{VulChecker}: Graph-based vulnerability localization in source code Y Mirsky, G Macon, M Brown, C Yagemann, M Pruett, E Downing, ... 32nd USENIX Security Symposium (USENIX Security 23), 6557-6574, 2023 | 51 | 2023 |
Is less really more? towards better metrics for measuring security improvements realized through software debloating MD Brown, S Pande 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019 | 48 | 2019 |
Carve: Practical security-focused software debloating using simple feature set mappings MD Brown, S Pande Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software …, 2019 | 31 | 2019 |
A broad comparative evaluation of x86-64 binary rewriters E Schulte, MD Brown, V Folts Proceedings of the 15th Workshop on Cyber Security Experimentation and Test …, 2022 | 14 | 2022 |
Not so fast: understanding and mitigating negative impacts of compiler optimizations on code reuse gadget sets MD Brown, M Pruett, R Bigelow, G Mururu, S Pande Proceedings of the ACM on Programming Languages 5 (OOPSLA), 1-30, 2021 | 11 | 2021 |
Binary Lifter Evaluation E Schulte, V Folts, M Brown arXiv preprint arXiv:2203.13231, 2022 | 4 | 2022 |
Is less really more? why reducing code reuse gadget counts via software debloating doesn’t necessarily lead to better security MD Brown, S Pande arXiv preprint arXiv:1902.10880, 2019 | 3 | 2019 |
SoK: A Broad Comparative Evaluation of Software Debloating Tools. MD Brown, A Meily, B Fairservice, A Sood, J Dorn, E Kilmer, R Eytchison CoRR, 2023 | | 2023 |