BibTeX records: Brendan Dolan-Gavitt

download as .bib file

@article{DBLP:journals/corr/abs-2402-11814,
  author       = {Minghao Shao and
                  Boyuan Chen and
                  Sofija Jancheska and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg and
                  Ramesh Karri and
                  Muhammad Shafique},
  title        = {An Empirical Evaluation of LLMs for Solving Offensive Security Challenges},
  journal      = {CoRR},
  volume       = {abs/2402.11814},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.11814},
  doi          = {10.48550/ARXIV.2402.11814},
  eprinttype    = {arXiv},
  eprint       = {2402.11814},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-11814.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/ThakurAFPTKDG23,
  author       = {Shailja Thakur and
                  Baleegh Ahmad and
                  Zhenxing Fan and
                  Hammond Pearce and
                  Benjamin Tan and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  title        = {Benchmarking Large Language Models for Automated Verilog {RTL} Code
                  Generation},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2023, Antwerp, Belgium, April 17-19, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/DATE56975.2023.10137086},
  doi          = {10.23919/DATE56975.2023.10137086},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/ThakurAFPTKDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/BundtFDRL23,
  author       = {Joshua Bundt and
                  Andrew Fasano and
                  Brendan Dolan{-}Gavitt and
                  William K. Robertson and
                  Tim Leek},
  title        = {Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis},
  booktitle    = {{IEEE} Conference on Software Testing, Verification and Validation,
                  {ICST} 2023, Dublin, Ireland, April 16-20, 2023},
  pages        = {117--128},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICST57152.2023.00020},
  doi          = {10.1109/ICST57152.2023.00020},
  timestamp    = {Thu, 01 Jun 2023 13:31:05 +0200},
  biburl       = {https://dblp.org/rec/conf/icst/BundtFDRL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PearceTAKD23,
  author       = {Hammond Pearce and
                  Benjamin Tan and
                  Baleegh Ahmad and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt},
  title        = {Examining Zero-Shot Vulnerability Repair with Large Language Models},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2339--2356},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179420},
  doi          = {10.1109/SP46215.2023.10179420},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PearceTAKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PearceTAKD23a,
  author       = {Hammond Pearce and
                  Benjamin Tan and
                  Baleegh Ahmad and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt},
  title        = {Examining Zero-Shot Vulnerability Repair with Large Language Models},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2339--2356},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179324},
  doi          = {10.1109/SP46215.2023.10179324},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PearceTAKD23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SandovalPNKGD23,
  author       = {Gustavo Sandoval and
                  Hammond Pearce and
                  Teo Nys and
                  Ramesh Karri and
                  Siddharth Garg and
                  Brendan Dolan{-}Gavitt},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Lost at {C:} {A} User Study on the Security Implications of Large
                  Language Model Code Assistants},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {2205--2222},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/sandoval},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SandovalPNKGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MehtaJGTDGGD23,
  author       = {Pulak Mehta and
                  Gauri Jagatap and
                  Kevin Gallagher and
                  Brian Timmerman and
                  Progga Deb and
                  Siddharth Garg and
                  Rachel Greenstadt and
                  Brendan Dolan{-}Gavitt},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Can Deepfakes be created on a whim?},
  booktitle    = {Companion Proceedings of the {ACM} Web Conference 2023, {WWW} 2023,
                  Austin, TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {1324--1334},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543873.3587581},
  doi          = {10.1145/3543873.3587581},
  timestamp    = {Mon, 28 Aug 2023 21:17:11 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MehtaJGTDGGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/SandovalPNKGD23,
  author       = {Gustavo Sandoval and
                  Hammond Pearce and
                  Teo Nys and
                  Ramesh Karri and
                  Siddharth Garg and
                  Brendan Dolan{-}Gavitt},
  title        = {Lost at {C:} Data from the Security-focused User Study (Version 0.2)},
  publisher    = {Zenodo},
  year         = {2023},
  month        = mar,
  howpublished = {\url{https://doi.org/10.5281/zenodo.7708658}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.5281/zenodo.7708658},
  doi          = {10.5281/ZENODO.7708658},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/data/10/SandovalPNKGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-14576,
  author       = {Pulak Mehta and
                  Gauri Jagatap and
                  Kevin Gallagher and
                  Brian Timmerman and
