David Brumley

David Brumley
David Brumley
Fields computer science
Institutions Carnegie Mellon University
Alma mater Carnegie Mellon University
Stanford
University of Northern Colorado
Doctoral advisor Dawn Song
Known for software security and applied cryptography

David Brumley is an Assistant Professor at Carnegie Mellon University. He is a well-known researcher in software security, network security, and applied cryptography. Prof. Brumley also worked for 5 years as a Computer Security Officer for Stanford University.

Some of his notable accomplishments include:

  • In 2008, he showed the counter-intuitive principle that patches can help attackers. In particular, he showed that given a patch for a bug and the originally buggy program, a working exploit can be automatically generated in as little as a few seconds. This result shows that current patch distribution architectures that distribute patches on time-scales larger than a few seconds are potentially insecure.[1] In particular, this work shows one of the first applications of constraint satisfaction to generating exploits.[2]
  • In 2007, he developed techniques for automatically inferring implementation bugs in protocol implementations. This work won the best paper award at the USENIX Security conference.
  • His work on a Timing attack against RSA. The work was able to recover the factors of a 1024-bit RSA private key over a network in about 2 hours. This work also won the USENIX Security [3] Best Paper award. As a result of this work, OpenSSL, stunnel,[4] and others now implement defenses such as RSA blinding.
  • His work on Rootkit analysis.[5]
  • His work on distributed denial of service attacks. In particular, he worked towards tracking down the attackers who brought down Yahoo in 2002.[6]
  • He was a major contributor towards the arrest of Dennis Moran[7]
  • US Patent 7373451, which is related to virtual appliance distribution and migration. This patent serves as part of the basis for founding moka5 [8] by his co-authors.

Education

References

External links



Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • David Aardsma — Aardsma pitching for the Mariners Seattle Mariners No. 53 Relie …   Wikipedia

  • David Aardsma — David Aardsma …   Wikipédia en Français

  • Dennis Moran (computer criminal) — Dennis Moran Born 1982 (age 28–29) Massachusetts Alias(es) Coolio Conviction(s) …   Wikipedia

  • Timing attack — In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. The attack exploits the fact that every operation in a computer …   Wikipedia

  • Атака по сторонним каналам — Атака по энергопотреблению на алгоритм RSA. Левый пик соответствует операции быстрого возведения в степень без умножения, правый  с умножением, что позволяет восстановить значение обрабатываемых битов. Атака по сто …   Википедия

  • Dan Boneh — Born Israel …   Wikipedia

  • Атака по времени — В криптографии атака по времени это атака по сторонним каналам, в которой атакующий пытается скомпрометировать криптосистему с помощью анализа времени, затрачиваемого на исполнение криптографических алгоритмов. Каждая логическая операция требует… …   Википедия

  • An Inspector Calls — This article is about the play. For the film, see An Inspector Calls (film). For the 1982 TV series, see An Inspector Calls (TV series). An Inspector Calls Written by J. B. Priestley …   Wikipedia

  • Robert B. Sloan — Robert Bryan Sloan, Jr. (born 1949) is an American academic and theologian, currently serving as president of Houston Baptist University. Contents 1 Education and background 2 Baylor 2012 2.1 Imperatives …   Wikipedia

  • Unearthed — Compilación de Johnny Cash Publicación 25 de noviembre de 2003 Grabación 1993 2003 Género(s) Country Duración 4:02:31 …   Wikipedia Español

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”