Follow
Tavis Ormandy
Title
Cited by
Cited by
Year
Native client: A sandbox for portable, untrusted x86 native code
B Yee, D Sehr, G Dardyk, JB Chen, R Muth, T Ormandy, S Okasaka, ...
Communications of the ACM 53 (1), 91-99, 2010
10202010
An empirical study into the security exposure to hosts of hostile virtualized environments
T Ormandy
cansecwest 2007, 1-18, 2007
2532007
Flayer: Exposing Application Internals.
W Drewry, T Ormandy
WOOT 7, 1-9, 2007
1152007
Software testing using taint analysis and execution path alteration
WA Drewry, T Ormandy
US Patent 8,381,192, 2013
572013
Fuzzing at scale
C Evans, M Moore, T Ormandy
Google Online Security Blog, 2011
182011
Input selection for automatic test suite generation
T Ormandy, WA Drewry
US Patent 8,745,592, 2014
172014
Sophail: A critical analysis of sophos antivirus
T Ormandy
Proc. of Black Hat USA, 2011
122011
Restricting privileges of first privileged process in operating system using second privileged process
J Tinnes, T Ormandy
US Patent 8,621,647, 2013
82013
Insecure Context Switching: Inoculating Regular Expressions for Survivability.
W Drewry, T Ormandy
WOOT 8, 1-10, 2008
72008
Sophail: Applied attacks against sophos antivirus
T Ormandy
Tech. rep., Self-published, 2012
62012
Coverage analysis using sub-instruction profiling
T Ormandy, WA Drewry
US Patent 8,510,715, 2013
52013
Method and system for validating a disassembler
T Ormandy
US Patent 8,510,713, 2013
52013
Making Software Dumberer
T Ormandy
42009
Linux null pointer dereference due to incorrect proto ops initializations
T Ormandy, J Tinnes
42009
Parallelizing tests with pessimistic speculative execution
T Ormandy
2019
A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta, Jason Franklin, Deepak Garg, Dilsun Kaynar (CMU) Formally Certifying the Security of Digital …
B Coppens, I Verbauwhede, K De Bosschere, N Code, B Yee, D Sehr, ...
Emerging Universal Attack Vectors: A case study of regular expressions
W Drewry, T Ormandy
The system can't perform the operation now. Try again later.
Articles 1–17