                  Progga Deb and
                  Siddharth Garg and
                  Rachel Greenstadt and
                  Brendan Dolan{-}Gavitt},
  title        = {Can deepfakes be created by novice users?},
  journal      = {CoRR},
  volume       = {abs/2304.14576},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.14576},
  doi          = {10.48550/ARXIV.2304.14576},
  eprinttype    = {arXiv},
  eprint       = {2304.14576},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-14576.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-06161,
  author       = {Raymond Li and
                  Loubna Ben Allal and
                  Yangtian Zi and
                  Niklas Muennighoff and
                  Denis Kocetkov and
                  Chenghao Mou and
                  Marc Marone and
                  Christopher Akiki and
                  Jia Li and
                  Jenny Chim and
                  Qian Liu and
                  Evgenii Zheltonozhskii and
                  Terry Yue Zhuo and
                  Thomas Wang and
                  Olivier Dehaene and
                  Mishig Davaadorj and
                  Joel Lamy{-}Poirier and
                  Jo{\~{a}}o Monteiro and
                  Oleh Shliazhko and
                  Nicolas Gontier and
                  Nicholas Meade and
                  Armel Zebaze and
                  Ming{-}Ho Yee and
                  Logesh Kumar Umapathi and
                  Jian Zhu and
                  Benjamin Lipkin and
                  Muhtasham Oblokulov and
                  Zhiruo Wang and
                  Rudra Murthy V and
                  Jason Stillerman and
                  Siva Sankalp Patel and
                  Dmitry Abulkhanov and
                  Marco Zocca and
                  Manan Dey and
                  Zhihan Zhang and
                  Nour Moustafa{-}Fahmy and
                  Urvashi Bhattacharyya and
                  Wenhao Yu and
                  Swayam Singh and
                  Sasha Luccioni and
                  Paulo Villegas and
                  Maxim Kunakov and
                  Fedor Zhdanov and
                  Manuel Romero and
                  Tony Lee and
                  Nadav Timor and
                  Jennifer Ding and
                  Claire Schlesinger and
                  Hailey Schoelkopf and
                  Jan Ebert and
                  Tri Dao and
                  Mayank Mishra and
                  Alex Gu and
                  Jennifer Robinson and
                  Carolyn Jane Anderson and
                  Brendan Dolan{-}Gavitt and
                  Danish Contractor and
                  Siva Reddy and
                  Daniel Fried and
                  Dzmitry Bahdanau and
                  Yacine Jernite and
                  Carlos Mu{\~{n}}oz Ferrandis and
                  Sean Hughes and
                  Thomas Wolf and
                  Arjun Guha and
                  Leandro von Werra and
                  Harm de Vries},
  title        = {StarCoder: may the source be with you!},
  journal      = {CoRR},
  volume       = {abs/2305.06161},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.06161},
  doi          = {10.48550/ARXIV.2305.06161},
  eprinttype    = {arXiv},
  eprint       = {2305.06161},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-06161.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-14027,
  author       = {Rahul Kande and
                  Hammond Pearce and
                  Benjamin Tan and
                  Brendan Dolan{-}Gavitt and
                  Shailja Thakur and
                  Ramesh Karri and
                  Jeyavijayan Rajendran},
  title        = {LLM-assisted Generation of Hardware Assertions},
  journal      = {CoRR},
  volume       = {abs/2306.14027},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.14027},
  doi          = {10.48550/ARXIV.2306.14027},
  eprinttype    = {arXiv},
  eprint       = {2306.14027},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-14027.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-00708,
  author       = {Shailja Thakur and
                  Baleegh Ahmad and
                  Hammond Pearce and
                  Benjamin Tan and
                  Brendan Dolan{-}Gavitt and
                  Ramesh Karri and
                  Siddharth Garg},
  title        = {VeriGen: {A} Large Language Model for Verilog Code Generation},
  journal      = {CoRR},
  volume       = {abs/2308.00708},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.00708},
  doi          = {10.48550/ARXIV.2308.00708},
  eprinttype    = {arXiv},
  eprint       = {2308.00708},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-00708.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HuHD22,
  author       = {Zhenghao Hu and
                  Yu Hu and
                  Brendan Dolan{-}Gavitt},
  title        = {Towards Deceptive Defense in Software Security with Chaff Bugs},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {43--55},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545981},
  doi          = {10.1145/3545948.3545981},
  timestamp    = {Thu, 20 Oct 2022 10:46:43 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HuHD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PearceA0DK22,
  author       = {Hammond Pearce and
                  Baleegh Ahmad and
                  Benjamin Tan and
                  Brendan Dolan{-}Gavitt and
                  Ramesh Karri},
  title        = {Asleep at the Keyboard? Assessing the Security of GitHub Copilot's
                  Code Contributions},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {754--768},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833571},
