default search action
Brendan Dolan-Gavitt
Person information
- affiliation: New York University, Brooklyn, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Rahul Kande, Hammond Pearce, Benjamin Tan, Brendan Dolan-Gavitt, Shailja Thakur, Ramesh Karri, Jeyavijayan Rajendran:
(Security) Assertions by Large Language Models. IEEE Trans. Inf. Forensics Secur. 19: 4374-4389 (2024) - [j6]Shailja Thakur, Baleegh Ahmad, Hammond Pearce, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri, Siddharth Garg:
VeriGen: A Large Language Model for Verilog Code Generation. ACM Trans. Design Autom. Electr. Syst. 29(3): 46:1-46:31 (2024) - [i20]Minghao Shao, Boyuan Chen, Sofija Jancheska, Brendan Dolan-Gavitt, Siddharth Garg, Ramesh Karri, Muhammad Shafique:
An Empirical Evaluation of LLMs for Solving Offensive Security Challenges. CoRR abs/2402.11814 (2024) - [i19]Boyuan Chen, Mingzhi Zhu, Brendan Dolan-Gavitt, Muhammad Shafique, Siddharth Garg:
Model Cascading for Code: Reducing Inference Costs with Model Cascading for LLM Based Code Generation. CoRR abs/2405.15842 (2024) - [i18]Minghao Shao, Sofija Jancheska, Meet Udeshi, Brendan Dolan-Gavitt, Haoran Xi, Kimberly Milner, Boyuan Chen, Max Yin, Siddharth Garg, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Muhammad Shafique:
NYU CTF Dataset: A Scalable Open-Source Benchmark Dataset for Evaluating LLMs in Offensive Security. CoRR abs/2406.05590 (2024) - [i17]Xiang Mei, Pulkit Singh Singaria, Jordi Del Castillo, Haoran Xi, Abdelouahab Benchikh, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Hammond Pearce, Brendan Dolan-Gavitt:
ARVO: Atlas of Reproducible Vulnerabilities for Open Source Software. CoRR abs/2408.02153 (2024) - 2023
- [j5]Raymond Li, Loubna Ben Allal, Yangtian Zi, Niklas Muennighoff, Denis Kocetkov, Chenghao Mou, Marc Marone, Christopher Akiki, Jia Li, Jenny Chim, Qian Liu, Evgenii Zheltonozhskii, Terry Yue Zhuo, Thomas Wang, Olivier Dehaene, Mishig Davaadorj, Joel Lamy-Poirier, João Monteiro, Oleh Shliazhko, Nicolas Gontier, Nicholas Meade, Armel Zebaze, Ming-Ho Yee, Logesh Kumar Umapathi, Jian Zhu, Benjamin Lipkin, Muhtasham Oblokulov, Zhiruo Wang, Rudra Murthy V, Jason T. Stillerman, Siva Sankalp Patel, Dmitry Abulkhanov, Marco Zocca, Manan Dey, Zhihan Zhang, Nour Fahmy, Urvashi Bhattacharyya, Wenhao Yu, Swayam Singh, Sasha Luccioni, Paulo Villegas, Maxim Kunakov, Fedor Zhdanov, Manuel Romero, Tony Lee, Nadav Timor, Jennifer Ding, Claire Schlesinger, Hailey Schoelkopf, Jan Ebert, Tri Dao, Mayank Mishra, Alex Gu, Jennifer Robinson, Carolyn Jane Anderson, Brendan Dolan-Gavitt, Danish Contractor, Siva Reddy, Daniel Fried, Dzmitry Bahdanau, Yacine Jernite, Carlos Muñoz Ferrandis, Sean Hughes, Thomas Wolf, Arjun Guha, Leandro von Werra, Harm de Vries:
StarCoder: may the source be with you! Trans. Mach. Learn. Res. 2023 (2023) - [c27]Shailja Thakur, Baleegh Ahmad, Zhenxing Fan, Hammond Pearce, Benjamin Tan, Ramesh Karri, Brendan Dolan-Gavitt, Siddharth Garg:
Benchmarking Large Language Models for Automated Verilog RTL Code Generation. DATE 2023: 1-6 - [c26]Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William K. Robertson, Tim Leek:
Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis. ICST 2023: 117-128 - [c25]Hammond Pearce, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, Brendan Dolan-Gavitt:
Examining Zero-Shot Vulnerability Repair with Large Language Models. SP 2023: 2339-2356 - [c24]Hammond Pearce, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, Brendan Dolan-Gavitt:
Examining Zero-Shot Vulnerability Repair with Large Language Models. SP 2023: 2339-2356 - [c23]Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, Brendan Dolan-Gavitt:
Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants. USENIX Security Symposium 2023: 2205-2222 - [c22]Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt:
Can Deepfakes be created on a whim? WWW (Companion Volume) 2023: 1324-1334 - [d4]Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, Brendan Dolan-Gavitt:
Lost at C: Data from the Security-focused User Study. Version 0.2. Zenodo, 2023 [all versions] - [i16]Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt:
