Cynthia E. Irvine

According to our database1, Cynthia E. Irvine authored at least 85 papers between 1989 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ODSS: A Ghidra-based Static Analysis Tool for Detecting Stack-Based Buffer Overflows.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Verification of a Distributed Ledger Protocol for Distributed Autonomous Systems Using Monterey Phoenix.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2021
Labtainers Cyber Exercises: Building and Deploying Fully Provisioned Cyber Labs that Run on a Laptop.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

Increasing Log Availability in Unmanned Vehicle Systems.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021

2020
Peering Under the Hull: Enhanced Decision Making via an Augmented Environment.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2020

Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

2019
A Strategy for Security Testing Industrial Firewalls.
Proceedings of the Fifth Annual Industrial Control System Security Workshop, 2019

2018
Individualizing Cybersecurity Lab Exercises with Labtainers.
IEEE Secur. Priv., 2018

2017
Live Lesson: Labtainers: A Docker-based Framework for Cybersecurity Labs.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

2015
Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2014
CyberCIEGE Scenario Design and Implementation.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

2013
A 3-D Split Manufacturing Approach to Trustworthy System Development.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2013

Help! Is There a Trustworthy-Systems Doctor in the House?
IEEE Secur. Priv., 2013

A Cyberoperations Program.
IEEE Secur. Priv., 2013

Towards a Cross-Domain MapReduce Framework.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2012
Guest Editors' Introduction.
IEEE Secur. Priv., 2012

Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Guest Editors' Introduction: Engineering Secure Systems.
IEEE Secur. Priv., 2011

The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle.
IEEE Secur. Priv., 2011

Active Learning with the CyberCIEGE Video Game.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Security Checkers: Detecting processor malicious inclusions at runtime.
Proceedings of the HOST 2011, 2011

2010
Security Primitives for Reconfigurable Hardware-Based Systems.
ACM Trans. Reconfigurable Technol. Syst., 2010

Call in the Cyber National Guard!
IEEE Secur. Priv., 2010

Educating the Systems Security Engineer's Apprentice.
IEEE Secur. Priv., 2010

New Pathways in Identity Management.
IEEE Secur. Priv., 2010

Hardware trust implications of 3-D integration.
Proceedings of the 5th Workshop on Embedded Systems Security, 2010

Hardware assistance for trustworthy systems through 3-D integration.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
A Tale of Three Cyber-Defense Workshops.
IEEE Secur. Priv., 2009

Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture.
Proceedings of the Trusted Computing, 2009

Idea: Trusted Emergency Management.
Proceedings of the Engineering Secure Software and Systems, 2009

MYSEA: the monterey security architecture.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2008
Managing Security in FPGA-Based Embedded Systems.
IEEE Des. Test Comput., 2008

A security domain model to assess software for exploitable covert channels.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

A Security Domain Model for Implementing Trusted Subject Behaviors.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Trustworthy System Security through 3-D Integrated Hardware.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

A security architecture for transient trust.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

An Ontological Approach to Secure MANET Management.
Proceedings of the The Third International Conference on Availability, 2008

2007
A video game for cyber security training and awareness.
Comput. Secur., 2007

Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Trusted Hardware: Can It Be Trustworthy?
Proceedings of the 44th Design Automation Conference, 2007

Analysis of three multilevel security architectures.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Toward a Medium-Robustness Separation Kernel Protection Profile.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems.
Clust. Comput., 2006

Utilizing the Common Criteria for Advanced Student Research Projects.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Cyber Security Training and Awareness Through Game Play.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

High Robustness Requirements in a Common Criteria Protection Profile.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

Using Common Criteria Methodology to Express Informal Security Requirements.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

Least Privilege in Separation Kernels.
Proceedings of the E-Business and Telecommunication Networks, 2006

A Model for Temporal Interval Authorizations.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
A study of initialization in Linux and OpenBSD.
ACM SIGOPS Oper. Syst. Rev., 2005

TCX project: high assurance for secure embedded systems.
SIGBED Rev., 2005

CyberCIEGE: Gaming for Information Assurance.
IEEE Secur. Priv., 2005

Foundation for a Time Interval Access Control Model.
Proceedings of the Computer Network Security, 2005

2004
A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach.
Proceedings of the Information Security Management, Education and Privacy, 2004

2003
Teaching Constructive Security.
IEEE Secur. Priv., 2003

A Program for Education in Certification and Accreditation.
Proceedings of the Security Education and Critical Infrastructures, 2003

Monterey Security Enhanced Architecture Project.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

MYSEA Technology Demonstration.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

An Editor for Adaptive XML-Based Policy Management of IPsec.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
An Approach to Security Requirements Engineering for a High Assurance System.
Requir. Eng., 2002

Cool security trends.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

2001
A cautionary note regarding the data integrity capacity of certain secure systems.
Proceedings of the Integrity, 2001

Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Security as a Dimension of Quality of Service in Active Service Environments.
Proceedings of the 3rd Annual International Workshop on Active Middleware Services (AMS 2001), 2001

2000
Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor.
Proceedings of the 9th USENIX Security Symposium, 2000

Is Electronic Privacy Achievable?
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

A QoS performance measure framework for distributed heterogeneous networks.
Proceedings of the Eight Euromicro Workshop on Parallel and Distributed Processing, 2000

Quality of security service.
Proceedings of the 2000 Workshop on New Security Paradigms, 2000

Toward Quality of Security Service in a Resource Management System Benefit Function.
Proceedings of the 9th Heterogeneous Computing Workshop, 2000

Calculating Costs for Quality of Security Service.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
A Multi-Threading Architecture for Multilevel Secure Transaction Processing.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999


Toward a Taxonomy and Costing Method for Security Services.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum).
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Integrating Security into the Curriculum.
Computer, 1998

Security Architecture for a Virtual Heterogeneous Machine.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
Secure flow typing.
Comput. Secur., 1997

Security in Innovative New Operating Systems.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

1996
A Sound Type System for Secure Flow Analysis.
J. Comput. Secur., 1996

Goals for Computer Security Education.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

1995
A multilevel file system for high assurance.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

1990
Architecture for an embedded secure data base management system.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
A Formal Model for UNIX Setuid.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989


  Loading...