  doi          = {10.1109/SP46214.2022.9833571},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PearceA0DK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HuD22,
  author       = {Zhenghao Hu and
                  Brendan Dolan{-}Gavitt},
  title        = {IRQDebloat: Reducing Driver Attack Surface in Embedded Devices},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1608--1622},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833695},
  doi          = {10.1109/SP46214.2022.9833695},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/HuD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShenRD22,
  author       = {Zekun Shen and
                  Ritik Roongta and
                  Brendan Dolan{-}Gavitt},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1275--1290},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/shen-zekun},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ShenRD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/HuSD22,
  author       = {Yu Hu and
                  Zekun Shen and
                  Brendan Dolan{-}Gavitt},
  title        = {Characterizing and Improving Bug-Finders with Synthetic Bugs},
  booktitle    = {{IEEE} International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022},
  pages        = {971--982},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SANER53432.2022.00115},
  doi          = {10.1109/SANER53432.2022.00115},
  timestamp    = {Tue, 26 Jul 2022 14:23:17 +0200},
  biburl       = {https://dblp.org/rec/conf/wcre/HuSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/PearceTAKD22,
  author       = {Hammond Pearce and
                  Benjamin Tan and
                  Baleegh Ahmad and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt},
  title        = {Code and Dataset for "Examining Zero-Shot Vulnerability Repair
                  with Large Language Models" (Version 1.0)},
  publisher    = {Zenodo},
  year         = {2022},
  month        = mar,
  howpublished = {\url{https://doi.org/10.5281/zenodo.7199939}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.5281/zenodo.7199939},
  doi          = {10.5281/ZENODO.7199939},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/data/10/PearceTAKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/SandovalPNKGD22,
  author       = {Gustavo Sandoval and
                  Hammond Pearce and
                  Teo Nys and
                  Ramesh Karri and
                  Siddharth Garg and
                  Brendan Dolan{-}Gavitt},
  title        = {Lost at {C:} Data from the Security-focused User Study (Version 0.1)},
  publisher    = {Zenodo},
  year         = {2022},
  month        = oct,
  howpublished = {\url{https://doi.org/10.5281/zenodo.7187359}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.5281/zenodo.7187359},
  doi          = {10.5281/ZENODO.7187359},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/data/10/SandovalPNKGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-01142,
  author       = {Hammond Pearce and
                  Benjamin Tan and
                  Prashanth Krishnamurthy and
                  Farshad Khorrami and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt},
  title        = {Pop Quiz! Can a Large Language Model Help With Reverse Engineering?},
  journal      = {CoRR},
  volume       = {abs/2202.01142},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.01142},
  eprinttype    = {arXiv},
  eprint       = {2202.01142},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-01142.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-09727,
  author       = {Gustavo Sandoval and
                  Hammond Pearce and
                  Teo Nys and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  title        = {Security Implications of Large Language Model Code Assistants: {A}
                  User Study},
  journal      = {CoRR},
  volume       = {abs/2208.09727},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.09727},
  doi          = {10.48550/ARXIV.2208.09727},
  eprinttype    = {arXiv},
  eprint       = {2208.09727},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-09727.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-11088,
  author       = {Joshua Bundt and
                  Andrew Fasano and
                  Brendan Dolan{-}Gavitt and
                  William K. Robertson and
                  Tim Leek},
  title        = {Evaluating Synthetic Bugs},
  journal      = {CoRR},
  volume       = {abs/2208.11088},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.11088},
  doi          = {10.48550/ARXIV.2208.11088},
  eprinttype    = {arXiv},
  eprint       = {2208.11088},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-11088.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-08950,
  author       = {Iman Hosseini and
                  Brendan Dolan{-}Gavitt},
  title        = {Beyond the {C:} Retargetable Decompilation using Neural Machine Translation},
  journal      = {CoRR},
  volume       = {abs/2212.08950},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.08950},
  doi          = {10.48550/ARXIV.2212.08950},
  eprinttype    = {arXiv},
  eprint       = {2212.08950},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-08950.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-11140,
  author       = {Shailja Thakur and
                  Baleegh Ahmad and
                  Zhenxing Fan and
                  Hammond Pearce and
                  Benjamin Tan and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  title        = {Benchmarking Large Language Models for Automated Verilog {RTL} Code
                  Generation},
  journal      = {CoRR},
  volume       = {abs/2212.11140},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.11140},
  doi          = {10.48550/ARXIV.2212.11140},
  eprinttype    = {arXiv},
  eprint       = {2212.11140},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-11140.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-11162,
  author       = {Joshua Bundt and
                  Andrew Fasano and
                  Brendan Dolan{-}Gavitt and
                  William K. Robertson and
                  Tim Leek},
  title        = {Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis},
  journal      = {CoRR},
  volume       = {abs/2212.11162},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.11162},
  doi          = {10.48550/ARXIV.2212.11162},
  eprinttype    = {arXiv},
  eprint       = {2212.11162},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-11162.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/FasanoBMLBDEFLG21,
  author       = {Andrew Fasano and
                  Tiemoko Ballo and
                  Marius Muench and
                  Tim Leek and
                  Alexander Bulekov and
                  Brendan Dolan{-}Gavitt and
                  Manuel Egele and
                  Aur{\'{e}}lien Francillon and
                  Long Lu and
                  Nick Gregory and
                  Davide Balzarotti and
                  William Robertson},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {SoK: Enabling Security Analyses of Embedded Systems via Rehosting},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {687--701},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453093},
  doi          = {10.1145/3433210.3453093},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/FasanoBMLBDEFLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/BundtFD0L21,
  author       = {Joshua Bundt and
                  Andrew Fasano and
                  Brendan Dolan{-}Gavitt and
                  William Robertson and
                  Tim Leek},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Evaluating Synthetic Bugs},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {716--730},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453096},
  doi          = {10.1145/3433210.3453096},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/BundtFD0L21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Veldanda0TKKKDG21,
  author       = {Akshaj Kumar Veldanda and
                  Kang Liu and
                  Benjamin Tan and
                  Prashanth Krishnamurthy and
                  Farshad Khorrami and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {NNoculation: Catching BadNets in the Wild},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486874},
  doi          = {10.1145/3474369.3486874},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Veldanda0TKKKDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/PearceATDK21,
  author       = {Hammond Pearce and
                  Baleegh Ahmad and
                  Benjamin Tan and
                  Brendan Dolan{-}Gavitt and
                  Ramesh Karri},
  title        = {Copilot {CWE} Scenarios Dataset (Version 1)},
  publisher    = {Zenodo},
  year         = {2021},
  month        = aug,
  howpublished = {\url{https://doi.org/10.5281/zenodo.5225651}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.5281/zenodo.5225651},
  doi          = {10.5281/ZENODO.5225651},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/data/10/PearceATDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-09293,
  author       = {Hammond Pearce and
                  Baleegh Ahmad and
                  Benjamin Tan and
                  Brendan Dolan{-}Gavitt and
                  Ramesh Karri},
  title        = {An Empirical Cybersecurity Evaluation of GitHub Copilot's Code Contributions},
  journal      = {CoRR},
  volume       = {abs/2108.09293},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.09293},
  eprinttype    = {arXiv},
  eprint       = {2108.09293},
  timestamp    = {Mon, 29 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-09293.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-02125,
  author       = {Hammond Pearce and
                  Benjamin Tan and
                  Baleegh Ahmad and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt},
  title        = {Can OpenAI Codex and Other Large Language Models Help Us Fix Security
                  Bugs?},
  journal      = {CoRR},
  volume       = {abs/2112.02125},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.02125},
  eprinttype    = {arXiv},
  eprint       = {2112.02125},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-02125.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShenD20,
  author       = {Zekun Shen and
                  Brendan Dolan{-}Gavitt},
  title        = {HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free
                  Vulnerabilities},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {454--465},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427645},
  doi          = {10.1145/3427228.3427645},
  timestamp    = {Tue, 15 Dec 2020 12:22:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShenD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhaoZDPL20,
  author       = {Qingchuan Zhao and
                  Chaoshun Zuo and
                  Brendan Dolan{-}Gavitt and
                  Giancarlo Pellegrino and
                  Zhiqiang Lin},
  title        = {Automatic Uncovering of Hidden Behaviors From Input Validation in
                  Mobile Apps},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1106--1120},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00072},
