-
1
-
-
34548176572
-
Secure, resilient computing clusters: Self-cleansing intrusion tolerance with hardware enforced security (scit/hes)
-
Washington, DC, USA, IEEE Computer Society
-
D. Arsenault, A. Sood, and Y. Huang. Secure, resilient computing clusters: Self-cleansing intrusion tolerance with hardware enforced security (scit/hes). In Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES '07, pages 343-350, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the the Second International Conference on Availability, Reliability and Security, ARES '07
, pp. 343-350
-
-
Arsenault, D.1
Sood, A.2
Huang, Y.3
-
3
-
-
84872422025
-
Predictability-oriented defense against adaptive adversaries
-
COEX
-
R. Colbaugh and K. Glass. Predictability-oriented defense against adaptive adversaries. In Proceedings of the IEEE Intl. Conference on Systems, Man, and Cybernetics, COEX, pages 2721-2727, 2012.
-
(2012)
Proceedings of the IEEE Intl. Conference on Systems, Man, and Cybernetics
, pp. 2721-2727
-
-
Colbaugh, R.1
Glass, K.2
-
4
-
-
51549094267
-
An architecture a day keeps the hacker away
-
Mar
-
D. A. Holland, A. T. Lim, and M. I. Seltzer. An architecture a day keeps the hacker away. SIGARCH Comput. Archit. News, 33(1):34-41, Mar. 2005.
-
(2005)
SIGARCH Comput. Archit. News
, vol.33
, Issue.1
, pp. 34-41
-
-
Holland, D.A.1
Lim, A.T.2
Seltzer, M.I.3
-
5
-
-
33751046340
-
Incorruptible system self-cleansing for intrusion tolerance
-
25th IEEE International, april
-
Y. Huang, D. Arsenault, and A. Sood. Incorruptible system self-cleansing for intrusion tolerance. In Performance, Computing, and Communications Conference, 2006. IPCCC 2006. 25th IEEE International, pages 4-496, april 2006.
-
(2006)
Performance, Computing, and Communications Conference, 2006. IPCCC 2006
, pp. 4-496
-
-
Huang, Y.1
Arsenault, D.2
Sood, A.3
-
6
-
-
78649429703
-
On the effectiveness of multi-variant program execution for vulnerability detection and prevention
-
New York, NY, USA, ACM
-
T. Jackson, B. Salamat, G. Wagner, C. Wimmer, and M. Franz. On the effectiveness of multi-variant program execution for vulnerability detection and prevention. In Proceedings of the 6th International Workshop on Security Measurements and Metrics, MetriSec '10, pages 71-78, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 6th International Workshop on Security Measurements and Metrics, MetriSec '10
, pp. 71-78
-
-
Jackson, T.1
Salamat, B.2
Wagner, G.3
Wimmer, C.4
Franz, M.5
-
9
-
-
67650085819
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
New York, NY, USA
-
N. Nethercote and J. Seward. Valgrind: A framework for heavyweight dynamic binary instrumentation. In Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '07, pages 89-100, New York, NY, USA, 2007.
-
(2007)
Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '07
, pp. 89-100
-
-
Nethercote, N.1
Seward, J.2
-
10
-
-
84906743113
-
-
F. Networking, I. T. Research, and D. (NITRD)
-
F. Networking, I. T. Research, and D. (NITRD). Federal Cybersecurity Game-change R&D Themes, 2012. http://cybersecurity.nitrd.gov/page/federal-cybersecurity-1.
-
(2012)
Federal Cybersecurity Game-change R&D Themes
-
-
-
11
-
-
84858289309
-
Creating a cyber moving target for critical infrastructure applications using platform diversity
-
H. Okhravi, A. Comella, E. Robinson, and J. Haines. Creating a cyber moving target for critical infrastructure applications using platform diversity. International Journal of Critical Infrastructure Protection, 5(1):30 - 39, 2012.
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, Issue.1
, pp. 30-39
-
-
Okhravi, H.1
Comella, A.2
Robinson, E.3
Haines, J.4
-
12
-
-
84899526686
-
Finding focus in the blur of moving-target techniques
-
Mar
-
H. Okhravi, T. Hobson, D. Bigelow, and W. Streilein. Finding focus in the blur of moving-target techniques. IEEE Security & Privacy, 12(2):16-26, Mar 2014.
-
(2014)
IEEE Security & Privacy
, vol.12
, Issue.2
, pp. 16-26
-
-
Okhravi, H.1
Hobson, T.2
Bigelow, D.3
Streilein, W.4
-
14
-
-
60449100156
-
The design of a generic intrusion-tolerant architecture for web servers
-
jan.-march
-
A. Saidane, V. Nicomette, and Y. Deswarte. The design of a generic intrusion-tolerant architecture for web servers. Dependable and Secure Computing, IEEE Transactions on, 6(1):45 -58, jan.-march 2009.
-
(2009)
Dependable and Secure Computing, IEEE Transactions on
, vol.6
, Issue.1
, pp. 45-58
-
-
Saidane, A.1
Nicomette, V.2
Deswarte, Y.3
-
16
-
-
53149125681
-
Multi-variant program execution: Using multi-core systems to defuse buffer-overflow vulnerabilities
-
march
-
B. Salamat, A. Gal, T. Jackson, K. Manivannan, G. Wagner, and M. Franz. Multi-variant program execution: Using multi-core systems to defuse buffer-overflow vulnerabilities. In Complex, Intelligent and Software Intensive Systems, 2008. International Conference on, pages 843 -848, march 2008.
-
(2008)
Complex, Intelligent and Software Intensive Systems, 2008. International Conference on
, pp. 843-848
-
-
Salamat, B.1
Gal, A.2
Jackson, T.3
Manivannan, K.4
Wagner, G.5
Franz, M.6
-
17
-
-
79957595816
-
Runtime defense against code injection attacks using replicated execution
-
july-aug
-
B. Salamat, T. Jackson, G. Wagner, C. Wimmer, and M. Franz. Runtime defense against code injection attacks using replicated execution. Dependable and Secure Computing, IEEE Transactions on, 8(4):588 -601, july-aug. 2011.
-
(2011)
Dependable and Secure Computing, IEEE Transactions on
, vol.8
, Issue.4
, pp. 588-601
-
-
Salamat, B.1
Jackson, T.2
Wagner, G.3
Wimmer, C.4
Franz, M.5
-
18
-
-
1142267351
-
Winnowing: Local algorithms for document fingerprinting
-
New York, NY, USA, ACM
-
S. Schleimer, D. S. Wilkerson, and A. Aiken. Winnowing: local algorithms for document fingerprinting. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data, SIGMOD '03, pages 76-85, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD '03
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.S.2
Aiken, A.3
-
20
-
-
60049100434
-
Security through diversity: Leveraging virtual machine technology
-
Jan
-
D. Williams, W. Hu, J. W. Davidson, J. D. Hiser, J. C. Knight, and A. Nguyen-Tuong. Security through diversity: Leveraging virtual machine technology. IEEE Security and Privacy, 7(1):26-33, Jan. 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 26-33
-
-
Williams, D.1
Hu, W.2
Davidson, J.W.3
Hiser, J.D.4
Knight, J.C.5
Nguyen-Tuong, A.6
-
21
-
-
84901851962
-
Strategic evolution of adversaries against temporal platform diversity active cyber defenses
-
April
-
M. Winterrose and K. Carter. Strategic evolution of adversaries against temporal platform diversity active cyber defenses. In Proceedings of Agent-Directed Simulation Symposium, pages 68-76, April 2014.
-
(2014)
Proceedings of Agent-Directed Simulation Symposium
, pp. 68-76
-
-
Winterrose, M.1
Carter, K.2
|