Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Brendan Dolan-Gavitt
@article{DBLP:journals/corr/abs-2402-11814, author = {Minghao Shao and Boyuan Chen and Sofija Jancheska and Brendan Dolan{-}Gavitt and Siddharth Garg and Ramesh Karri and Muhammad Shafique}, title = {An Empirical Evaluation of LLMs for Solving Offensive Security Challenges}, journal = {CoRR}, volume = {abs/2402.11814}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.11814}, doi = {10.48550/ARXIV.2402.11814}, eprinttype = {arXiv}, eprint = {2402.11814}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-11814.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/ThakurAFPTKDG23, author = {Shailja Thakur and Baleegh Ahmad and Zhenxing Fan and Hammond Pearce and Benjamin Tan and Ramesh Karri and Brendan Dolan{-}Gavitt and Siddharth Garg}, title = {Benchmarking Large Language Models for Automated Verilog {RTL} Code Generation}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2023, Antwerp, Belgium, April 17-19, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/DATE56975.2023.10137086}, doi = {10.23919/DATE56975.2023.10137086}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/ThakurAFPTKDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/BundtFDRL23, author = {Joshua Bundt and Andrew Fasano and Brendan Dolan{-}Gavitt and William K. Robertson and Tim Leek}, title = {Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis}, booktitle = {{IEEE} Conference on Software Testing, Verification and Validation, {ICST} 2023, Dublin, Ireland, April 16-20, 2023}, pages = {117--128}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICST57152.2023.00020}, doi = {10.1109/ICST57152.2023.00020}, timestamp = {Thu, 01 Jun 2023 13:31:05 +0200}, biburl = {https://dblp.org/rec/conf/icst/BundtFDRL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PearceTAKD23, author = {Hammond Pearce and Benjamin Tan and Baleegh Ahmad and Ramesh Karri and Brendan Dolan{-}Gavitt}, title = {Examining Zero-Shot Vulnerability Repair with Large Language Models}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2339--2356}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179420}, doi = {10.1109/SP46215.2023.10179420}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PearceTAKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PearceTAKD23a, author = {Hammond Pearce and Benjamin Tan and Baleegh Ahmad and Ramesh Karri and Brendan Dolan{-}Gavitt}, title = {Examining Zero-Shot Vulnerability Repair with Large Language Models}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2339--2356}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179324}, doi = {10.1109/SP46215.2023.10179324}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PearceTAKD23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SandovalPNKGD23, author = {Gustavo Sandoval and Hammond Pearce and Teo Nys and Ramesh Karri and Siddharth Garg and Brendan Dolan{-}Gavitt}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Lost at {C:} {A} User Study on the Security Implications of Large Language Model Code Assistants}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2205--2222}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/sandoval}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SandovalPNKGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MehtaJGTDGGD23, author = {Pulak Mehta and Gauri Jagatap and Kevin Gallagher and Brian Timmerman and Progga Deb and Siddharth Garg and Rachel Greenstadt and Brendan Dolan{-}Gavitt}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Can Deepfakes be created on a whim?}, booktitle = {Companion Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {1324--1334}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543873.3587581}, doi = {10.1145/3543873.3587581}, timestamp = {Mon, 28 Aug 2023 21:17:11 +0200}, biburl = {https://dblp.org/rec/conf/www/MehtaJGTDGGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/SandovalPNKGD23, author = {Gustavo Sandoval and Hammond Pearce and Teo Nys and Ramesh Karri and Siddharth Garg and Brendan Dolan{-}Gavitt}, title = {Lost at {C:} Data from the Security-focused User Study (Version 0.2)}, publisher = {Zenodo}, year = {2023}, month = mar, howpublished = {\url{https://doi.org/10.5281/zenodo.7708658}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.5281/zenodo.7708658}, doi = {10.5281/ZENODO.7708658}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/data/10/SandovalPNKGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-14576, author = {Pulak Mehta and Gauri Jagatap and Kevin Gallagher and Brian Timmerman and Progga Deb and Siddharth Garg and Rachel Greenstadt and Brendan Dolan{-}Gavitt}, title = {Can deepfakes be created by novice users?}, journal = {CoRR}, volume = {abs/2304.14576}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.14576}, doi = {10.48550/ARXIV.2304.14576}, eprinttype = {arXiv}, eprint = {2304.14576}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-14576.