Personal information
No personal information available
Activities
Employment (1)
2008-07-01
to
present
|
Professor
(Electrical and Computer Engineering)
Employment
Source:
David Brumley
Education and qualifications (1)
2003-08-01
to
2008-07-31
|
PhD
(Computer Science)
Education
Source:
David Brumley
Works (38)
IEEE Security and Privacy
2018
|
Journal article
Contributors:
Avgerinos, T.;
Brumley, D.;
Davis, J.;
Goulden, R.;
Nighswander, T.;
Rebert, A.;
Williamson, N.
Source:
David Brumley
Proceedings - IEEE Computer Security Foundations Symposium
2017
|
Conference paper
Contributors:
Bao, T.;
Shoshitaishvili, Y.;
Wang, R.;
Kruegel, C.;
Vigna, G.;
Brumley, D.
Source:
David Brumley
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
|
Book
Contributors:
Reynolds, A.;
Woo, M.;
Barrett, C.;
Brumley, D.;
Liang, T.;
Tinelli, C.
Source:
David Brumley
Proceedings - IEEE Symposium on Security and Privacy
2017
|
Conference paper
Contributors:
Bao, T.;
Wang, R.;
Shoshitaishvili, Y.;
Brumley, D.
Source:
David Brumley
Communications of the ACM
2016
|
Journal article
Contributors:
Avgerinos, T.;
Rebert, A.;
Cha, S.K.;
Brumley, D.
Source:
David Brumley
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education, 3GSE 2015
2015
|
Conference paper
Contributors:
Burket, J.;
Chapman, P.;
Becker, T.;
Ganas, C.;
Brumley, D.
Source:
David Brumley
2015 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE 2015 - Proceedings
2015
|
Conference paper
Contributors:
Fu, Y.;
Lin, Z.;
Brumley, D.
Source:
David Brumley
Proceedings - IEEE Symposium on Security and Privacy
2015
|
Conference paper
Contributors:
Cha, S.K.;
Woo, M.;
Brumley, D.
Source:
David Brumley
Communications of the ACM
2014
|
Journal article
Contributors:
Avgerinos, T.;
Cha, S.K.;
Rebert, A.;
Schwartz, E.J.;
Woo, M.;
Brumley, D.
Source:
David Brumley
Proceedings - International Conference on Software Engineering
2014
|
Conference paper
Contributors:
Avgerinos, T.;
Rebert, A.;
Cha, S.K.;
Brumley, D.
Source:
David Brumley
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)
2014-08
|
Conference paper
URI:
https://www.usenix.org/conference/3gse14/summit-program/presentation/chapman
Contributors:
Peter Chapman;
Jonathan Burket;
David Brumley
Source:
David Brumley
Proceedings of the ACM Conference on Computer and Communications Security
2013
|
Conference paper
Contributors:
Egele, M.;
Brumley, D.;
Fratantonio, Y.;
Kruegel, C.
Source:
David Brumley
Proceedings of the USENIX Security Symposium
2013
|
Conference paper
URI:
http://users.ece.cmu.edu/$\sim$ejschwar/
Contributors:
Schwartz, Edward J;
Lee, Jonghyup;
Woo, Maverick;
Brumley, David
Source:
David Brumley
Proceedings of the ACM Conference on Computer and Communications Security
2013
|
Conference paper
Contributors:
Woo, M.;
Cha, S.K.;
Gottlieb, S.;
Brumley, D.
Source:
David Brumley
Proceedings of the ACM Conference on Computer and Communication Security
2013
|
Conference paper
Contributors:
Woo, Maverick;
Gottlieb, Samantha;
Cha, Sang Kil;
Brumley, David
Source:
David Brumley
Proceedings of the ACM Conference on Computer and Communications Security
2012
|
Conference paper
Contributors:
Nighswander, T.;
Ledvina, B.;
Diamond, J.;
Brumley, R.;
Brumley, D.
Source:
David Brumley
Proceedings of the IEEE Symposium on Security and Privacy
2012
|
Conference paper
URI:
http://www.computer.org/csdl/proceedings/sp/2012/4681/00/4681a048-abs.html
Contributors:
Jang, Jiyong;
Agrawal, Abeer;
Brumley, David
Source:
David Brumley
Proceedings - IEEE Symposium on Security and Privacy
2012
|
Conference paper
Contributors:
Jang, J.;
Agrawal, A.;
Brumley, D.