Can deepfakes be created by novice users? CoRR abs/2304.14576 (2023) - [i15]Raymond Li, Loubna Ben Allal, Yangtian Zi, Niklas Muennighoff, Denis Kocetkov, Chenghao Mou, Marc Marone, Christopher Akiki, Jia Li, Jenny Chim, Qian Liu, Evgenii Zheltonozhskii, Terry Yue Zhuo, Thomas Wang, Olivier Dehaene, Mishig Davaadorj, Joel Lamy-Poirier, João Monteiro, Oleh Shliazhko, Nicolas Gontier, Nicholas Meade, Armel Zebaze, Ming-Ho Yee, Logesh Kumar Umapathi, Jian Zhu, Benjamin Lipkin, Muhtasham Oblokulov, Zhiruo Wang, Rudra Murthy V, Jason Stillerman, Siva Sankalp Patel, Dmitry Abulkhanov, Marco Zocca, Manan Dey, Zhihan Zhang, Nour Moustafa-Fahmy, Urvashi Bhattacharyya, Wenhao Yu, Swayam Singh, Sasha Luccioni, Paulo Villegas, Maxim Kunakov, Fedor Zhdanov, Manuel Romero, Tony Lee, Nadav Timor, Jennifer Ding, Claire Schlesinger, Hailey Schoelkopf, Jan Ebert, Tri Dao, Mayank Mishra, Alex Gu, Jennifer Robinson, Carolyn Jane Anderson, Brendan Dolan-Gavitt, Danish Contractor, Siva Reddy, Daniel Fried, Dzmitry Bahdanau, Yacine Jernite, Carlos Muñoz Ferrandis, Sean Hughes, Thomas Wolf, Arjun Guha, Leandro von Werra, Harm de Vries:
StarCoder: may the source be with you! CoRR abs/2305.06161 (2023) - [i14]Rahul Kande, Hammond Pearce, Benjamin Tan, Brendan Dolan-Gavitt, Shailja Thakur, Ramesh Karri, Jeyavijayan Rajendran:
LLM-assisted Generation of Hardware Assertions. CoRR abs/2306.14027 (2023) - [i13]Shailja Thakur, Baleegh Ahmad, Hammond Pearce, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri, Siddharth Garg:
VeriGen: A Large Language Model for Verilog Code Generation. CoRR abs/2308.00708 (2023) - 2022
- [c21]Zhenghao Hu, Yu Hu, Brendan Dolan-Gavitt:
Towards Deceptive Defense in Software Security with Chaff Bugs. RAID 2022: 43-55 - [c20]Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri:
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions. SP 2022: 754-768 - [c19]Zhenghao Hu, Brendan Dolan-Gavitt:
IRQDebloat: Reducing Driver Attack Surface in Embedded Devices. SP 2022: 1608-1622 - [c18]Zekun Shen, Ritik Roongta, Brendan Dolan-Gavitt:
Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds. USENIX Security Symposium 2022: 1275-1290 - [c17]Yu Hu, Zekun Shen, Brendan Dolan-Gavitt:
Characterizing and Improving Bug-Finders with Synthetic Bugs. SANER 2022: 971-982 - [d3]Hammond Pearce, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, Brendan Dolan-Gavitt:
Code and Dataset for "Examining Zero-Shot Vulnerability Repair with Large Language Models". Zenodo, 2022 - [d2]Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, Brendan Dolan-Gavitt:
Lost at C: Data from the Security-focused User Study. Version 0.1. Zenodo, 2022 [all versions] - [i12]Hammond Pearce, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt:
Pop Quiz! Can a Large Language Model Help With Reverse Engineering? CoRR abs/2202.01142 (2022) - [i11]Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Brendan Dolan-Gavitt, Siddharth Garg:
Security Implications of Large Language Model Code Assistants: A User Study. CoRR abs/2208.09727 (2022) - [i10]Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William K. Robertson, Tim Leek:
Evaluating Synthetic Bugs. CoRR abs/2208.11088 (2022) - [i9]Iman Hosseini, Brendan Dolan-Gavitt:
Beyond the C: Retargetable Decompilation using Neural Machine Translation. CoRR abs/2212.08950 (2022) - [i8]Shailja Thakur, Baleegh Ahmad, Zhenxing Fan, Hammond Pearce, Benjamin Tan, Ramesh Karri, Brendan Dolan-Gavitt, Siddharth Garg:
Benchmarking Large Language Models for Automated Verilog RTL Code Generation. CoRR abs/2212.11140 (2022) - [i7]Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William K. Robertson, Tim Leek:
Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis. CoRR abs/2212.11162 (2022) - 2021
- [c16]Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson:
SoK: Enabling Security Analyses of Embedded Systems via Rehosting. AsiaCCS 2021: 687-701 - [c15]Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson, Tim Leek:
Evaluating Synthetic Bugs. AsiaCCS 2021: 716-730 - [c14]Akshaj Kumar Veldanda, Kang Liu, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt, Siddharth Garg:
