Brendan Dolan-Gavitt

5.9k total citations · 5 hit papers
33 papers, 2.1k citations indexed

About

Brendan Dolan-Gavitt is a scholar working on Signal Processing, Artificial Intelligence and Information Systems. According to data from OpenAlex, Brendan Dolan-Gavitt has authored 33 papers receiving a total of 2.1k indexed citations (citations by other indexed papers that have themselves been cited), including 26 papers in Signal Processing, 19 papers in Artificial Intelligence and 13 papers in Information Systems. Recurrent topics in Brendan Dolan-Gavitt's work include Advanced Malware Detection Techniques (26 papers), Security and Verification in Computing (15 papers) and Software Testing and Debugging Techniques (10 papers). Brendan Dolan-Gavitt is often cited by papers focused on Advanced Malware Detection Techniques (26 papers), Security and Verification in Computing (15 papers) and Software Testing and Debugging Techniques (10 papers). Brendan Dolan-Gavitt collaborates with scholars based in United States, Canada and France. Brendan Dolan-Gavitt's co-authors include Siddharth Garg, Tianyu Gu, Kang Liu, Tim Leek, Ramesh Karri, Benjamin Tan, Hammond Pearce, Baleegh Ahmad, Jonathon Giffin and Wenke Lee and has published in prestigious journals such as Communications of the ACM, IEEE Access and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Brendan Dolan-Gavitt

31 papers receiving 2.0k citations

Hit Papers

BadNets: Evaluating Backdooring Attacks on Deep Neural Ne... 2019 2026 2021 2023 2019 2022 2023 2024 2023 200 400 600

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Brendan Dolan-Gavitt United States 19 1.2k 892 769 504 404 33 2.1k
Aurélien Francillon France 21 1.1k 0.9× 1.2k 1.4× 584 0.8× 637 1.3× 347 0.9× 55 1.8k
Kehuan Zhang Hong Kong 23 1.1k 0.9× 1.3k 1.5× 1.0k 1.4× 812 1.6× 202 0.5× 56 2.1k
Minhui Xue Australia 20 1.3k 1.1× 767 0.9× 543 0.7× 505 1.0× 590 1.5× 101 2.1k
Thomas Eisenbarth Germany 22 1.6k 1.3× 534 0.6× 947 1.2× 584 1.2× 305 0.8× 88 2.2k
Zhenkai Liang Singapore 27 1.6k 1.3× 1.7k 1.9× 1.1k 1.4× 1.1k 2.2× 498 1.2× 86 2.5k
John Viega United States 18 706 0.6× 511 0.6× 817 1.1× 374 0.7× 272 0.7× 37 1.5k
David Lie Canada 20 1.2k 1.0× 1.2k 1.4× 1.1k 1.4× 828 1.6× 544 1.3× 66 2.3k
Yan Shoshitaishvili United States 20 1.1k 0.9× 1.7k 1.9× 1.1k 1.4× 604 1.2× 1.1k 2.8× 61 2.5k
Kun Sun United States 28 950 0.8× 908 1.0× 914 1.2× 1.4k 2.8× 127 0.3× 135 2.3k

Countries citing papers authored by Brendan Dolan-Gavitt

Since Specialization
Citations

This map shows the geographic impact of Brendan Dolan-Gavitt's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Brendan Dolan-Gavitt with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Brendan Dolan-Gavitt more than expected).

Fields of papers citing papers by Brendan Dolan-Gavitt

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Brendan Dolan-Gavitt. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Brendan Dolan-Gavitt. The network helps show where Brendan Dolan-Gavitt may publish in the future.

Co-authorship network of co-authors of Brendan Dolan-Gavitt

This figure shows the co-authorship network connecting the top 25 collaborators of Brendan Dolan-Gavitt. A scholar is included among the top collaborators of Brendan Dolan-Gavitt based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Brendan Dolan-Gavitt. Brendan Dolan-Gavitt is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Pearce, Hammond, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, & Ramesh Karri. (2025). Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions. Communications of the ACM. 68(2). 96–105. 9 indexed citations
2.
Thakur, Shailja, Baleegh Ahmad, Hammond Pearce, et al.. (2024). VeriGen: A Large Language Model for Verilog Code Generation. ACM Transactions on Design Automation of Electronic Systems. 29(3). 1–31. 79 indexed citations breakdown →
3.
Gibbs, W. R., Zhenghao Hu, Brendan Dolan-Gavitt, et al.. (2024). Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing. 3719–3733.
4.
Pearce, Hammond, Benjamin Tan, Brendan Dolan-Gavitt, et al.. (2024). (Security) Assertions by Large Language Models. IEEE Transactions on Information Forensics and Security. 19. 4374–4389. 32 indexed citations
5.
Pearce, Hammond, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, & Brendan Dolan-Gavitt. (2023). Examining Zero-Shot Vulnerability Repair with Large Language Models. 2339–2356. 92 indexed citations breakdown →
6.
Gallagher, Kevin, et al.. (2023). Studying the Online Deepfake Community. 2(1). 6 indexed citations
7.
Dolan-Gavitt, Brendan, et al.. (2022). What the Fork? Finding and Analyzing Malware in GitHub Forks. Zenodo (CERN European Organization for Nuclear Research). 9 indexed citations
8.
Pearce, Hammond, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, & Ramesh Karri. (2022). Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions. 754–768. 200 indexed citations breakdown →
9.
Hu, Yu, et al.. (2022). Characterizing and Improving Bug-Finders with Synthetic Bugs. abs 1712 1674. 971–982. 2 indexed citations
10.
Leek, Tim, et al.. (2021). PyPANDA: Taming the PANDAmonium of Whole System Dynamic Analysis. 1 indexed citations
11.
Dolan-Gavitt, Brendan, et al.. (2020). HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities. Annual Computer Security Applications Conference. 454–465. 6 indexed citations
12.
Leek, Tim, et al.. (2019). The Rode0day to Less-Buggy Programs. IEEE Security & Privacy. 17(6). 84–88. 3 indexed citations
13.
Li, Yiwen, et al.. (2017). Lock-in-pop: Securing privileged operating system kernels by keeping on the beaten path. USENIX Annual Technical Conference. 1–13. 10 indexed citations
14.
Leek, Tim, et al.. (2017). AutoCTF: Creating Diverse Pwnables via Automated Bug Injection. USENIX Security Symposium. 8 indexed citations
15.
Dolan-Gavitt, Brendan, et al.. (2016). LAVA: Large-Scale Automated Vulnerability Addition. 110–121. 180 indexed citations
16.
Dolan-Gavitt, Brendan, et al.. (2015). Repeatable Reverse Engineering with PANDA. 1–11. 88 indexed citations
17.
Dolan-Gavitt, Brendan, et al.. (2014). Repeatable Reverse Engineering for the Greater Good with PANDA. Columbia Academic Commons (Columbia University). 20 indexed citations
18.
Dolan-Gavitt, Brendan, et al.. (2013). Tappan Zee (north) bridge. 839–850. 42 indexed citations
19.
Dolan-Gavitt, Brendan, Tim Leek, Michael Zhivich, Jonathon Giffin, & Wenke Lee. (2011). Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. 297–312. 203 indexed citations
20.
Dolan-Gavitt, Brendan. (2008). Forensic analysis of the Windows registry in memory. Digital Investigation. 5. S26–S32. 62 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026