Sotabase
Home
Researchers
Career
·
Niometrics
Publications
(25)
Preventing Memory Error Exploits with WIT
IEEE Symposium on Security and Privacy · 2008
347
cited
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors
USENIX Security Symposium · 2009
314
cited
Defending against hitlist worms using network address space randomization
Worm · 2005
262
cited
Detecting Targeted Attacks Using Shadow Honeypots
USENIX Security Symposium · 2005
232
cited
Fast byte-granularity software fault isolation
Symposium on Operating Systems Principles · 2009
217
cited
Cling: A Memory Allocator to Mitigate Dangling Pointers
USENIX Security Symposium · 2010
159
cited
Puppetnets: misusing web browsers as a distributed attack infrastructure
Conference on Computer and Communications Security · 2006
105
cited
STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis
IFIP International Information Security Conference · 2005
97
cited
Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks
USENIX Security Symposium · 2007
49
cited
Efficient content-based detection of zero-day worms
IEEE International Conference on Communications, 2005. ICC 2005. 2005 · 2005
41
cited
Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection
IFIP International Information Security Conference · 2005
37
cited
OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine
International Symposium on Recent Advances in Intrusion Detection · 2018
29
cited
Dynamically checking ownership policies in concurrent c/c++ programs
ACM-SIGACT Symposium on Principles of Programming Languages · 2010
28
cited
FRAMER: a tagged-pointer capability system with memory safety applications
Asia-Pacific Computer Systems Architecture Conference · 2019
25
cited
Shadow Honeypots
2009
15
cited
The VoteSecureTM Secure Internet Voting System
Trust Management · 2005
8
cited
Practical memory safety for C
2011
4
cited
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems
International Conference on Detection of intrusions and malware, and vulnerability assessment · 2017
1
cited
Piranha : A Fast Lookup Pattern Matching Algorithm for Intrusion Detection
2008
1
cited
STRIDE : POLYMORPHIC SLED DETECTION THROUGH INSTRUCTION SEQUENCE
2006
1
cited
Show all 25 papers →
Sotabase