NNoculation: Catching BadNets in the Wild. AISec@CCS 2021: 49-60 - [d1]Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri:
Copilot CWE Scenarios Dataset. Zenodo, 2021 - [i6]Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri:
An Empirical Cybersecurity Evaluation of GitHub Copilot's Code Contributions. CoRR abs/2108.09293 (2021) - [i5]Hammond Pearce, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, Brendan Dolan-Gavitt:
Can OpenAI Codex and Other Large Language Models Help Us Fix Security Bugs? CoRR abs/2112.02125 (2021) - 2020
- [c13]Zekun Shen, Brendan Dolan-Gavitt:
HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities. ACSAC 2020: 454-465 - [c12]Qingchuan Zhao, Chaoshun Zuo, Brendan Dolan-Gavitt, Giancarlo Pellegrino, Zhiqiang Lin:
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. SP 2020: 1106-1120 - [i4]Akshaj Kumar Veldanda, Kang Liu, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt, Siddharth Garg:
NNoculation: Broad Spectrum and Targeted Treatment of Backdoored DNNs. CoRR abs/2002.08313 (2020)
2010 – 2019
- 2019
- [j4]Tianyu Gu, Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg:
BadNets: Evaluating Backdooring Attacks on Deep Neural Networks. IEEE Access 7: 47230-47244 (2019) - [j3]Andrew Fasano, Tim Leek, Brendan Dolan-Gavitt, Josh Bundt:
The Rode0day to Less-Buggy Programs. IEEE Secur. Priv. 17(6): 84-88 (2019) - 2018
- [c11]Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon:
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. CCS 2018: 1290-1305 - [c10]Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt:
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis. DIMVA 2018: 3-23 - [c9]Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg:
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks. RAID 2018: 273-294 - [c8]Subhajit Roy, Awanish Pandey, Brendan Dolan-Gavitt, Yu Hu:
Bug synthesis: challenging bug-finding tools with deep faults. ESEC/SIGSOFT FSE 2018: 224-234 - [i3]Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg:
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks. CoRR abs/1805.12185 (2018) - [i2]Zhenghao Hu, Yu Hu, Brendan Dolan-Gavitt:
Chaff Bugs: Deterring Attackers by Making Software Buggier. CoRR abs/1808.00659 (2018) - 2017
- [c7]Yiwen Li, Brendan Dolan-Gavitt, Sam Weber, Justin Cappos:
Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path. USENIX ATC 2017: 1-13 - [c6]Patrick Hulin, Andy Davis, Rahul Sridhar, Andrew Fasano, Cody Gallagher, Aaron Sedlacek, Tim Leek, Brendan Dolan-Gavitt:
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection. WOOT 2017 - [i1]Tianyu Gu, Brendan Dolan-Gavitt, Siddharth Garg:
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. CoRR abs/1708.06733 (2017) - 2016
- [c5]Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti, William K. Robertson, Frederick Ulrich, Ryan Whelan:
LAVA: Large-Scale Automated Vulnerability Addition. IEEE Symposium on Security and Privacy 2016: 110-121 - 2015
- [b1]Brendan Dolan-Gavitt:
Understanding and protecting closed-source systems through dynamic analysis. Georgia Institute of Technology, Atlanta, GA, USA, 2015 - [c4]Brendan Dolan-Gavitt, Josh Hodosh, Patrick Hulin, Tim Leek, Ryan Whelan:
Repeatable Reverse Engineering with PANDA. PPREW@ACSAC 2015: 4:1-4:11 - 2013
- [c3]Brendan Dolan-Gavitt, Tim Leek, Josh Hodosh, Wenke Lee:
Tappan Zee (north) bridge: mining memory accesses for introspection. CCS 2013: 839-850 - 2011
- [c2]Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon T. Giffin, Wenke Lee:
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. IEEE Symposium on Security and Privacy 2011: 297-312
2000 – 2009
- 2009
- [c1]Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon T. Giffin:
Robust signatures for kernel data structures. CCS 2009: 566-577 - 2008
- [j2]Brendan Dolan-Gavitt:
Forensic analysis of the Windows registry in memory. Digit. Investig. 5(Supplement): S26-S32 (2008) - 2007
- [j1]Brendan Dolan-Gavitt:
The VAD tree: A process-eye view of physical memory. Digit. Investig. 4(Supplement): 62-64 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint