
security.ece.cmu.edu
djb researchSecurity of the code you execute. Are these programs bad or good? Given a program, generate exploits automatically. Type Inference on Binaries. Recovering source types from binary executables. Balancing anonymity vs. accountability. A single binary that runs on multiple platforms. Research team members, past and present.
http://security.ece.cmu.edu/