Native client: A sandbox for portable, untrusted x86 native code B Yee, D Sehr, G Dardyk, JB Chen, R Muth, T Ormandy, S Okasaka, ... Communications of the ACM 53 (1), 91-99, 2010 | 1033 | 2010 |
An empirical study into the security exposure to hosts of hostile virtualized environments T Ormandy cansecwest, 2007 | 250 | 2007 |
Flayer: Exposing Application Internals. W Drewry, T Ormandy WOOT 7, 1-9, 2007 | 114 | 2007 |
Software testing using taint analysis and execution path alteration WA Drewry, T Ormandy US Patent 8,381,192, 2013 | 58 | 2013 |
Fuzzing at scale C Evans, M Moore, T Ormandy Google Online Security Blog, 2011 | 19 | 2011 |
Input selection for automatic test suite generation T Ormandy, WA Drewry US Patent 8,745,592, 2014 | 17 | 2014 |
Sophail: A critical analysis of sophos antivirus T Ormandy Proc. of Black Hat USA, 2011 | 12 | 2011 |
Restricting privileges of first privileged process in operating system using second privileged process J Tinnes, T Ormandy US Patent 8,621,647, 2013 | 8 | 2013 |
Insecure Context Switching: Inoculating Regular Expressions for Survivability. W Drewry, T Ormandy WOOT 8, 1-10, 2008 | 7 | 2008 |
Sophail: Applied attacks against sophos antivirus T Ormandy Tech. rep., Self-published, 2012 | 6 | 2012 |
Coverage analysis using sub-instruction profiling T Ormandy, WA Drewry US Patent 8,510,715, 2013 | 5 | 2013 |
Method and system for validating a disassembler T Ormandy US Patent 8,510,713, 2013 | 5 | 2013 |
Making Software Dumberer T Ormandy | 4 | 2009 |
Linux null pointer dereference due to incorrect proto ops initializations T Ormandy, J Tinnes | 4 | 2009 |
Parallelizing tests with pessimistic speculative execution T Ormandy | | 2019 |
A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta, Jason Franklin, Deepak Garg, Dilsun Kaynar (CMU) Formally Certifying the Security of Digital … B Coppens, I Verbauwhede, K De Bosschere, N Code, B Yee, D Sehr, ... | | |
Emerging Universal Attack Vectors: A case study of regular expressions W Drewry, T Ormandy | | |