关注
Tavis Ormandy
Tavis Ormandy
在 google.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Native client: A sandbox for portable, untrusted x86 native code
B Yee, D Sehr, G Dardyk, JB Chen, R Muth, T Ormandy, S Okasaka, ...
Communications of the ACM 53 (1), 91-99, 2010
10332010
An empirical study into the security exposure to hosts of hostile virtualized environments
T Ormandy
cansecwest, 2007
2502007
Flayer: Exposing Application Internals.
W Drewry, T Ormandy
WOOT 7, 1-9, 2007
1142007
Software testing using taint analysis and execution path alteration
WA Drewry, T Ormandy
US Patent 8,381,192, 2013
582013
Fuzzing at scale
C Evans, M Moore, T Ormandy
Google Online Security Blog, 2011
192011
Input selection for automatic test suite generation
T Ormandy, WA Drewry
US Patent 8,745,592, 2014
172014
Sophail: A critical analysis of sophos antivirus
T Ormandy
Proc. of Black Hat USA, 2011
122011
Restricting privileges of first privileged process in operating system using second privileged process
J Tinnes, T Ormandy
US Patent 8,621,647, 2013
82013
Insecure Context Switching: Inoculating Regular Expressions for Survivability.
W Drewry, T Ormandy
WOOT 8, 1-10, 2008
72008
Sophail: Applied attacks against sophos antivirus
T Ormandy
Tech. rep., Self-published, 2012
62012
Coverage analysis using sub-instruction profiling
T Ormandy, WA Drewry
US Patent 8,510,715, 2013
52013
Method and system for validating a disassembler
T Ormandy
US Patent 8,510,713, 2013
52013
Making Software Dumberer
T Ormandy
42009
Linux null pointer dereference due to incorrect proto ops initializations
T Ormandy, J Tinnes
42009
Parallelizing tests with pessimistic speculative execution
T Ormandy
2019
A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta, Jason Franklin, Deepak Garg, Dilsun Kaynar (CMU) Formally Certifying the Security of Digital …
B Coppens, I Verbauwhede, K De Bosschere, N Code, B Yee, D Sehr, ...
Emerging Universal Attack Vectors: A case study of regular expressions
W Drewry, T Ormandy
系统目前无法执行此操作,请稍后再试。
文章 1–17