2012
Lost Decade or Golden Era: Computer Security since 9/11.
IEEE Secur. Priv., 2012
2011
Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services.
Proceedings of the Moving Target Defense, 2011
The ephemeral legion: producing an expert cyber-security work force from thin air.
Commun. ACM, 2011
Trading Elephants for Ants: Efficient Post-attack Reconstitution.
Proceedings of the Security and Privacy in Communication Networks, 2011
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011
2010
HyperCheck: A Hardware-Assisted Integrity Monitor.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
A Virtualization Architecture for In-Depth Kernel Isolation.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
SafeFox: A Safe Lightweight Virtual Browsing Environment.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28, 2010
2009
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
2008
TCP throughput enhancement in wired-cum-wireless network.
Comput. Commun., 2008
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites.
Proceedings of the Collaborative Computing: Networking, 2008
Efficiently tracking application interactions using lightweight virtualization.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
2007
Software Protection through Anti-Debugging.
IEEE Secur. Priv., 2007
Sender Side Intelligence for TCP Throughput Enhancement in Wired-Cum-Wireless Network.
Proceedings of the IEEE 18th International Symposium on Personal, 2007
2002
Simple, state-based approaches to program-based anomaly detection.
ACM Trans. Inf. Syst. Secur., 2002
Building Software Securely from the Ground Up.
IEEE Softw., 2002
Protecting Data from Malicious Software.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
New Security Issues in Mobile E-Commerce.
Proceedings of the E-Commerce Security and Privacy, 2001
Software security and privacy risks in mobile e-commerce.
Commun. ACM, 2001
How Useful is Software Fault Injection for Evaluating the Security of COTS Products?
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
A Real-Time Intrusion Detection System Based on Learning Program Behavior.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
Two State-based Approaches to Program-based Anomaly Detection.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
Inoculating Software for Survivability.
Commun. ACM, 1999
Certifying E-Commerce Software for Security.
Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, 1999
A Study in Using Neural Networks for Anomaly and Misuse Detection.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
An approach to testing COTS software for robustness to operating system exceptions and errors.
Proceedings of the 10th International Symposium on Software Reliability Engineering, 1999
Learning Program Behavior Profiles for Intrusion Detection.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999
Wrapping Windows NT Software for Robustness.
Proceedings of the Digest of Papers: FTCS-29, 1999
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
1998
An Automated Approach for Identifying Potential Vulnerabilities in Software.
Proceedings of the Security and Privacy, 1998
Testing the robustness of Windows NT software.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998
On certifying mobile code for secure applications.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998
E-Commerce Security: No Silver Bullet.
Proceedings of the Database Security XII: Status and Prospects, 1998
Detecting Anomalous and Unknown Intrusions Against Programs.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Reducing uncertainty about common-mode failures.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997