEEE Transactions on Information Forensics and Security

2
2024
Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis

Joshua Bundt , Andrew Fasano , Brendan Dolan-Gavitt , William Robertson
2023 IEEE Conference on Software Testing, Verification and Validation (ICST) 117 -128

2
2023
Using kernel type graphs to detect dummy structures

Brendan Dolan-Gavitt , Patrick Traynor
Tech. rep. Technical report, Georgia Tech

2
2008
Understanding and protecting closed-source systems through dynamic analysis

Brendan Dolan-Gavitt
PhD thesis, Georgia Institute of Technology

1
2014
NYU CTF Dataset: A Scalable Open-Source Benchmark Dataset for Evaluating LLMs in Offensive Security

Minghao Shao , Sofija Jancheska , Meet Udeshi , Brendan Dolan-Gavitt
arXiv preprint arXiv:2406.05590

2024
Gyrus: Preventing Sensitive Information and Malicious Traffic from Leaving Computers

Brendan Dolan-Gavitt , Wenke Lee , Security Axioms , Inc. Atlanta United States
0019 -0019

2015
Tappan Zee (North) Bridge

Brendan Dolan-Gavitt , Tim Leek , Josh Hodosh , Wenke Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security-CCS'13

2013