{BYTEWEIGHT}: Learning to recognize functions in binary code T Bao, J Burket, M Woo, R Turner, D Brumley 23rd USENIX Security Symposium (USENIX Security 14), 845-860, 2014 | 338 | 2014 |
Network (In) Security Through IP Packet Filtering. DB Chapman USENIX Summer 21, 1992 | 289* | 1992 |
Automatic problem generation for {Capture-the-Flag} competitions J Burket, P Chapman, T Becker, C Ganas, D Brumley 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015 | 40 | 2015 |
{GuardRails}: A {Data-Centric} Web Application Security Framework J Burket, P Mutchler, M Weaver, M Zaveri, D Evans 2nd USENIX Conference on Web Application Development (WebApps 11), 2011 | 35 | 2011 |
Making didfail succeed: Enhancing the cert static taint analyzer for android app sets J Burket, L Flynn, W Klieber, J Lim, W Shen, W Snavely Software Engineering Institute, Carnegie Mellon University, Tech. Rep. CMU …, 2015 | 17 | 2015 |
PicoCTF: A Game-Based Computer Security Competition for High School Students. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14). USENIX … P Chapman, J Burket, D Brumley USENIX Association, San Diego, 2014 | 7 | 2014 |
If-Conversion to Combat Control Flow-based Timing Attacks J Burket, S Gottlieb | | 2014 |
Securing web applications is not nearly as easy! J Burket, P Mutchler, M Weaver, M Zaveri, D Evans | | |