Sergey Bratus
According to our database1,
Sergey Bratus
authored at least 72 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2020
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
2019
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the Critical Infrastructure Protection XIII, 2019
Proceedings of the Critical Infrastructure Protection XIII, 2019
2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
2017
login Usenix Mag., 2017
Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic Security.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017
Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016
2015
Bolt-On Security Extensions for Industrial Control System Protocols: A Case Study of DNP3 SAv5.
IEEE Secur. Priv., 2015
2014
Why Wassenaar Arrangement's Definitions of "Intrusion Software" and "Controlled Items" Put Security Research and Defense At Risk.
login Usenix Mag., 2014
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research.
login Usenix Mag., 2014
IEEE Trans. Mob. Comput., 2014
IEEE Secur. Priv., 2014
Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013
2012
Intrusion detection for resource-constrained embedded control systems in the power grid.
Int. J. Crit. Infrastructure Prot., 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert Channels.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.
login Usenix Mag., 2011
Domain-specific entity extraction from noisy, unstructured data using ontology-guided search.
Int. J. Document Anal. Recognit., 2011
Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the USENIX Workshop on Hot Topics in Management of Internet, 2011
Proceedings of the Past, 2011
Proceedings of the Critical Infrastructure Protection V, 2011
Proceedings of the Critical Infrastructure Protection V, 2011
2010
Int. J. Secur. Softw. Eng., 2010
Automated mapping of large binary objects using primitive fragment type classification.
Digit. Investig., 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the 41st ACM technical symposium on Computer science education, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010
The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
Proceedings of the ARES 2010, 2010
2009
IEEE Secur. Priv., 2009
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
Using domain knowledge for ontology-guided entity extraction from noisy, unstructured text data.
Proceedings of the Third Workshop on Analytics for Noisy Unstructured Text Data, 2009
2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008
Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
2007
IEEE Secur. Priv., 2007
IEEE Distributed Syst. Online, 2007
IEEE Distributed Syst. Online, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Fifth International Conference on Machine Learning and Applications, 2006
2005
Proceedings of the Third Annual Conference on Privacy, 2005
2004
2001
Proceedings of the First International Conference on Human Language Technology Research, 2001
Proceedings of the First International Conference on Human Language Technology Research, 2001
2000
Fast Constructive Recognition of a Black Box Group Isomorphic to Sn or An using Goldbach's Conjecture.
J. Symb. Comput., 2000
1999
On Sampling Generating Sets of Finite Groups and Product Replacement Algorithm (extended abstract).
Proceedings of the 1999 International Symposium on Symbolic and Algebraic Computation, 1999