Source:
David Brumley
Proceedings - IEEE Symposium on Security and Privacy
2012
|
Conference paper
Contributors:
Cha, S.K.;
Avgerinos, T.;
Rebert, A.;
Brumley, D.
Source:
David Brumley
Proceedings of the Network and Distributed Systems Security Symposium
2011
|
Conference paper
Contributors:
Avgerinos, Thanassis;
Cha, Sang Kil;
Lim Tze Hao, Brent;
Brumley, David
Source:
David Brumley
Proceedings of the ACM Conference on Computer and Communications Security
2011
|
Conference paper
Contributors:
Jang, J.;
Brumley, D.;
Venkataraman, S.
Source:
David Brumley
Journal of Communications and Networks
2011
|
Journal article
Contributors:
Cha, S.K.;
Moraru, I.;
Jang, J.;
Truelove, J.;
Brumley, D.;
Andersen, D.G.
Source:
David Brumley
Proceedings of the Network and Distribution System Security Symposium
2010
|
Conference paper
Contributors:
Schwartz, Edward J;
Brumley, David;
Mccune, Jonathan M
Source:
David Brumley
Proceedings - IEEE Symposium on Security and Privacy
2010
|
Conference paper
Contributors:
Schwartz, E.J.;
Avgerinos, T.;
Brumley, D.
Source:
David Brumley
Proceedings of the ACM Conference on Computer and Communications Security
2010
|
Conference paper
Contributors:
Cha, S.K.;
Pak, B.;
Brumley, D.;
Lipton, R.J.
Source:
David Brumley
Proceedings - IEEE Symposium on Security and Privacy
2008
|
Conference paper
Contributors:
Brumley, D.;
Poosankam, P.;
Song, D.;
Zheng, J.
Source:
David Brumley
Advances in Information Security
2008
|
Book
Contributors:
Brumley, D.;
Hartwig, C.;
Liang, Z.;
Newsome, J.;
Song, D.;
Yin, H.
Source:
David Brumley
grade
Preferred source
(of
2)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
|
Book
Contributors:
Song, D.;
Brumley, D.;
Yin, H.;
Caballero, J.;
Jager, I.;
Kang, M.G.;
Liang, Z.;
Newsome, J.;
Poosankam, P.;
Saxena, P.
Source:
David Brumley
grade
Preferred source
(of
2)
IEEE Transactions on Dependable and Secure Computing
2008
|
Journal article
Contributors:
Brumley, D.;
Newsome, J.;
Song, D.;
Wang, H.;
Jha, S.
Source:
David Brumley
Proceedings - IEEE Computer Security Foundations Symposium
2007
|
Conference paper
Contributors:
Brumley, D.;
Wang, H.;
Jha, S.;
Song, D.
Source:
David Brumley
Operating Systems Review (ACM)
2007
|
Conference paper
Contributors:
Tucek, J.;
Lu, S.;
Huang, C.;
Xanthos, S.;
Zhou, Y.;
Newsome, J.;
Brumley, D.;
Song, D.
Source:
David Brumley
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
2006
|
Conference paper
Contributors:
Brumley, D.;
Liu, L.-H.;
Poosankam, P.;
Song, D.
Source:
David Brumley
Proceedings of the ACM Conference on Computer and Communications Security
2006
|
Conference paper
Contributors:
Newsome, J.;
Brumley, D.;
Franklin, J.;
Song, D.
Source:
David Brumley
1st USENIX Workshop on Hot Topics in Security, HotSec 2006
2006
|
Conference paper
Contributors:
Brumley, D.;
Song, D.
Source:
David Brumley
Proceedings - IEEE Symposium on Security and Privacy
2006
|
Conference paper
Contributors:
Brumley, D.;
Newsome, J.;
Song, D.;
Wang, H.;
Jha, S.
Source:
David Brumley
Computer Networks
2005
|
Journal article
Contributors:
Brumley, D.;
Boneh, D.
Source:
David Brumley
17th Large Installation Systems Administration Conference, LISA 2003
2003
|
Conference paper
Contributors:
Sapuntzakis, C.;
Brumley, D.;
Chandra, R.;
Zeldovich, N.;
Chow, J.;
Lam, M.S.;
Rosenblum, M.
Source:
David Brumley
Proceedings of the USENIX Workshop on Hot Topics in Computer Security
Conference paper
Contributors:
Brumley, David;
Song, Dawn
Source:
David Brumley