  doi          = {10.1109/SP40000.2020.00072},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhaoZDPL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-08313,
  author       = {Akshaj Kumar Veldanda and
                  Kang Liu and
                  Benjamin Tan and
                  Prashanth Krishnamurthy and
                  Farshad Khorrami and
                  Ramesh Karri and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  title        = {NNoculation: Broad Spectrum and Targeted Treatment of Backdoored DNNs},
  journal      = {CoRR},
  volume       = {abs/2002.08313},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.08313},
  eprinttype    = {arXiv},
  eprint       = {2002.08313},
  timestamp    = {Mon, 29 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-08313.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuLDG19,
  author       = {Tianyu Gu and
                  Kang Liu and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  title        = {BadNets: Evaluating Backdooring Attacks on Deep Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {47230--47244},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2909068},
  doi          = {10.1109/ACCESS.2019.2909068},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GuLDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FasanoLDB19,
  author       = {Andrew Fasano and
                  Tim Leek and
                  Brendan Dolan{-}Gavitt and
                  Josh Bundt},
  title        = {The Rode0day to Less-Buggy Programs},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {84--88},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2933682},
  doi          = {10.1109/MSEC.2019.2933682},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FasanoLDB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GallagherPDMM18,
  author       = {Kevin Gallagher and
                  Sameer Patil and
                  Brendan Dolan{-}Gavitt and
                  Damon McCoy and
                  Nasir D. Memon},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Peeling the Onion's User Experience Layer: Examining Naturalistic
                  Use of the Tor Browser},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1290--1305},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243803},
  doi          = {10.1145/3243734.3243803},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GallagherPDMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SeveriLD18,
  author       = {Giorgio Severi and
                  Tim Leek and
                  Brendan Dolan{-}Gavitt},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {Malrec: Compact Full-Trace Malware Recording for Retrospective Deep
                  Analysis},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_1},
  doi          = {10.1007/978-3-319-93411-2\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SeveriLD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0017DG18,
  author       = {Kang Liu and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural
                  Networks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {273--294},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_13},
  doi          = {10.1007/978-3-030-00470-5\_13},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/0017DG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/RoyPDH18,
  author       = {Subhajit Roy and
                  Awanish Pandey and
                  Brendan Dolan{-}Gavitt and
                  Yu Hu},
  editor       = {Gary T. Leavens and
                  Alessandro Garcia and
                  Corina S. Pasareanu},
  title        = {Bug synthesis: challenging bug-finding tools with deep faults},
  booktitle    = {Proceedings of the 2018 {ACM} Joint Meeting on European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/SIGSOFT} {FSE} 2018, Lake Buena Vista, FL, USA, November 04-09,
                  2018},
  pages        = {224--234},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3236024.3236084},
  doi          = {10.1145/3236024.3236084},
  timestamp    = {Tue, 03 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/RoyPDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-12185,
  author       = {Kang Liu and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  title        = {Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1805.12185},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.12185},
  eprinttype    = {arXiv},
  eprint       = {1805.12185},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-12185.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-00659,
  author       = {Zhenghao Hu and
                  Yu Hu and
                  Brendan Dolan{-}Gavitt},
  title        = {Chaff Bugs: Deterring Attackers by Making Software Buggier},
  journal      = {CoRR},
  volume       = {abs/1808.00659},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.00659},
  eprinttype    = {arXiv},
  eprint       = {1808.00659},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-00659.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/LiDWC17,
  author       = {Yiwen Li and
                  Brendan Dolan{-}Gavitt and
                  Sam Weber and
                  Justin Cappos},
  editor       = {Dilma Da Silva and
                  Bryan Ford},
  title        = {Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping
                  on the Beaten Path},
  booktitle    = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa
                  Clara, CA, USA, July 12-14, 2017},
  pages        = {1--13},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/li-yiwen},
  timestamp    = {Mon, 01 Feb 2021 08:43:34 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/LiDWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/HulinDSFGSLD17,
  author       = {Patrick Hulin and
                  Andy Davis and
                  Rahul Sridhar and
                  Andrew Fasano and
                  Cody Gallagher and
                  Aaron Sedlacek and
                  Tim Leek and
                  Brendan Dolan{-}Gavitt},
  editor       = {William Enck and
                  Collin Mulliner},
  title        = {AutoCTF: Creating Diverse Pwnables via Automated Bug Injection},
  booktitle    = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
                  BC, Canada, August 14-15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/woot17/workshop-program/presentation/hulin},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/HulinDSFGSLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-06733,
  author       = {Tianyu Gu and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  title        = {BadNets: Identifying Vulnerabilities in the Machine Learning Model
                  Supply Chain},
  journal      = {CoRR},
  volume       = {abs/1708.06733},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.06733},
  eprinttype    = {arXiv},
  eprint       = {1708.06733},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-06733.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Dolan-GavittHKL16,
  author       = {Brendan Dolan{-}Gavitt and
                  Patrick Hulin and
                  Engin Kirda and
                  Tim Leek and
                  Andrea Mambretti and
                  William K. Robertson and
                  Frederick Ulrich and
                  Ryan Whelan},
  title        = {{LAVA:} Large-Scale Automated Vulnerability Addition},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {110--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.15},
  doi          = {10.1109/SP.2016.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Dolan-GavittHKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/DolanGavitt15,
  author       = {Brendan Dolan{-}Gavitt},
  title        = {Understanding and protecting closed-source systems through dynamic
                  analysis},
  school       = {Georgia Institute of Technology, Atlanta, GA, {USA}},
  year         = {2015},
  url          = {https://hdl.handle.net/1853/53012},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/DolanGavitt15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Dolan-GavittHHL15,
  author       = {Brendan Dolan{-}Gavitt and
                  Josh Hodosh and
                  Patrick Hulin and
                  Tim Leek and
                  Ryan Whelan},
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda and
                  Natalia Stakhanova},
  title        = {Repeatable Reverse Engineering with {PANDA}},
  booktitle    = {Proceedings of the 5th Program Protection and Reverse Engineering
                  Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015},
  pages        = {4:1--4:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2843859.2843867},
  doi          = {10.1145/2843859.2843867},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Dolan-GavittHHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dolan-GavittLHL13,
  author       = {Brendan Dolan{-}Gavitt and
                  Tim Leek and
                  Josh Hodosh and
                  Wenke Lee},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Tappan Zee (north) bridge: mining memory accesses for introspection},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {839--850},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516697},
  doi          = {10.1145/2508859.2516697},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Dolan-GavittLHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Dolan-GavittLZGL11,
  author       = {Brendan Dolan{-}Gavitt and
                  Tim Leek and
                  Michael Zhivich and
                  Jonathon T. Giffin and
                  Wenke Lee},
  title        = {Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {297--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.11},
  doi          = {10.1109/SP.2011.11},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Dolan-GavittLZGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dolan-GavittSTG09,
  author       = {Brendan Dolan{-}Gavitt and
                  Abhinav Srivastava and
                  Patrick Traynor and
                  Jonathon T. Giffin},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Robust signatures for kernel data structures},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {566--577},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653730},
  doi          = {10.1145/1653662.1653730},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Dolan-GavittSTG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Dolan-Gavitt08,
  author       = {Brendan Dolan{-}Gavitt},
  title        = {Forensic analysis of the Windows registry in memory},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S26--S32},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.003},
  doi          = {10.1016/J.DIIN.2008.05.003},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Dolan-Gavitt08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Dolan-Gavitt07,
  author       = {Brendan Dolan{-}Gavitt},
  title        = {The {VAD} tree: {A} process-eye view of physical memory},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {62--64},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.008},
  doi          = {10.1016/J.DIIN.2007.06.008},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Dolan-Gavitt07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics