Gary McGraw

Orcid: 0000-0003-2307-2739

Affiliations:
  • Cigital Inc., Dulles, USA
  • George Mason University, Fairfax, Krasnow Institute for Advanced Study, USA
  • Indiana University Bloomington, Computer Science Department, USA


According to our database1, Gary McGraw authored at least 133 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
23 Security Risks in Black-Box Large Language Model Foundation Models.
Computer, April, 2024

2020
The Top 10 Risks of Machine Learning Security.
Computer, 2020

2019
Security Engineering for Machine Learning.
Computer, 2019

2018
Engineering Security Vulnerability Prevention, Detection, and Response.
IEEE Softw., 2018

Silver Bullet Talks With Kathleen Fisher [Interview].
IEEE Secur. Priv., 2018

Silver Bullet Talks with Tanya Janca.
IEEE Secur. Priv., 2018

Silver Bullet Talks with Nick Weaver.
IEEE Secur. Priv., 2018

Silver Bullet Talks with Bruce Potter.
IEEE Secur. Priv., 2018

Silver Bullet Talks with Craig Froelich.
IEEE Secur. Priv., 2018

Silver Bullet Talks with Wafaa Mamilli.
IEEE Secur. Priv., 2018

The New Killer App for Security: Software Inventory.
Computer, 2018

Multi-frequency precise point positioning using GPS and Galileo data with smoothed ionospheric corrections.
Proceedings of the IEEE/ION Position, Location and Navigation Symposium, 2018

2017
Silver Bullet Talks with Nicole Perlroth.
IEEE Secur. Priv., 2017

Silver Bullet Talks with Ksenia Dmitrieva-Peguero.
IEEE Secur. Priv., 2017

Silver Bullet Talks with Kelly Lum.
IEEE Secur. Priv., 2017

Silver Bullet Talks with Kate Pearce.
IEEE Secur. Priv., 2017

Silver Bullet Talks with Lesley Carhart.
IEEE Secur. Priv., 2017

Silver Bullet Talks with Marie Moe.
IEEE Secur. Priv., 2017

Six Tech Trends Impacting Software Security.
Computer, 2017

2016
Silver Bullet Talks with Jim Manico.
IEEE Secur. Priv., 2016

Silver Bullet Talks with Martin Hellman.
IEEE Secur. Priv., 2016

Silver Bullet Talks with Jacob West.
IEEE Secur. Priv., 2016

Silver Bullet Talks with Jamie Butler.
IEEE Secur. Priv., 2016

Silver Bullet Talks with Peiter (Mudge) Zatko.
IEEE Secur. Priv., 2016

Four Software Security Findings.
Computer, 2016

2015
Silver Bullet Talks with Steven M. Bellovin and Matthew Green.
IEEE Secur. Priv., 2015

Silver Bullet Talks with Bart Preneel.
IEEE Secur. Priv., 2015

Silver Bullet Talks with Katie Moussouris.
IEEE Secur. Priv., 2015

Silver Bullet Talks with L. Jean Camp.
IEEE Secur. Priv., 2015

Silver Bullet Talks with Whitfield Diffie.
IEEE Secur. Priv., 2015

Silver Bullet Talks with Brian Krebs.
IEEE Secur. Priv., 2015

2014
Silver Bullet Talks with the IEEE Center for Secure Design.
IEEE Secur. Priv., 2014

Silver Bullet Talks with Bart Miller.
IEEE Secur. Priv., 2014

Silver Bullet Talks with Nate Fick.
IEEE Secur. Priv., 2014

Silver Bullet Talks with Yoshi Kohno.
IEEE Secur. Priv., 2014

Silver Bullet Talks with Matthew Green.
IEEE Secur. Priv., 2014

Silver Bullet Talks with Jon Callas.
IEEE Secur. Priv., 2014

Security Fatigue? Shift Your Paradigm.
Computer, 2014

Software security: a study in technology transfer.
Proceedings of the SPLASH'14, 2014

Privacy and security in a networked world.
Proceedings of the SPLASH'14, 2014

2013
Silver Bullet Talks with W. Hord Tipton.
IEEE Secur. Priv., 2013

Silver Bullet Talks with Wenyuan Xu.
IEEE Secur. Priv., 2013

Silver Bullet Talks with Gary Warzala.
IEEE Secur. Priv., 2013

Silver Bullet Talks with Thomas Rid.
IEEE Secur. Priv., 2013

Silver Bullet Talks with Steve Bellovin.
IEEE Secur. Priv., 2013

Silver Bullet Talks with Per-Olof Persson.
IEEE Secur. Priv., 2013

2012
Silver Bullet Talks with Howard Schmidt.
IEEE Secur. Priv., 2012

Silver Bullet Talks with Kay Connelly.
IEEE Secur. Priv., 2012

Silver Bullet Talks with Randy Sabett.
IEEE Secur. Priv., 2012

Silver Bullet Talks with Giovanni Vigna.
IEEE Secur. Priv., 2012

Silver Bullet Talks with Neil Daswani.
IEEE Secur. Priv., 2012

Lost Decade or Golden Era: Computer Security since 9/11.
IEEE Secur. Priv., 2012

Software Security - Building Security In.
Datenschutz und Datensicherheit, 2012

2011
Technology Transfer: A Software Security Marketplace Case Study.
IEEE Softw., 2011

Silver Bullet Talks with Halvar Flake.
IEEE Secur. Priv., 2011

Silver Bullet Talks with Elinor Mills.
IEEE Secur. Priv., 2011

Silver Bullet Talks with John Savage.
IEEE Secur. Priv., 2011

Silver Bullet Talks with Ralph Langner.
IEEE Secur. Priv., 2011

Silver Bullet Talks with David Rice.
IEEE Secur. Priv., 2011

Silver Bullet Talks with Paul Kocher.
IEEE Secur. Priv., 2011

2010
Silver Bullet Talks with Iván Arce.
IEEE Secur. Priv., 2010

Silver Bullet Talks with Greg Morrisett.
IEEE Secur. Priv., 2010

Silver Bullet Talks with Richard Clarke.
IEEE Secur. Priv., 2010

Silver Bullet Talks with Steven Kent.
IEEE Secur. Priv., 2010

Silver Bullet Talks with Gillian Hayes.
IEEE Secur. Priv., 2010

Silver Bullet Talks with Christofer Hoff.
IEEE Secur. Priv., 2010

Interview: Software Security in the Real World.
Computer, 2010

Wouldn't it be nice to have software labels.
Proceedings of the 2010 Annual ACM SIGAda International Conference on Ada, 2010

2009
Guest Editors' Introduction: Securing Online Games: Safeguarding the Future of Software Security.
IEEE Secur. Priv., 2009

Silver Bullet Talks with Fred Schneider.
IEEE Secur. Priv., 2009

Silver Bullet Talks with Bob Blakley.
IEEE Secur. Priv., 2009

Silver Bullet Talks with Virgil Gligor.
IEEE Secur. Priv., 2009

Silver Bullet Talks with Jeremiah Grossman.
IEEE Secur. Priv., 2009

Silver Bullet Talks with Gunnar Peterson.
IEEE Secur. Priv., 2009

2008
Silver Bullet Talks with Matt Bishop.
IEEE Secur. Priv., 2008

Silver Bullet Talks with Bill Cheswick [Interview].
IEEE Secur. Priv., 2008

Silver Bullet Talks with Adam Shostack.
IEEE Secur. Priv., 2008

Silver Bullet Talks with Jon Swartz.
IEEE Secur. Priv., 2008

Silver Bullet Talks with Ed Amoroso.
IEEE Secur. Priv., 2008

Silver BulletTalks with Eugene Spafford.
IEEE Secur. Priv., 2008

Automated Code Review Tools for Security.
Computer, 2008

2007
Exploiting Online Games: An Interview.
login Usenix Mag., 2007

Online Games and Security.
IEEE Secur. Priv., 2007

Silver Bullet Talks with Ross Anderson.
IEEE Secur. Priv., 2007

Silver Bullet Talks with Mikko Hypponen [Interview].
IEEE Secur. Priv., 2007

Silver Bullet Talks with Annie Antón.
IEEE Secur. Priv., 2007

Silver Bullet Talks with Becky Bace.
IEEE Secur. Priv., 2007

Silver Bullet Speaks with Dorothy Denning.
IEEE Secur. Priv., 2007

Silver Bullet Speaks with John Stewart [Interview].
IEEE Secur. Priv., 2007

Exploiting Online Games.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

2006
Silver Bullet Speaks with Ed Felten.
IEEE Secur. Priv., 2006

Interview: Silver Bullet Speaks to Marcus Ranum.
IEEE Secur. Priv., 2006

Silver Bullet Speaks with Dan Geer.
IEEE Secur. Priv., 2006

Silver Bullet Speaks to Avi Rubin.
IEEE Secur. Priv., 2006

Software Security and SOA: Danger, Will Robinson!
IEEE Secur. Priv., 2006

2005
Bridging the Gap between Software Development and Information Security.
IEEE Secur. Priv., 2005

Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors.
IEEE Secur. Priv., 2005

Adopting a Software Security Improvement Program.
IEEE Secur. Priv., 2005

A Portal for Software Security.
IEEE Secur. Priv., 2005

Knowledge for Software Security.
IEEE Secur. Priv., 2005

Software Penetration Testing.
IEEE Secur. Priv., 2005

2004
Risk Analysis in Software Design.
IEEE Secur. Priv., 2004

Software Security Testing.
IEEE Secur. Priv., 2004

Software Security.
IEEE Secur. Priv., 2004

Misuse and Abuse Cases: Getting Past the Positive.
IEEE Secur. Priv., 2004

Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report.
IEEE Secur. Priv., 2004

Static Analysis for Security.
IEEE Secur. Priv., 2004

Guest Editors' Introduction: Why Attacking Systems Is a Good Idea.
IEEE Secur. Priv., 2004

Exploiting Software.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Security as a new dimension in embedded system design.
Proceedings of the 41th Design Automation Conference, 2004

Software Security Clue Distribution.
Proceedings of the 17th Conference on Software Engineering Education and Training (CSEE&T 2004), 2004

2003
From the Ground Up: The DIMACS Software Security Workshop.
IEEE Secur. Priv., 2003

2002
Token-based scanning of source code for security problems.
ACM Trans. Inf. Syst. Secur., 2002

Point/Counterpoint: Security Band-Aids: More Cost-Effective than "Secure" Coding / Building Secure Software: Better than Protecting Bad Software.
IEEE Softw., 2002

Managing Software Security Risks.
Computer, 2002

On Bricks and Walls: Why Building Secure Software is Hard.
Comput. Secur., 2002

2001
Generating Software Test Data by Evolution.
IEEE Trans. Software Eng., 2001

2000
Statically Scanning Java Code: Finding Security Vulnerabilities.
IEEE Softw., 2000

Attacking Malicious Code: A Report to the Infosec Research Council.
IEEE Softw., 2000

Roundtable on Information Security Policy.
IEEE Softw., 2000

Will Openish Source Really Improve Security.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

ITS4: A Static Vulnerability Scanner for C and C++ Code.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Software Assurence for Security.
Computer, 1999

1998
Mobile Code and Security - Guest Editors' Introduction.
IEEE Internet Comput., 1998

An Automated Approach for Identifying Potential Vulnerabilities in Software.
Proceedings of the Security and Privacy, 1998

Weak links in e-commerce security: examples from the field.
Proceedings of the Network and Distributed System Security Symposium, 1998

Automated Software Test Data Generation for Complex Programs.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

1997
Predicting How Badly "Good" Software Can Behave.
IEEE Softw., 1997

A 'Crystal Ball' for Software Liability.
Computer, 1997

Genetic Algorithms for Dynamic Test Data Generation.
Proceedings of the 1997 International Conference on Automated Software Engineering, 1997

Java security - hostile applets, holes and antidotes: what every netscape and internet explorer user needs to know.
Wiley, ISBN: 978-0-471-17842-2, 1997

1993
Case-based reasoning assisted explanation of genetic algorithm results.
J. Exp. Theor. Artif. Intell., 1993

Letter Spirit: An Architecture for Creativity in an Microdomain.
Proceedings of the Advances in Artificial Intelligence, 1993


  Loading...