Skip to main content.
Advanced search >
<< Back to previous page Print

<< Thursday, October 24, 2013 >>


Remind me

Tell a friend

Add to my Google calendar (bCal)

Download to my calendar

Bookmark and ShareShare


TRUST Security Seminar: Checking the World's Software for Exploitable Bugs

Seminar | October 24 | 1-2 p.m. | Soda Hall, Wozniak Lounge


David Brumley, Carnegie Mellon University

Team for Research in Ubiquitous Secure Technology (TRUST)


Attackers only need to find a single exploitable bug in order to install worms, bots, and other malware on vulnerable computers. Unfortunately, developers rarely have the time or resources to fix all bugs. This raises a serious security question: which bugs are exploitable, and thus should be fixed first?

David Brumley's research team's vision is to automatically check the world's software for exploitable bugs. Their approach is based on program verification, but with a twist. Traditional verification takes a program and a specification of safety as inputs, and checks that all execution paths of the program meet the safety specification. The twist in AEG is they replace typical safety properties with an "un-exploitability'' property, and the "verification'' process becomes finding a program path in which the un-exploitability property does not hold. Their analysis generates working control flow hijack and command injection exploits for exploitable paths. Brumley will discuss his team's results with a data set of over 33,000 programs. He will also discuss current challenges and future directions in symbolic execution.

David Brumley is an Assistant Professor at Carnegie Mellon University with a primary appointment in the Electrical and Computer Engineering Department, and a courtesy appointment in the Computer Science Department. He works in computer security, with an emphasis on software security. Prof. Brumley has a PhD in Computer Science from Carnegie Mellon University, an MS in Computer Science from Stanford University, and a BA in Mathematics from the University of Northern Colorado. He served as a Computer Security Officer for Stanford University from 1998-2002 where he handled many thousand computer security incidents. He is the faculty mentor for the CMU Hacking Team, which is ranked in the top 3 internationally. He has received the USENIX Security best paper awards in 2003 and 2007, selected for the 2010 DARPA CSSP program, a 2010 NSF CAREER award, the 2010 United States Presidential Early Career Award for Scientists and Engineers (PECASE) from President Obama, and the 2013 Sloan Foundation award.


General Public

General Public

Lunch is offered


cawinter@berkeley.edu, 510-643-8425