Follow
Brendan Dolan-Gavitt
Brendan Dolan-Gavitt
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Badnets: Identifying vulnerabilities in the machine learning model supply chain
T Gu, B Dolan-Gavitt, S Garg
arXiv preprint arXiv:1708.06733, 2017
15472017
Fine-pruning: Defending against backdooring attacks on deep neural networks
K Liu, B Dolan-Gavitt, S Garg
International symposium on research in attacks, intrusions, and defenses …, 2018
9692018
Badnets: Evaluating backdooring attacks on deep neural networks
T Gu, K Liu, B Dolan-Gavitt, S Garg
IEEE Access 7, 47230-47244, 2019
8732019
Virtuoso: Narrowing the semantic gap in virtual machine introspection
B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee
2011 IEEE symposium on security and privacy, 297-312, 2011
4272011
Lava: Large-scale automated vulnerability addition
B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ...
2016 IEEE symposium on security and privacy (SP), 110-121, 2016
3992016
Starcoder: may the source be with you!
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
arXiv preprint arXiv:2305.06161, 2023
2802023
Asleep at the keyboard? assessing the security of github copilot’s code contributions
H Pearce, B Ahmad, B Tan, B Dolan-Gavitt, R Karri
2022 IEEE Symposium on Security and Privacy (SP), 754-768, 2022
279*2022
Robust signatures for kernel data structures
B Dolan-Gavitt, A Srivastava, P Traynor, J Giffin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2172009
Repeatable reverse engineering with PANDA
B Dolan-Gavitt, J Hodosh, P Hulin, T Leek, R Whelan
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015
1832015
Examining zero-shot vulnerability repair with large language models
H Pearce, B Tan, B Ahmad, R Karri, B Dolan-Gavitt
2023 IEEE Symposium on Security and Privacy (SP), 2339-2356, 2023
166*2023
Forensic analysis of the Windows registry in memory
B Dolan-Gavitt
digital investigation 5, S26-S32, 2008
1322008
The VAD tree: A process-eye view of physical memory
B Dolan-Gavitt
digital investigation 4, 62-64, 2007
1212007
Tappan zee (north) bridge: mining memory accesses for introspection
B Dolan-Gavitt, T Leek, J Hodosh, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1102013
Leveraging forensic tools for virtual machine introspection
B Dolan-Gavitt, B Payne, W Lee
Gt-cs-11-05, Georgia Institute of Technology, 2011
792011
Bug synthesis: Challenging bug-finding tools with deep faults
S Roy, A Pandey, B Dolan-Gavitt, Y Hu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
712018
Nnoculation: Catching badnets in the wild
AK Veldanda, K Liu, B Tan, P Krishnamurthy, F Khorrami, R Karri, ...
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
68*2021
Lost at c: A user study on the security implications of large language model code assistants
G Sandoval, H Pearce, T Nys, R Karri, S Garg, B Dolan-Gavitt
32nd USENIX Security Symposium (USENIX Security 23), 2205-2222, 2023
66*2023
Security systems and methods for distinguishing user-intended traffic from malicious traffic
BD Payne, B Dolan-Gavitt, W Lee
US Patent App. 13/232,830, 2012
642012
Danish Contractor
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
Siva Reddy, Daniel Fried, Dzmitry Bahdanau, Yacine Jernite, Carlos Muñoz …, 2023
512023
Danish Contractor, Siva Reddy, Daniel Fried, Dzmitry Bahdanau, Yacine Jernite, Carlos Muñoz Ferrandis, Sean Hughes, Thomas Wolf, Arjun Guha, Leandro von Werra, and Harm de Vries
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
Starcoder: may the source be with you 3 (6), 2023
482023
The system can't perform the operation now. Try again later.
Articles 1–20