Follow
Brendan Dolan-Gavitt
Brendan Dolan-Gavitt
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Badnets: Identifying vulnerabilities in the machine learning model supply chain
T Gu, B Dolan-Gavitt, S Garg
arXiv preprint arXiv:1708.06733, 2017
19182017
Fine-pruning: Defending against backdooring attacks on deep neural networks
K Liu, B Dolan-Gavitt, S Garg
International symposium on research in attacks, intrusions, and defenses …, 2018
12122018
Badnets: Evaluating backdooring attacks on deep neural networks
T Gu, K Liu, B Dolan-Gavitt, S Garg
IEEE Access 7, 47230-47244, 2019
11642019
Starcoder: may the source be with you!
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
arXiv preprint arXiv:2305.06161, 2023
7212023
Asleep at the keyboard? assessing the security of github copilot’s code contributions
H Pearce, B Ahmad, B Tan, B Dolan-Gavitt, R Karri
2022 IEEE Symposium on Security and Privacy (SP), 754-768, 2022
469*2022
Lava: Large-scale automated vulnerability addition
B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ...
2016 IEEE symposium on security and privacy (SP), 110-121, 2016
4462016
Virtuoso: Narrowing the semantic gap in virtual machine introspection
B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee
2011 IEEE symposium on security and privacy, 297-312, 2011
4302011
Examining zero-shot vulnerability repair with large language models
H Pearce, B Tan, B Ahmad, R Karri, B Dolan-Gavitt
2023 IEEE Symposium on Security and Privacy (SP), 2339-2356, 2023
327*2023
Robust signatures for kernel data structures
B Dolan-Gavitt, A Srivastava, P Traynor, J Giffin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2222009
Repeatable reverse engineering with PANDA
B Dolan-Gavitt, J Hodosh, P Hulin, T Leek, R Whelan
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015
2012015
Forensic analysis of the Windows registry in memory
B Dolan-Gavitt
digital investigation 5, S26-S32, 2008
1362008
Lost at c: A user study on the security implications of large language model code assistants
G Sandoval, H Pearce, T Nys, R Karri, S Garg, B Dolan-Gavitt
32nd USENIX Security Symposium (USENIX Security 23), 2205-2222, 2023
134*2023
The VAD tree: A process-eye view of physical memory
B Dolan-Gavitt
digital investigation 4, 62-64, 2007
1282007
Tappan zee (north) bridge: mining memory accesses for introspection
B Dolan-Gavitt, T Leek, J Hodosh, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1112013
Verigen: A large language model for verilog code generation
S Thakur, B Ahmad, H Pearce, B Tan, B Dolan-Gavitt, R Karri, S Garg
ACM Transactions on Design Automation of Electronic Systems 29 (3), 1-31, 2024
1072024
Benchmarking large language models for automated verilog rtl code generation
S Thakur, B Ahmad, Z Fan, H Pearce, B Tan, R Karri, B Dolan-Gavitt, ...
2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2023
1052023
Danish Contractor
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
Siva Reddy, Daniel Fried, Dzmitry Bahdanau, Yacine Jernite, Carlos Muñoz …, 2023
932023
Danish Contractor, Siva Reddy, Daniel Fried, Dzmitry Bahdanau, Yacine Jernite, Carlos Muñoz Ferrandis, Sean Hughes, Thomas Wolf, Arjun Guha, Leandro von Werra, and Harm de Vries
R Li, LB Allal, Y Zi, N Muennighoff, D Kocetkov, C Mou, M Marone, C Akiki, ...
Starcoder: may the source be with you 3 (3.5), 1, 2023
812023
Nnoculation: Catching badnets in the wild
AK Veldanda, K Liu, B Tan, P Krishnamurthy, F Khorrami, R Karri, ...
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
79*2021
Leveraging forensic tools for virtual machine introspection
B Dolan-Gavitt, B Payne, W Lee
Gt-cs-11-05, Georgia Institute of Technology, 2011
792011
The system can't perform the operation now. Try again later.
Articles 1–20