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-06161, author = {Raymond Li and Loubna Ben Allal and Yangtian Zi and Niklas Muennighoff and Denis Kocetkov and Chenghao Mou and Marc Marone and Christopher Akiki and Jia Li and Jenny Chim and Qian Liu and Evgenii Zheltonozhskii and Terry Yue Zhuo and Thomas Wang and Olivier Dehaene and Mishig Davaadorj and Joel Lamy{-}Poirier and Jo{\~{a}}o Monteiro and Oleh Shliazhko and Nicolas Gontier and Nicholas Meade and Armel Zebaze and Ming{-}Ho Yee and Logesh Kumar Umapathi and Jian Zhu and Benjamin Lipkin and Muhtasham Oblokulov and Zhiruo Wang and Rudra Murthy V and Jason Stillerman and Siva Sankalp Patel and Dmitry Abulkhanov and Marco Zocca and Manan Dey and Zhihan Zhang and Nour Moustafa{-}Fahmy and Urvashi Bhattacharyya and Wenhao Yu and Swayam Singh and Sasha Luccioni and Paulo Villegas and Maxim Kunakov and Fedor Zhdanov and Manuel Romero and Tony Lee and Nadav Timor and Jennifer Ding and Claire Schlesinger and Hailey Schoelkopf and Jan Ebert and Tri Dao and Mayank Mishra and Alex Gu and Jennifer Robinson and Carolyn Jane Anderson and Brendan Dolan{-}Gavitt and Danish Contractor and Siva Reddy and Daniel Fried and Dzmitry Bahdanau and Yacine Jernite and Carlos Mu{\~{n}}oz Ferrandis and Sean Hughes and Thomas Wolf and Arjun Guha and Leandro von Werra and Harm de Vries}, title = {StarCoder: may the source be with you!}, journal = {CoRR}, volume = {abs/2305.06161}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.06161}, doi = {10.48550/ARXIV.2305.06161}, eprinttype = {arXiv}, eprint = {2305.06161}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-06161.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-14027, author = {Rahul Kande and Hammond Pearce and Benjamin Tan and Brendan Dolan{-}Gavitt and Shailja Thakur and Ramesh Karri and Jeyavijayan Rajendran}, title = {LLM-assisted Generation of Hardware Assertions}, journal = {CoRR}, volume = {abs/2306.14027}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.14027}, doi = {10.48550/ARXIV.2306.14027}, eprinttype = {arXiv}, eprint = {2306.14027}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-14027.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-00708, author = {Shailja Thakur and Baleegh Ahmad and Hammond Pearce and Benjamin Tan and Brendan Dolan{-}Gavitt and Ramesh Karri and Siddharth Garg}, title = {VeriGen: {A} Large Language Model for Verilog Code Generation}, journal = {CoRR}, volume = {abs/2308.00708}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.00708}, doi = {10.48550/ARXIV.2308.00708}, eprinttype = {arXiv}, eprint = {2308.00708}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-00708.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HuHD22, author = {Zhenghao Hu and Yu Hu and Brendan Dolan{-}Gavitt}, title = {Towards Deceptive Defense in Software Security with Chaff Bugs}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {43--55}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545981}, doi = {10.1145/3545948.3545981}, timestamp = {Thu, 20 Oct 2022 10:46:43 +0200}, biburl = {https://dblp.org/rec/conf/raid/HuHD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PearceA0DK22, author = {Hammond Pearce and Baleegh Ahmad and Benjamin Tan and Brendan Dolan{-}Gavitt and Ramesh Karri}, title = {Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {754--768}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833571}, doi = {10.1109/SP46214.2022.9833571}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PearceA0DK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HuD22, author = {Zhenghao Hu and Brendan Dolan{-}Gavitt}, title = {IRQDebloat: Reducing Driver Attack Surface in Embedded Devices}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1608--1622}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833695}, doi = {10.1109/SP46214.2022.9833695}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/HuD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShenRD22, author = {Zekun Shen and Ritik Roongta and Brendan Dolan{-}Gavitt}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1275--1290}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/shen-zekun}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/ShenRD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/HuSD22, author = {Yu Hu and Zekun Shen and Brendan Dolan{-}Gavitt}, title = {Characterizing and Improving Bug-Finders with Synthetic Bugs}, booktitle = {{IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022}, pages = {971--982}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SANER53432.2022.00115}, doi = {10.1109/SANER53432.2022.00115}, timestamp = {Tue, 26 Jul 2022 14:23:17 +0200}, biburl = {https://dblp.org/rec/conf/wcre/HuSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/PearceTAKD22, author = {Hammond Pearce and Benjamin Tan and Baleegh Ahmad and Ramesh Karri and Brendan Dolan{-}Gavitt}, title = {Code and Dataset for "Examining Zero-Shot Vulnerability Repair with Large Language Models" (Version 1.0)}, publisher = {Zenodo}, year = {2022}, month = mar, howpublished = {\url{https://doi.org/10.5281/zenodo.7199939}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.5281/zenodo.7199939}, doi = {10.5281/ZENODO.7199939}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/data/10/PearceTAKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/SandovalPNKGD22, author = {Gustavo Sandoval and Hammond Pearce and Teo Nys and Ramesh Karri and Siddharth Garg and Brendan Dolan{-}Gavitt}, title = {Lost at {C:} Data from the Security-focused User Study (Version 0.1)}, publisher = {Zenodo}, year = {2022}, month = oct, howpublished = {\url{https://doi.org/10.5281/zenodo.7187359}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.5281/zenodo.7187359}, doi = {10.5281/ZENODO.7187359}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/data/10/SandovalPNKGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-01142, author = {Hammond Pearce and Benjamin Tan and Prashanth Krishnamurthy and Farshad Khorrami and Ramesh Karri and Brendan Dolan{-}Gavitt}, title = {Pop Quiz! Can a Large Language Model Help With Reverse Engineering?}, journal = {CoRR}, volume = {abs/2202.01142}, year = {2022}, url = {https://arxiv.org/abs/2202.01142}, eprinttype = {arXiv}, eprint = {2202.01142}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-01142.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-09727, author = {Gustavo Sandoval and Hammond Pearce and Teo Nys and Ramesh Karri and Brendan Dolan{-}Gavitt and Siddharth Garg}, title = {Security Implications of Large Language Model Code Assistants: {A} User Study}, journal = {CoRR}, volume = {abs/2208.09727}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.09727}, doi = {10.48550/ARXIV.2208.09727}, eprinttype = {arXiv}, eprint = {2208.09727}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-09727.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-11088, author = {Joshua Bundt and Andrew Fasano and Brendan Dolan{-}Gavitt and William K. Robertson and Tim Leek}, title = {Evaluating Synthetic Bugs}, journal = {CoRR}, volume = {abs/2208.11088}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.11088}, doi = {10.48550/ARXIV.2208.11088}, eprinttype = {arXiv}, eprint = {2208.11088}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-11088.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-08950, author = {Iman Hosseini and Brendan Dolan{-}Gavitt}, title = {Beyond the {C:} Retargetable Decompilation using Neural Machine Translation}, journal = {CoRR}, volume = {abs/2212.08950}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.08950}, doi = {10.48550/ARXIV.2212.08950}, eprinttype = {arXiv}, eprint = {2212.08950}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-08950.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-11140, author = {Shailja Thakur and Baleegh Ahmad and Zhenxing Fan and Hammond Pearce and Benjamin Tan and Ramesh Karri and Brendan Dolan{-}Gavitt and Siddharth Garg}, title = {Benchmarking Large Language Models for Automated Verilog {RTL} Code Generation}, journal = {CoRR}, volume = {abs/2212.11140}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.11140}, doi = {10.48550/ARXIV.2212.11140}, eprinttype = {arXiv}, eprint = {2212.11140}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-11140.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-11162, author = {Joshua Bundt and Andrew Fasano and Brendan Dolan{-}Gavitt and William K. Robertson and Tim Leek}, title = {Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis}, journal = {CoRR}, volume = {abs/2212.11162}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.11162}, doi = {10.48550/ARXIV.2212.11162}, eprinttype = {arXiv}, eprint = {2212.11162}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-11162.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/FasanoBMLBDEFLG21, author = {Andrew Fasano and Tiemoko Ballo and Marius Muench and Tim Leek and Alexander Bulekov and Brendan Dolan{-}Gavitt and Manuel Egele and Aur{\'{e}}lien Francillon and Long Lu and Nick Gregory and Davide Balzarotti and William Robertson}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {SoK: Enabling Security Analyses of Embedded Systems via Rehosting}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {687--701}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453093}, doi = {10.1145/3433210.3453093}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/FasanoBMLBDEFLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/BundtFD0L21, author = {Joshua Bundt and Andrew Fasano and Brendan Dolan{-}Gavitt and William Robertson and Tim Leek}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Evaluating Synthetic Bugs}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {716--730}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453096}, doi = {10.1145/3433210.3453096}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/BundtFD0L21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Veldanda0TKKKDG21, author = {Akshaj Kumar Veldanda and Kang Liu and Benjamin Tan and Prashanth Krishnamurthy and Farshad Khorrami and Ramesh Karri and Brendan Dolan{-}Gavitt and Siddharth Garg}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {NNoculation: Catching BadNets in the Wild}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {49--60}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486874}, doi = {10.1145/3474369.3486874}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Veldanda0TKKKDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/PearceATDK21, author = {Hammond Pearce and Baleegh Ahmad and Benjamin Tan and Brendan Dolan{-}Gavitt and Ramesh Karri}, title = {Copilot {CWE} Scenarios Dataset (Version 1)}, publisher = {Zenodo}, year = {2021}, month = aug, howpublished = {\url{https://doi.org/10.5281/zenodo.5225651}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.5281/zenodo.5225651}, doi = {10.5281/ZENODO.5225651}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/data/10/PearceATDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-09293, author = {Hammond Pearce and Baleegh Ahmad and Benjamin Tan and Brendan Dolan{-}Gavitt and Ramesh Karri}, title = {An Empirical Cybersecurity Evaluation of GitHub Copilot's Code Contributions}, journal = {CoRR}, volume = {abs/2108.09293}, year = {2021}, url = {https://arxiv.org/abs/2108.09293}, eprinttype = {arXiv}, eprint = {2108.09293}, timestamp = {Mon, 29 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-09293.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-02125, author = {Hammond Pearce and Benjamin Tan and Baleegh Ahmad and Ramesh Karri and Brendan Dolan{-}Gavitt}, title = {Can OpenAI Codex and Other Large Language Models Help Us Fix Security Bugs?}, journal = {CoRR}, volume = {abs/2112.02125}, year = {2021}, url = {https://arxiv.org/abs/2112.02125}, eprinttype = {arXiv}, eprint = {2112.02125}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-02125.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShenD20, author = {Zekun Shen and Brendan Dolan{-}Gavitt}, title = {HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {454--465}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427645}, doi = {10.1145/3427228.3427645}, timestamp = {Tue, 15 Dec 2020 12:22:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShenD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhaoZDPL20, author = {Qingchuan Zhao and Chaoshun Zuo and Brendan Dolan{-}Gavitt and Giancarlo Pellegrino and Zhiqiang Lin}, title = {Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1106--1120}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00072}, doi = {10.1109/SP40000.2020.00072}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhaoZDPL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-08313, author = {Akshaj Kumar Veldanda and Kang Liu and Benjamin Tan and Prashanth Krishnamurthy and Farshad Khorrami and Ramesh Karri and Brendan Dolan{-}Gavitt and Siddharth Garg}, title = {NNoculation: Broad Spectrum and Targeted Treatment of Backdoored DNNs}, journal = {CoRR}, volume = {abs/2002.08313}, year = {2020}, url = {https://arxiv.org/abs/2002.08313}, eprinttype = {arXiv}, eprint = {2002.08313}, timestamp = {Mon, 29 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-08313.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuLDG19, author = {Tianyu Gu and Kang Liu and Brendan Dolan{-}Gavitt and Siddharth Garg}, title = {BadNets: Evaluating Backdooring Attacks on Deep Neural Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {47230--47244}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2909068}, doi = {10.1109/ACCESS.2019.2909068}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuLDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FasanoLDB19, author = {Andrew Fasano and Tim Leek and Brendan Dolan{-}Gavitt and Josh Bundt}, title = {The Rode0day to Less-Buggy Programs}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {84--88}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2933682}, doi = {10.1109/MSEC.2019.2933682}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/FasanoLDB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GallagherPDMM18, author = {Kevin Gallagher and Sameer Patil and Brendan Dolan{-}Gavitt and Damon McCoy and Nasir D. Memon}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1290--1305}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243803}, doi = {10.1145/3243734.3243803}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GallagherPDMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SeveriLD18, author = {Giorgio Severi and Tim Leek and Brendan Dolan{-}Gavitt}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {3--23}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_1}, doi = {10.1007/978-3-319-93411-2\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SeveriLD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0017DG18, author = {Kang Liu and Brendan Dolan{-}Gavitt and Siddharth Garg}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {273--294}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_13}, doi = {10.1007/978-3-030-00470-5\_13}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/0017DG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/RoyPDH18, author = {Subhajit Roy and Awanish Pandey and Brendan Dolan{-}Gavitt and Yu Hu}, editor = {Gary T. Leavens and Alessandro Garcia and Corina S. Pasareanu}, title = {Bug synthesis: challenging bug-finding tools with deep faults}, booktitle = {Proceedings of the 2018 {ACM} Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/SIGSOFT} {FSE} 2018, Lake Buena Vista, FL, USA, November 04-09, 2018}, pages = {224--234}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3236024.3236084}, doi = {10.1145/3236024.3236084}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/RoyPDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-12185, author = {Kang Liu and Brendan Dolan{-}Gavitt and Siddharth Garg}, title = {Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks}, journal = {CoRR}, volume = {abs/1805.12185}, year = {2018}, url = {http://arxiv.org/abs/1805.12185}, eprinttype = {arXiv}, eprint = {1805.12185}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-12185.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-00659, author = {Zhenghao Hu and Yu Hu and Brendan Dolan{-}Gavitt}, title = {Chaff Bugs: Deterring Attackers by Making Software Buggier}, journal = {CoRR}, volume = {abs/1808.00659}, year = {2018}, url = {http://arxiv.org/abs/1808.00659}, eprinttype = {arXiv}, eprint = {1808.00659}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-00659.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/LiDWC17, author = {Yiwen Li and Brendan Dolan{-}Gavitt and Sam Weber and Justin Cappos}, editor = {Dilma Da Silva and Bryan Ford}, title = {Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path}, booktitle = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {1--13}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/li-yiwen}, timestamp = {Mon, 01 Feb 2021 08:43:34 +0100}, biburl = {https://dblp.org/rec/conf/usenix/LiDWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/HulinDSFGSLD17, author = {Patrick Hulin and Andy Davis and Rahul Sridhar and Andrew Fasano and Cody Gallagher and Aaron Sedlacek and Tim Leek and Brendan Dolan{-}Gavitt}, editor = {William Enck and Collin Mulliner}, title = {AutoCTF: Creating Diverse Pwnables via Automated Bug Injection}, booktitle = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver, BC, Canada, August 14-15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/hulin}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/HulinDSFGSLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-06733, author = {Tianyu Gu and Brendan Dolan{-}Gavitt and Siddharth Garg}, title = {BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain}, journal = {CoRR}, volume = {abs/1708.06733}, year = {2017}, url = {http://arxiv.org/abs/1708.06733}, eprinttype = {arXiv}, eprint = {1708.06733}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-06733.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Dolan-GavittHKL16, author = {Brendan Dolan{-}Gavitt and Patrick Hulin and Engin Kirda and Tim Leek and Andrea Mambretti and William K. Robertson and Frederick Ulrich and Ryan Whelan}, title = {{LAVA:} Large-Scale Automated Vulnerability Addition}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {110--121}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.15}, doi = {10.1109/SP.2016.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Dolan-GavittHKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/DolanGavitt15, author = {Brendan Dolan{-}Gavitt}, title = {Understanding and protecting closed-source systems through dynamic analysis}, school = {Georgia Institute of Technology, Atlanta, GA, {USA}}, year = {2015}, url = {https://hdl.handle.net/1853/53012}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/DolanGavitt15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Dolan-GavittHHL15, author = {Brendan Dolan{-}Gavitt and Josh Hodosh and Patrick Hulin and Tim Leek and Ryan Whelan}, editor = {Jeffrey Todd McDonald and Mila Dalla Preda and Natalia Stakhanova}, title = {Repeatable Reverse Engineering with {PANDA}}, booktitle = {Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015}, pages = {4:1--4:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2843859.2843867}, doi = {10.1145/2843859.2843867}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Dolan-GavittHHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dolan-GavittLHL13, author = {Brendan Dolan{-}Gavitt and Tim Leek and Josh Hodosh and Wenke Lee}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Tappan Zee (north) bridge: mining memory accesses for introspection}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {839--850}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516697}, doi = {10.1145/2508859.2516697}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dolan-GavittLHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Dolan-GavittLZGL11, author = {Brendan Dolan{-}Gavitt and Tim Leek and Michael Zhivich and Jonathon T. Giffin and Wenke Lee}, title = {Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {297--312}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.11}, doi = {10.1109/SP.2011.11}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/Dolan-GavittLZGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dolan-GavittSTG09, author = {Brendan Dolan{-}Gavitt and Abhinav Srivastava and Patrick Traynor and Jonathon T. Giffin}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Robust signatures for kernel data structures}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {566--577}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653730}, doi = {10.1145/1653662.1653730}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dolan-GavittSTG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Dolan-Gavitt08, author = {Brendan Dolan{-}Gavitt}, title = {Forensic analysis of the Windows registry in memory}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S26--S32}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.003}, doi = {10.1016/J.DIIN.2008.05.003}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Dolan-Gavitt08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Dolan-Gavitt07, author = {Brendan Dolan{-}Gavitt}, title = {The {VAD} tree: {A} process-eye view of physical memory}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {62--64}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.008}, doi = {10.1016/J.DIIN.2007.06.008}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Dolan-Gavitt07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.