Unleashing mayhem on binary code SK Cha, T Avgerinos, A Rebert, D Brumley 2012 IEEE Symposium on Security and Privacy, 380-394, 2012 | 796 | 2012 |
Automatic exploit generation T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley Communications of the ACM 57 (2), 74-84, 2014 | 620 | 2014 |
Enhancing symbolic execution with veritesting T Avgerinos, A Rebert, SK Cha, D Brumley Proceedings of the 36th International Conference on Software Engineering …, 2014 | 359 | 2014 |
Optimizing seed selection for fuzzing A Rebert, SK Cha, T Avgerinos, J Foote, D Warren, G Grieco, D Brumley 23rd USENIX Security Symposium (USENIX Security 14), 861-875, 2014 | 324 | 2014 |
The mayhem cyber reasoning system T Avgerinos, D Brumley, J Davis, R Goulden, T Nighswander, A Rebert, ... IEEE Security & Privacy 16 (2), 52-60, 2018 | 50 | 2018 |
Methods and systems for automatically testing software T Avgerinos, A Rebert, D Brumley US Patent 9,619,375, 2017 | 44 | 2017 |
Detecting exploitable bugs in binary code D Brumley, SK Cha, T Avgerinos, A Rebert US Patent 9,183,396, 2015 | 16 | 2015 |
Secure by design: Google’s perspective on memory safety A Rebert, C Kern Technical report, Google Security Engineering, 2024 | 7 | 2024 |
Detecting exploitable bugs in binary code D Brumley, SK Cha, T Avgerinos, A Rebert US Patent 9,542,559, 2017 | 3 | 2017 |
Unleashing the Mayhem CRS T Avgerinos, D Brumley, J Davis, R Goulden, T Nighswander, A Rebert | 2 | 2016 |
It is time to standardize principles and practices for software memory safety RNM Watson, J Baldwin, D Chisnall, T Chen, J Clarke, B Davis, N Filardo, ... Communications of the ACM, 2025 | | 2025 |
It is time to standardize principles and practices for software memory safety (extended version) RNM Watson, J Baldwin, T Chen, D Chisnall, J Clarke, B Davis, ... University of Cambridge, Computer Laboratory, 2025 | | 2025 |
The magazine archive includes every article published in Communications of the ACM for over the past 50 years. T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley Communications of the ACM 57 (2), 74-84, 2014 | | 2014 |
Automatic Exploit Generation The idea is to identify security-critical software bugs so they can be fixed first. T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley | | |