2003 |
|
T. Stallard, K. Levitt, "Automated Analysis for Digital Forensic Science: Semantic Integrity Checking," 19th Annual Computer Security Applications Conference, Las Vegas, Nevada (Dec. 8-12, 2003) pdf |
D.P. Gilliam, T.L. Wolfe, J.S. Sherif, M. Bishop, "Software Security Checklist for the Software Life Cycle," WETICE 2003, pp.243-248 abstract |
M. Bishop, "Panel: Teaching Undergraduate Information Assurance," World Conference on Information Security Education 2003, pp. 169-171. |
F. Zhao, Y. Shin, S.F. Wu, H. Johnson, A. Nilsson, "RBWA: An Efficient Random-Bits Window-Based Authentication Protocol," in Globecom 2003, San Francisco, CA, (Dec. 2003). |
M. Gertz, "Integrity and Internal Control in Information Systems V", Kluwer Academic Publishers, Proceedings of the 5th International IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control, Bonn, Germany. |
M. Gertz, G. Csaba, "Monitoring Mission Critical Data for Integrity and Availability," in 5th International IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control, Kluwer Academic Publishers, pp.189-201. |
M. Gertz, "Opportunities and Challenges in Tracing Security Breaches," in 5th International IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control, Kluwer Academic Publishers, pp. 223-226. |
E.A. Wohlstadter, P. Devanbu, "DADO: A Novel Programming Model for Distributed, Heterogenous, Late-Bound QoS Implementations," Workshop on secure Reliable Middleware, Springer-Verlag, 2003 pdf |
S. Halevi, P. Rogaway, "A Tweakable Enciphering Mode," Advances in Cryptology - CRYPTO '03, Lecture Notes in Computer Science, vol. 2729, Springer-Verlag, 2003. pdf |
P. Rogaway, "Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC", manuscript, (Nov. 2003). pdf |
P. Devanbu, M. Gertz, B. Toone, "Static Type-inference for Trust in Distributed Information Systems," in 10th International Conference on Cooperative Information Systems (CoopIS 2003), Spinger, LNCS, 2003 pdf |
P. Devanbu, M. Gertz, C. Martel, S. Stubblebine, "Authentic Data Publication Over the Internet," in Journal of Computer Security, Volume 11, No. 3, pp. 291-314, 2003. |
C.Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, K. Levitt, "A Specification-Based Instrusion Detection system for AODV," 2003 ACM Workshop on security of Ad Hoc and Sensor Networks (SASN '03), (Oct. 21, 2003). pdf |
H. Huang, S.F. Wu, "An Approach to Certificate Path Discovery in Mobile Ad Hoc Networks," in ACM CCS (Computer and Communication Security) Workshop on Ad Hoc Mobile Network Security, Fairfax, VA, (Oct. 2003). |
S. Teoh, K.L. Ma, S.F. Wu, D. Pei, L. Wang, L. Zhang, D. Massey, R. Bush, "Visual-Based Anomaly Detection for BGP Origin as Change (OASC) Events", in 14th IEEE/IFIP Workshop on Distributed Systems: Operations and Management (DSOM'2003), Heidelberg, Germany, (Oct. 2003), Vol. 2867. |
S. Teoh, K.L. Ma, S.F. Wu, "A Visual Exploration process for the Analysis of Internet Routing Data," in IEEE Visualization'2003, Seattle, WA, Oct. 2003. |
F. Zhao, S.F. Wu, "Analysis and Improvement on IPSEC Anti-Replay Window Protocol," in 12th IEEE International Conference on Computer Communication and Networks (ICCN'2003). Dallas, TX, Oct., 2003. |
I. Balepin, S. Maltsev, J. Rowe, K. Levitt, "Using Specification-Based Intrusion Detection for Automated Response," Proceeding of the 6th International Symposium, RAID 2003, Recent Advances in Intrusion Detection, Pittsburgh, PA, September 8-10, 2003. pdf |
T. Song, J. Alves-Foss, C. Ko, C. Zhang, K. Levitt, "Using ACL2 to Verify Security Properties of Specification-based Intrusion Detection Systems," International Workshop on ACL2 Theorem Prover and Its Applications, pdf |
G. Marro, "Attacks at the Data Link Layer," Masters Thesis, July, 2003. pdf |
D. Pei, L. Wang, D. Massey, S.F. Wu, L. Zhang, "A Study of Packat Delivery Performance During Routing Convergence," in the Proceedings of the 2003 International Conference on Dependendable Systems and Networks, June 22-25, pp. 183-192. |
M. Bellare, P. Rogaway, D. Wagner, "A Conventional Authenticated-Encryption Scheme," manuscript, April 2003. pdf |
E. Haugh, M. Bishop, "Testing C Programs for Buffer Overflow Vulnerabilities," Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, February 2003. pdf |
S. Templeton, K. Levitt, "Detecting Spoofed Packets," Proceedings of The Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington, D.C., April 22-24, 2003 pdf |
D. Nojiri, J. Rowe, K. Levitt, "Cooperative Response Strategies for Large Scale Attack Mitigation," Proceedings of The Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington, D.C., April 22-24, 2003 ps |
B. Toone, M. Gertz, P. Devanbu, "Trust Mediation for Distributed Information Systems," SEC2003, 19th IFIP International Information Security Conference. pdf |
E. Wohlstadter, S. Jackson and P. Devanbu, "DADO: Enhancing Middleware to Support Cross-cutting Features in Distributed, Heterogeneous Systems," ICSE 2003, International Conference on Software Engineering, Portland, Oregon, May 2003. pdf |
L.Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.F. Wu, L. Zhang, "Protecting BGP Routes to Top Level DNS Servers," in the Proceedings of the 23rd International Conference on Distributed Computing Systems, pp. 322-331. abstract |
X. Zhao, D. Massey, S.F. Wu, M. Lad, D. Pei, L. Wang, L. Zhang, "Understanding BGP Behavior Through a Study of DOD Prefixes," in the Proceedings of the DARPA Information Survivability Conference and Exposition, April 22-24, 2003, Vol. 1, pp. 214-225 |
Y. Yang, Z. Fu, S.F. Wu, "BANDS: An Inter-Domain Internet Security Policy Management System for IPSec/VPN", 8th IFIP/IEEE International Symposium on Integrated Network Management 2003 (IM 2003), Colorado Springs, Colorado, March 24-28,2003, pp.231-244. |
B. Reynolds, D. Ghosal, "Secure IP Telephony Using Multi-Layered Protection," Proceedings of Network and Distributed System Security Symposium (NDSS), San Diego, Feb. 2003 pdf |
|
2002 |
|
D.S. Peterson, M. Bishop, R. Pandey, "A Flexible Containment Mechanism for Executing Untrusted Code," USENIX Security Symposium 2002, pp. 207-225 abstract |
M. Bishop, "Trends in Academic Research: Vulnerabilities Analysis and Instrusion Detection," Computers & Security 21, 2002, pp. 609-612 |
T. Stallard, "Automated Analysis for Digital Forensic Science," Masters Thesis, Dec. 2002 pdf |
B. Reynolds, "Enabling Secure IP Telephony in Enterprise Networks," Masters Thesis, Dec. 2002. pdf |
D. Lee, J. Rowe, C. Ko, and K. Levitt. "Detecting and Defending Against Web-Server Fingerprinting," 18th Annual Computer Security Applications Conference, Las Vegas, NV, December 9-13, 2002, 10 pages. |
H. Johnson, A. Nilsson, J. Fu, S.F. Wu, A. Chen, H. Huang, "SOLA: A One-Bit Identity Authentication Protocol for Access Control," in the Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '02), Nov. 17-21, 2002, Vol. 1, pp. 768-772. |
H. Chen, D.Wagner, "MOPS: an infrastructure for examining security properties of software," Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), Washington, DC, November 2002, pages 235-244, pdf |
S.T. Teoh, K.-L. Ma, S.F. Wu, X. Zhao, "Case Study: Interactive Visualization for Internet Security," in Proceedings of IEEE Visualization (VIS 2002), Oct. 27-Nov. 1, pp. 505-508. |
B. Reynolds, D. Ghosal, "STEM: Secure Telephony Enabled Middlebox," IEEE Communications, vol. 40, no.10, Oct. 2002. pdf |
X.Wang, D.S. Reeves, S.F. Wu, "Inter-Packet Delay Based Correlation for Tracing Encrypted Connections Through Stepping Stones," European Symposium on Research in Computer Security (ESORICS'2002), Zurich, Oct., pp. 244-263 abstract |
P. Rogaway, "Authenticated-Encryption with Associated-Data," ACM Conference on Computer and Communications Seciruity 2002 (CCS'02), ACM Press, September 2002, pp. 98-107 pdf |
J. E. Just, J. C. Reynolds, L. A. Clough, M. Danforth, K. N. Levitt, R. Maglich, and J. Rowe, "Learning Unknown Attacks – A Start." Proceeding of the 5th International Symposium, RAID 2002, Recent Advances in Intrusion Detection, A. Wespi, G. Vigna, and L. Deri, eds., Zurich, Switzerland, October 16-18, 2002, pp. 158-176. |
J. Black, P. Rogaway, T. Shrimpton, "Encryption-Scheme Security in the Presence of Key-Dependent Messages," Selected Areas in Cryptography 2002 (SAC '02), St. John's, Newfoundland, Canada, May 2, 2002, Lecture Notes in Computer Science, vol. 2595, pp. 62-75, Springer-Verlag, 2002 pdf |
Y. Liao, V. R. Vemuri, "Use of Text Categorization Techniques for Intrusion Detection,"11th USENIX Security Symposium, San Francisco, CA, August 5-9, 2002. pdf |
M. Gertz, E. Guldentops, L. Strous (eds.): "Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology." Kluwer Academic Publishers. Proceedings of the Forth International IFIP WG11.5 Working Conference on Integrity and Internal Control, Brussels, Belgium, November 2001. For details, see the Kluwer Web page at http://www.wkap.nl/prod/b/1-4020-7005-5 |
H. Chen, D. Wagner, D. Dean, "Setuid demystified," Proceedings of the 11th USENIX Security Symposium, pages 171-190, San Francisco, CA, August 2002. pdf |
J. Black, P. Rogaway, T. Shrimpton, "Block-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV," Advances in Cryptology - CRYPTO '02, Lecture Notes in Computer Science, vol. 2442, pp. 320-335, Springer-Verlag, 2002 pdf |
D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S.F. Wu, L. Zhang, "Improving BGP Convergence Through Consistency Assertions," in Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOMM 2002), June 23-27, Vol. 2, 902-911 pdf |
S.Teoh, K. Ma, S.F. Wu, X. Zhao, "Information Visualization for Anomaly Detection," in the Proceedings of 5th IASTED International Conference in Computer Graphics and Imaging (CGIM), 2002, Hawaii. |
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S.F. Wu, L. Zhang, "Detection of Invalid Routing Announcement in the Internet," in the Proceedings of the International Conference on Dependable Systems and Networks, June 23-26, pp. 59-68. abstract |
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress," in Proceedings of the Second ACM SIGCOMM Workshop on Internet Measurement Workshop, Marseille, France, pp. 183-195. |
J. Black, P. Rogaway, "A Block-Cipher Mode of Operation for Parallelizable Message Authentication," Advances in Cryptology - EUROCRYPT '02, Lecture Notes in Computer Science, vol. 2332, pp. 384-397, Springer-Verlag, 2002. pdf |
J. Black, P. Rogaway, "Ciphers with Arbitrary Finite Domains," RSA Data Security Conference, Cryptographer's Track (RSA CT '02), Lecture Notes in Computer Science, Vol. 2271, pp. 114-130, 2002 pdf |
M. Abadi, P. Rogaway, "Reconciling Two Views of Cryptography (the computational soundness of formal encryption)," J. of Cryptology, vol. 15, no. 2, pp. 103-127, 2002. |
|
2001 |
|
C. Ko, P. Brutch, J. Rowe, G. Tsafnat, and K. N. Levitt. "System Health and Intrusion Monitoring Using a Hierarchy of Constraints," Recent Advances in Intrusion Detection (RAID) 2001, Lecture Notes in Computer Science, W. Lee, L. Me, and A. Wespi, eds., Vol. 2212, pp. 190-203. |
D.P. Gilliam, J.C. Kelly, J.D. Powell, M. Bishop, "Development of a Software Security Assessment Instrument to Reduce Software Security Risk," WETICE 2001, pp. 144-149. abstract |
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, S. G. Stubblebine, "A General Model for Authentic Data Publication." Submitted for publication. pdf |
P. Devanbu, M. Gertz, A. Kwong, C. Martel, S. G. Stubblebine, "Flexible Authentication of XML Documents." Eighth ACM Conference on Computer and Communications Security (CCS-8), 2001. |
A. Kwong, M. Gertz, "Authentic Publication of XML Document Data." Second International Conference on Web Information Systems Engineering (WISE), 2001. |
E. Fulp, Z. Fu, D. Reeves, S.F. Wu, and X. Zhang, "Preventing Denial of Service Attacks on Network Quality of Service", in 2001 DARPA Information Survivability Conference and Exposition (DISCEX 2001), 12-14 June 2001, Anaheim, CA, IEEE Computer Society, pp. 159-172. pdf |
F. Wang, H. Qi, F. Gong, S.F. Wu "Design and Implementation of Property-Oriented Detection for Link-State Routing Protocols", in Proceedinds of the 2001 IEEE Workshop on Information Assurance and Security, June 5-6, Westpoint, NY, pp.91-99. pdf |
X. Wang, D. Reeves, S.F. Wu, J. Yuill, "Sleepy Watermark Tracing: an Active Network-Based Intrusion Response Framework", Proc. Of IFIP Conf. on Security, Paris, 2001, June 11-13, pp. 369-384. pdf |
X.Wang, D. Reeves, S.F. Wu, "Tracing Based Active Intrusion Response," in Journal of Information Warefare, Volume 1, Issue 1, September 2001, 50-61. |
C.L.Wu, S.F. Wu, R. Narayan, "IPSEC/PHIL (Packet Header Information List): Design, Implementation, and Evaluation." in IEEE International Conference on Computer Communication and Networks (ICCCN'01), October 15-17, 2001, pp. 206-211. pdf |
P. Rogaway, M. Bellare, J. Black, and T. Krovetz, "OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption." Eighth ACM Conference on Computer and Communications Security (ACM CCS), ACM Press, pp. 196-205, 2001. Documents available on the OCB homepage |
Y. Chung, "Data extraction oand inertio semistructured documents, " Ph.D. Dissertation, 2001 pdf |
M. Abdalla, M. Bellare, and P. Rogaway, "The Oracle Diffie-Hellman Assumption and an Analysis of DHIES," Topics in Cryptology - CT RSA 01. Lecture Notes in Computer Science Vol. 2020, D. Naccache, ed., Springer-Verlag, 2001. pdf |
J. Kilian and P. Rogaway, "How to protect DES against exhaustive key search (an analysis of DESX),"
J. of Cryptology, vol. 14, no. 1, pp. 17-35, 2001. pdf |
D. Lee, "HMAP: A Technique and Tool for Remote Identification of HTTP Servers" Masters Thesis pdf |
A. Mankin, D. Massey, C.L.Wu, S.F.Wu, L. Zhang, "On Design and Evaluation of Intention-Driven ICMP Traceback,." in IEEE International Conference on Computer Communication and Networks (ICCCN'01), October 15-17, 2001, pp. 159-165. pdf |
Z. Fu and S.F. Wu, "Automatic Generation of IPSEC/VPN Policies in an Intra-Domain Environment," in 12th International Workshop on Distributed Systems: Operations & Management (DSOM 2001), October 15-17, 2001, Nancy, France, pp. 279-290 pdf |
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S.F.Wu, L. Zhang. "An Analysis of BGP Multiple Origin AS (MOAS) Conflicts", in ACM SIGCOMM Internet Measurement Workshop, November 1-2, San Francisco, pp. 31-35 ps abstract |
H.Y. Chang, S.F. Wu and Y.F. Jou, "Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks", ACM Transaction on Information and System Security (TISSEC), Feb. 2001, Vol. 4, pp. 1-36 abstract |
Z. Fu, S. F. Wu, H. Huang, K. Loh, F. Gong, "IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution", IEEE Policy 2001 Workshop, Jan. 2001, Springer Vol. 1995, pp. 39-56 pdf abstract |
|
2000 |
|
M. Bellare, J. Kilian, and P. Rogaway, "The security of the cipher block chaining message authentication code," Journal of Computer and System Sciences (JCSS), vol. 61, no. 3, Dec 2000, pp. 362-399. pdf |
M. Bellare and P. Rogaway, "Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography," Advances in Cryptology - Asiacrypt '00, Lecture Notes in Computer Science, vol. 1976, T. Okamoto, ed., Springer-Verlag, Dec 2000. pdf |
P. Devanbu, M. Gertz, C. Martel, P. Rogaway, S. G. Stubblebine: "Authentic Re-Publication by Untrusted Servers: A Novel Approach to Database Survivability," Third Information Survivability Workshop 2000. ISW-2000 |
P. Devanbu, M. Gertz, C. Martel, S. G. Stubblebine "Authentic Third-party Data Publication." 14th IFIP 11.3 Working Conference in Database Security, 2000. |
J.R. Hughes, T. Aura, M. Bishop, "Using Conservation of Flow as a Security Mechanism in Network Protocols," IEEE Syposium on Security and Privacy 2000, pp. 131-132. abstract |
M. Bishop, "Education in Information Security," IEEE Concurrency 8(4), pp. 4-8 (Oct.-Dec. 2000) pdf |
T. Aura, M. Bishop, and D. Sniegowski, "Analyzing Single-Server Network Inhibition," Proceedings of the 13th Computer Security Foundations Workshop, pp. 108-117 (July 2000) pdf |
M. Heckman, "Compositional verification of calling hiearchies using templates," Ph.D. dissertation, 2000. pdf |
J. Hoagland, "Specifying and implementing security policies using LaSCO, the language for security constraints on objects," Ph.D. dissertation, 2000. pdf |
T. Krovetz, "Software-optimized universal hashing and message authentication," Ph.D. dissertation, 2000 pdf |
N. Puketza, "Approaches to computer security: Filtering, testing, and detection," Ph.D. dissertation, 2000 pdf |
J. Black, "Message authentication codes," Ph.D. dissertation, 2000. pdf |
J. Black and P. Rogaway, "CBC MACs for arbitrary-length messages: The three-key constructions,"
Advances in Cryptology - CRYPTO '00, Lecture Notes in Computer Science, vol. 1880, M. Bellare, ed., Springer-Verlag, pp. 197-215, Aug 2000. pdf |
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," Advances in Cryptology - EUROCRYPT '00, Lecture Notes in Computer Science, vol. 1807, B. Preneel, ed., Springer-Verlag, pp. 139-155, 2000. pdf |
D. Gilliam, J. Kelly, and M. Bishop, "Reducing Software Security Risk Through an Integrated Approach," Proceedings of the Ninth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 141-146 (June 2000) html pdf |
B. Hashii, S. Malabarba, R. Pandey and M. Bishop, "Supporting Reconfigurable Security policies for Mobile Programs," Computer Networks 33(1-6) pp. 77-93 (June 2000) pdf |
S. Cheung and K.N. Levitt. 2000. "A Formal-Specification Based Approach for Protecting the Domain Name System." Proceedings of the International Conference on Dependable Systems and Networks, New York City, New York, June 25-28, 2000, pp.641-651. pdf |
J.R. Hughes. "Conservation of Flow as a Security Mechanism in Network Protocols." Masters Thesis, June 2000. pdf |
S. J. Templeton and K. Levitt, "A Requires/Provides Model for Computer Attacks." Proceedings of the New Security Paradigms Workshop 2000, Cork Ireland, Sept. 19-21, 2000 pdf |
M. Abadi and P. Rogaway, "Reconciling two views of cryptography (The computational soundness of formal encryption)," J. of Cryptology, vol. 15, no. 2, pp. 103-127, 2002.
An abridged version of this paper appears at Theoretical Computer Science, Exploring New Frontiers in Theoretical Informatics. Lecture Notes in Computer Science, vol. 1872, pp 3-22, Springer 2000. pdf |
T. Krovetz and P. Rogaway, "Fast universal hashing with small keys and no preprocessing: the PolyR construction," Information Security and Cryptology - ICICS 2000, Lecture Notes in Computer Science, vol. 2015, pp. 73-89, D.H. Won, ed., Springer-Verlag, 2000. pdf |
M. Bishop, "Academia and Education in Information Security: Four Years Later," Proceedings of the Fourth National Colloquium on Information System Security Education (May 2000) html pdf |
J.R. Hughes, T. Aura, M. Bishop "Using Conservation of Flow as a Security Mechanism in Network Protocols." Proceedings of the 2000 IEEE Symposium on Security and Privacy, Oakland, California, May 14-17, 2000, pp. 132-141. pdf |
Z. Fu, H. Huang, T. Wu, S. F. Wu, F. Gong, et al. "ISCP: Design and Implementation of An Inter-Domain Security Management Agent (SMA) Coordination Protocol", IEEE NOMS 2000, pp. 565-578. pdf |
X. Zhang, S. F. Wu, Z. Fu, T. Wu, "Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It", Proceedings of IEEE ICNP'00, Nov. 2000, pp. 263-272 . pdf abstract |
C. Xu, F. Gong, I. Baldine, C. Sargor, F. Jou, S. F. Wu, Z. Fu, H. Huang, "Celestial Security Management System", DARPA Information Survivability Conference and Exposition (DISCEX 2000), IEEE Computer Society Press, Proceedings, pp. 162-172, vol. 1. pdf |
F. Wang, F. Gong, S.F. Wu, "A Property Oriented Fault Detection Approach for Link State Routing Protocol," Computer Communications and Networks, 2000, Proceedings, pp. 114-119. pdf |
H.Y. Chang, S.F. Wu, et al., "Design and Implementation of a Real-Time Decentralized Source Identification System for Untrusted IP Packets", DARPA Information Survivability Conference and Exposition (DISCEX 2000), IEEE Computer Society Press, January, 2000. pdf |
Y.F. Jou, F. Gong, S.F. Wu, H.Y. Chang, et al., "Design and Implementation of a Scalable Intrusion Detection System for the Protection of Network Infrastructure", DARPA Information Survivability Conference and Exposition (DISCEX 2000), IEEE Computer Society Press, January, 2000. pdf |
J. Yuill, S.F. Wu, J. Settle, F. Gong, R. Forno, M. Huang, J. Asbery, "Intrusion-detection for incident-response, using a military battlefield-intelligence process." Computer Networks 34 (4): 671-697 (2000) pdf |
|
1999 |
|
M. Bishop, "Vulnerabilities Analysis," Proceedings of the Recent Advances in Intrusion Detection, pp. 125-136 (Sep. 1999) html pdf |
M. Bishop, "What Do We Mean By "Computer Security Education," Proceedings of the 22nd National Information Systems Security Conference, (Oct. 1999) pdf |
M. Bellare and P. Rogaway, "On the Construction of Variable-Input-Length Ciphers" Fast Software Encryption, 6th International Workshop, FSE'99, Lecture Notes in Computer Science, Springer-Verlag, 1999 abstract pdf |
J. Black, S. Halevi, H. Krawczyk, T. Krovetz and P. Rogaway, "UMAC: Fast and secure message authentication," Advances in Cryptology - CRYPTO '99, Lecture Notes in Computer Science, vol. 1666, M. Wiener, ed., Springer-Verlag, 1999, pp. 216-233. pdf |
A. Borgida and P. Devanbu, "Component =Inter-Operability - Putting 'DL' to 'IDL'." Proceedings of the International Conference on Software Enginering. pdf |
S. Cheung, "An intrusion tolerance approach for protecting network infrastructures," Ph.D. dissertation, 1999. pdf |
S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, J. Rowe, S. Staniford-Chen, R. Yip, D. Zerkle, "The Design of GrIDS: A Graph-Based Intrusion Detection System." U.C. Davis Computer Science Department Technical Report CSE-99-2, 1999. pdf |
C. Chung, M. Gertz, K. Levitt, "DEMIDS: A Misuse Detection System for Database Systems" To appear in Integrity and Internal Control in Information Systems IFIP WG11.5, 1999. pdf |
W. Cohen and P. Devanbu, "Automatically Exploring Hypotheses about Fault Prediction: a Comparative Study of Inductive Logic Programming Methods" International Journal of Software Engineering and Knowledge Engineering, to appear. pdf |
P. Devanbu, "Chime: Customizable Hyperlink Insertion and Maintenance Engine for Software Engineering Environments." International Conference on Software Engineering, in press. pdf |
P. Devanbu, "GENOA - A Customizable, front-end retargetable Source Code Analysis Framework." ACM Transactions on Software Engineering and Methodology 27; accepted. pdf |
P. Devanbu and S. G. Stubblebine, "Cryptographic Verification of Test Coverage Claims." IEEE Transactions on Software Engineering 24; in press. pdf |
P. Devanbu, "A Reuse Nightmare: Honey, I got the wrong DLL (Invited Panel Position Paper)." Proceedings of the ACM Symposium on Software Reusability (ACM SSR'99). pdf |
R. Feiertag, L. Benzinger, S. Rho, S. Wu, K. Levitt, D. Peticolas, M. Heckman, S. Staniford-Chen, C. Zhang, "Intrusion Detection Inter-component Adaptive Negotiation." Proceedings of the RAID 99: Recent Advances in Intrusion Detection. pdf |
M. Gertz, S. Stubblebine, and P. Devanbu, "Security for Automated, Distributed Configuration Management." Proceedings of the ICSE 99 Workshop on Software Engineering over the Internet. pdf |
Z. Fu, S. F. Wu, et al. "Security Issues for Differentiated Service Framework" Internet Draft, IETF, Oct. 1999. txt |
F. Wang, F. Gong, S.F. Wu, "Intrusion Detection for Link State Routing Protocol Through Integrated Network Management" Computer Communications and Networks, 2000, Proceedings, pp. 694-699. pdf |
Intrusion-Detection for Incident-Response: using a military battlefield-intelligence process RAID'99, the intrusion-detection conference at Purdue University. more info |
T. Wu, S. F. Wu, Z. Fu, F. Gong, "Securing QoS: Threats to RSVP Messages and Their Countermeasures" IEEE/IFIP IWQoS'99, pp. 62-64. pdf |
S.F. Wu, H.Y Chang, et al., "JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol", Journal of Computer Networks and ISDN Systems, 1999. |
H.Y. Chang, S.F. Wu, et al., "Deciduous: Decentralized Source Identification for Network-based Intrusions", 6th IFIP/IEEE International Symposium on Integrated Network Management, IEEE Communications Society Press, May 1999. pdf |
J. Yuill, S.F. Wu, F. Gng, M. Huang "Intrusion Detection for an On-Going Attack." Recent Advances in Intrusion Detection, 1999. |
|
1998 |
|
M. Bellare, T. Krovetz, and P. Rogaway, "Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible," Advances in Cryptology-Eurocrypt 98 Proceedings, Lecture Notes in Computer Science Vol. 1403 Springer-Verlag (1998) pdf |
P. Rogaway and D. Coppersmith, "A Software-Optimized Encryption Algorithm," Journal of Cryptology, vol. 11, no. 4, pp. 273-287, 1998. pdf |
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, "Relations Among Notions of Security for Public-Key Encryption Schemes," Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science, Vol. 1462, H. Krawczyk, ed., Springer-Verlag pdf |
K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R.A. Olsson, "Detecting Disruptive Routers: A Distributed Network Monitoring Approach," Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, California, May 3-6, 1998, pp.115-124. pdf |
M. Clifford, C. Lavine, and M. Bishop, "The Solar Trust Model: Authentication Without Limitation," Proceedings of the 14th Annual Computer Security Applications Conference, 1998, pp. 300-307 pdf |
P. Devanbu, S. Stubblebine, "Preserving Data Structure Integrity on Hostile Platforms," IEEE Symposium on Security and Privacy Oakland, CA (1998). pdf |
P. Devanbu, P.W. Wong, S. Stubblebine, "Techniques for Trusted Software Engineering," Proceedings of the 20th International Conference on Software Engineering Kyoto, Japan (1998). pdf |
B. Hashii, M. Lal, R. Pandey and S. Samorodin, "Securing Systems Against External Programs," IEEE Internet Computing 2(6): 35-45 pdf |
M. R. Heckman, and K. N. Levitt, "Applying the Composition Principle to Verify a Hierarchy of Security Servers," Proceedings of the Thirty-First Hawaii International Conference on System Sciences, 3, pp. 338-347 pdf |
R. Pandey and B. Hashii, "Providing Fine-Grained Access Control for Mobile Programs Through Binary Editing" Submitted to 5th ACM Conference on Computer and Communications Security |
R. Yip, K. Levitt, "Data Level Inference Detection in Database Systems," Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 9-11, 1998, pp. 179-189. pdf |
R. Yip, K. Levitt, "The Design and Implementation of a Data Level Database Inference Detection System," Proceedings of the Twelfth Annual IFIP WG 11.3 Working Conference on Database Security, Chalkidiki, Greece, July 15-17, 1998. pdf |
|
1997 |
|
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, "A Concrete Security Treatment of Symmetric Encryption," Proceedings of the 38th Annual Symposium on Foundations of Computer Science, pp. 115-124 pdf |
M. Bellare and P. Rogaway, "Collision-Resistant Hashing: Towards Making UOWHFs Practical,"
Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science, Vol. 1294, B. Kaliski, ed., Springer-Verlag, 1997. pdf |
D. Beaver, J. Feigenbaum, J. Kilian and P. Rogaway, "Locally Random Reductions: Improvements and Applications," Journal of Cryptology, Winter 1997, pp. 17-36. pdf |
M. Bishop, "Conspiracy and Information Flow in the Take-Grant Protection Model" Journal of Computer Security4(4)(1996) pp. 331-359 pdf |
M. Bishop, "Information Survivability, Security, and Fault Tolerance," Position Paper for the Information Survivability Workshop Journal of Computer Security #6, (Feb.1997) pdf |
M. Bishop, "Teaching Computer Security," Position Paper for the Workshop on Education in Computer Security, Monterey, CA (Jan. 1997). pdf |
M. Bishop, S. Cheung, C. Wee, J. Frank, J. Hoagland, and S. Samorodin, "The Threat from the Net" IEEE Spectrum, 34(8):56-63 pdf |
S. Cheung, K. N. Levitt, "Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection" Proc. New Security Paradigms Workshop 1997, Cumbria, UK, September 23-26, 1997. pdf |
S. Cheung, "An Efficient Message Authentication Scheme for Link State Routing" Proc.13th Annual Computer Security Applications Conference, San Diego, California, December 8-12, 1997, pp. 90-98. pdf |
P. Devanbu, S. Stubblebine, "Cryptographic Verification of Test Coverage Claims," Proceedings, Fifth ACM/SIGSOFT Conference on Foundations of Software Engineering Zurich, Switzerland (1997). pdf |
G. Fink, M. Bishop, "Property Based Testing: A New Approach to Testing for Assurance," ACM SIGSOFT Software Engineering Notes, 22(4) (July 1997) pdf |
C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-critical Programs in Distributed Systems: A Specification-based Approach," Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 134-144 pdf |
N. Puketza, M. Chung, R. A. Olsson and B. Mukherjee, "A Software Platform for Testing Intrusion Detection Systems," IEEE Software, 14(5): 43-51 pdf |
C. Zhang, B. R. Becker, D. Peticolas, M. Heckman, K. Levitt, and R. A. Olsson, "Verification of a Distributed Computing System by Layered Proofs," Proceedings of the Thirtieth Hawaii International Conference on System Sciences, 5, pp. 252-261 pdf |
J.N. Hansoty, M. Vouk, S.F. Wu, LAVA: Secure Delegation of Mobile Applets: Design, Implementation and Applications, in Second International Workshop on Enterprise Security, June 1997. gzipped ps |
T.L. Wu, S.F. Wu, "Selective Encryption and Watermarking of MPEG Video" in International Conference on Image Science, Systems, and Technology, CISST'97, June 1997. gzipped ps |
B. Vetter, F. Wang, S.F. Wu, "An Experimental Study of Insider Attacks for the OSPF Routing Protocol," May 1997. gzipped ps |
F. Wang, B. Vetter, S.F. Wu, "Secure Routing Protocols: Theory and Practice". May 1997. gzipped ps |
Y. F. Jou, F. Gong, C. Sargor, S. F. Wu, R. Cleaveland, "Architecture Design of a Scalable Intrusion Detection System for the Emerging Network Infrastructure," MCNC, Technical Report CDRL A005, April 1997. gzipped ps |
S.F. Wu, T.L. Wu, "Run-Time Performance Evaluation of A Secure MPEG System Supporting Both Selective Watermarking and Encryption." March 1997. gzipped ps |
F.Wang, S.F. Wu, "SNMP Security Protocol Analysis," Ji-Nao Working Report, January 1997. gzipped ps |
S.F. Wu, F. Wang, B.M. Vetter, R. Cleaveland, Y.F. Jou, F. Gong, and C. Sargor, "Intrusion Detection for Link-State Routing Protocols" in IEEE Symposium on Security and Privacy (5 Minutes), May 1997. gzipped ps |
R.J. Cherukuri, M. Peyravian, V. Surapaneni, and S.F. Wu, "A User Plane Security Protocol for ATM Networks Extended Abstract," in 5th International Conference on Telecommunication Systems, March 1997. gzipped ps |
|
1996 |
|
M. Bishop, M. Dilger, "Checking for Race Conditions in File Access," Computing Systems 9(2) (Spring 1996), pp. 131-152. abstract pdf |
M. Bishop, L.T. Heberlein, "An Isolated Network for Research," The 19th National Information Systems Security Conference pdf |
B. Guha, B. Mukherjee, "Network Security Via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions," Proc. of the IEEE Infocom'96 , San Francisco, CA, March 1996, pp. 603-610. abstract pdf |
L.T. Heberlein, M. Bishop, "Attack Class: Address Spoofing," The 19th National Information Systems Security Conference. paper/pdf slides/pdf |
C.C.W. Ko, "Execution Monitoring of Security-Critical Programs in a Distributed System: A Specification-Based Approach," Ph.D. Thesis, August 1996. abstract pdf |
G. Fink, "Discovering Security and Safety Flaws Using Property-Based Testing," Ph.D. dissertation, 1996. pdf |
N. F. Puketza, K. Zhang, M. Chung, B. Mukherjee, R. A. Olsson , "A Methodology for Testing Intrusion Detection Systems," IEEE Transactions on Software Engineering, Vol.22, No.10, October 1996, pp.719-729. pdf |
D. O'Brien, "Recognizing and Recovering from Rootkit Attacks," Sys Admin 5(11) (November 1996), pp. 8-20. |
P. Rogaway with M. Bellare, "The Exact Security of Digital Signatures--How to Sign with RSA and Rabin," Earlier version appears in Advances in Cryptology -- Eurocrypt '96 , LNCS Vol.1070, U. Maurer ed., Springer-Verlag, pp. 399-416. pdf |
P. Rogaway with J. Kilian, "How to Protect DES Against Exhaustive Key Search," Advances in Cryptology - CRYPTO '96. pdf |
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, D. Zerkle, "GrIDS -- A Graph-Based Intrusion Detection System for Large Networks," The 19th National Information Systems Security Conference. pdf |
D. Zerkle, K. Levitt, "NetKuang--A Multi-Host Configuration Vulnerability Checker," Proc. of the 6th USENIX Security Symposium. San Jose, California, July 22-25, 1996, pp. 195-204. pdf |
S.F. Wu, "Sleepy Authentication Services for IPSEC," in ESORIC-96, Italy, September 1996. gzipped ps |
S.F. Wu, "Sleepy Security Management with Proxy-Based Filtering," April 1996. gzipped ps |
S.F. Wu, "SSGP: Sleepy Security Gateway Protocol for IPSEC," in a Supplement to the Proceedings of the 1996 IEEE Symposium on Security and Privacy, May 1996. |
|
1995 |
|
M. Bishop, "Theft of Information in the Take-Grant Protection System," Journal of Computer Security, Vol.3, No.4, pp. 283-308. abstract |
M. Bishop, "A Standard Audit Log Format," Proc. of the 1995 National Information Systems Security Conference. Baltimore, Maryland, October 10-13, 1995, pp. 136-145. pdf |
M. Bishop, D.V. Klein, "Improving System Security via Proactive Password Checking," Computers & Security, 1995, Vol.14, No.3, pp. 233-249. postscript |
S. Cheung, K.N. Levitt, C. Ko, "Intrusion Detection for Network Infrastructures," The 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 1995. Short Presentation. postscript |
M. Chung, N. Puketza, R.A. Olsson, B. Mukherjee, "Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions," Proc. of the 1995 National Information Systems Security Conference. Baltimore, Maryland, October 10-13, 1995, pp. 173-183. abstract postscript |
L.T. Heberlein, "Network Security Monitor (NSM) - Final Report," Lawrence Livermore National Laboratory project deliverable. pdf |
J. Hoagland, C. Wee, K.N. Levitt, "Audit Log Analysis Using the Visual Audit Browser Toolkit," U.C. Davis Computer Science Department Technical Report CSE-95-11, 1995. abstract postscript |
R.W. Lo, K.N. Levitt, R.A. Olsson, "MCF: a Malicious Code Filter," Computers & Security, 1995, Vol.14, No.6, pp. 541-566. abstract postscript |
Mihir Bellare, Phillip Rogaway, "The complexity of approximating a nonlinear program," Journal of Mathematical Programming B, Vol. 69, No. 3, pp. 429-441, September 1995 |
P. Rogaway, "Bucket Hashing and Its Applications to Fast Message Authentication," Advances in Cryptology - CRYPTO '95. pdf |
M. Bellare, P. Rogaway, "Optimal asymmetric encryption--How to encrypt with RSA," Extended abstract was in Advances in Cryptology - Eurocrypt 94, Lecture Notes in Computer Science Vol. 950. A. De Santis ed, Springer-Verlag, 1995. pdf |
P. Rogaway with M. Bellare, "Provably Secure Session Key Distribution - The Three Party Case," Proc. of the 27th Annual ACM Symposium on Theory of Computing. Las Vegas, NV, May 29-June 1, 1995. abstract postscript |
P. Rogaway with M. Bellare, R. Guerin, "XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions." Advances in Cryptology - CRYPTO '95. abstract postscript |
S. Staniford-Chen, L.T. Heberlein, "Holding Intruders Accountable on the Internet," Proc. of the 1995 IEEE Symposium on Security and Privacy, Oakland, CA, 8-10 May 1995, pp. 39-49. pdf |
C. Wee, "LAFS: A Logging and Auditing File System," The 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 1995. extended abstract |
C. Wee, "LAFS: A Logging and Auditing File System," Proc. of the 11th Computer Security Applications Conference, 1995. pdf |
|
1994 |
|
G. Fink, C. Ko, M. Archer, K. Levitt, "Toward a Property-based Testing Environment with Application to Security Critical Software," Proc. of the 4th Irvine Software Symposium. April 1994, pp. 39-48. abstract postscript |
G. Fink, K. Levitt, "Property-based Testing of Privileged Programs," Proceedings of the 10th Annual Computer Security Applications Conference Orlando, FL, 5-9 Dec. 1994, pp. 154-163. pdf |
J. Frank, "Machine Learning and Intrusion Detection: Current and Future Directions," Proc. of the 17th National Computer Security Conference, October 1994. postscript |
C. Ko, G. Fink, K. Levitt, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring," Proc. of the 10th Annual Computer Security Applications Conference, Orlando, FL, 5-9 Dec. 1994, pp. 134-144. pdf |
K.N. Levitt, S. Cheung, "Common Techniques in Fault-Tolerance and Security," Proc. of the Dependable Computing for Critical Applications 4 , San Diego, California, 4-6 Jan. 1994, pp. 373-377. postscript |
B. Mukherjee, L.T. Heberlein, K.N. Levitt, "Network Intrusion Detection," IEEE Network, May-June 1994, Vol.8, No.3, pp.26-41. pdf |
N. Puketza, B. Mukherjee, R.A. Olsson, K. Zhang, "Testing Intrusion Detection Systems: Design Methodologies and Results from an Early Prototype," Proc. of the 17th National Computer Security Conference, October 1994, pp. 1-10. |
P. Rogaway with M. Bellare, "Optimal Asymmetric Encryption," Eurocrypt '94. abstract postscript |
P. Rogaway with M. Bellare, J. Kilian, "The Security of Cipher Clock Chaining," Advances in Cryptology - CRYPTO '94. Santa Barbara, CA, 21-25 August, 1994, pp. 341-358. abstract postscript |
P. Tendick, N. Matloff, "A Modified Random Perturbation Method for Database Security," ACM Transactions on Database Systems, March 1994, Vol.19, No.1, pp.47-63. abstract |
S.F. Wu, S. Mazumdar, S. Brady, D. Lavine, "On Implementing a Protocol Independent MIB," In Network Management and Control, Vol. 2, 1994. gzipped ps |
S.F. Wu and G.E. Kaiser, "Non-Sharable Resource Freshness in Real-Time Scheduling," In RTS'94, France, January 1994. gzipped ps |
|
1993 |
|
M. Bishop, "Recent Changes to Privacy-Enchanced Electronic Mail," Journal of Internetworking: Research and Experience. Vol.4, No.1, March 1993, pp. 47-59. abstract |
M. Bishop, "Password Selection Criteria," Proc. of the 6th International Computer Virus and Security Conference. New York, NY, March 1993. |
M. Bishop, "Teaching Computer Security," Proc. of the 9th IFIP International Symposium on Computer Security, IFIP/Sec '93. May 1993, pp. 43-52. abstract |
R. Crawford, P. Kerchen, K. Levitt, R. Olsson, M. Archer, M. Casillas, "Automated Assistance for Detecting Malicious Code," Proc. of the 6th International Computer Virus and Security Conference. New York, NY, 1993. |
D. Gusfield with M.Y. Kao, "Detection and Protection of Linear Information in Cross Tabulation," SIAM Journal on Discrete Mathematics. Vol.6, No.3, August 1993, pp.460-476. |
C. Ko, D. Frincke, T. Goan, L.T. Heberlein, K. Levitt, B. Mukherjee, C. Wee, "Analysis of an Algorithm for Distributed Recognition and Accountability," Proc. 1st ACM Conference on Computer and Communication Security. Fairfax, VA, Nov. 1993, pp. 154-164. abstract postscript |
P. Rogaway with M. Bellare, "Entity Authentication and Key Distribution," Advances in Cryptology - CRYPTO '93. Santa Barbara, CA, 22-26 August, 1993, pp. 232-249. abstract postscript |
P. Rogaway with M. Bellare, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," Proc. of the 1st ACM Conference on Computer and Communication Security. Fairfax, VA, Nov. 1993, pp. 154-164. postscript |
P. Rogaway with D. Coppersmith, "A Software-optimized Encryption Algorithm," Proc. of the Fast Software Encryption. Cambridge Security Workshop. Cambridge, UK, 9-11 Dec. 1993, pp. 56-63. abstract postscript |
B. Wetmore, "Audit Browsing", Masters Thesis, 1993. pdf |
G.E. Kaiser, W. Hseush, S. Popovich, and S.F. Wu, "Multiple Concurrency Control Policies in an Object-Oriented Programming System," In Research Directions in Concurrent Object-Oriented Programming, October 1993. gzipped ps |
S.F. Wu, C. Perkins, P. Bhagwat, "Caching Location Data in Mobile Networking," In IEEE Workshop on Advances in Parallel and Distributed Systems, October 1993. gzipped ps |
S.F. Wu, G.E. Kaiser, "Shared Memory vs. Message Passing in the Real-Time Producers/Consumers Problem," In IEEE PDRTS'93, April 1993. gzipped ps |
S.F. Wu, G.E. Kaiser, "On Hard Real-Time Management Information," In IEEE First International Workshop on System Management, Los Angles, April 1993. gzipped ps |
S.F. Wu, S. Mazumdar, S.Brady, EMOSY: An SNMP Protocol Object Generator for the PIMIB. In IEEE First International Workshop on System Management, Los Angles, April 1993. gzipped ps |
|
1992 |
|
M. Bishop, "Anatomy of a Proactive Password Changer," Proc. of the UNIX Security Symposium III Baltimore, MD, 14-16 Sept. 1992, pp. 171-84. abstract postscript |
R. H. Crawford, R. A. Olsson, W. W. Ho, C. E. Wee, "Semantic Issues in the Design of Languages for Debugging," Proceedings of the 1992 International Conference on Computer Languages, pp. 252-261 pdf |
G. Fink, L. Yang, M. Archer, "PM: A Unified Automated Deduction Tool for Verification," Proc. of the 15th National Computer Security Conference, Baltimore, MD, 13-16 October 1992, pp. 473-481. |
D. Frincke, M. Archer, K. Levitt, "Finding Security Flaws in Concurrent Systems," Proc. of the 15th National Computer Security Conference, Baltimore, MD, 13-16 October 1992, pp. 194-203. |
L.T. Heberlein, B. Mukherjee, K.N. Levitt, "Internetwork Security Monitor," Proc. of the 15th National Computer Security Conference, October 1992, pp. 262-271. |
W. Ho, "Debugging and Dynamic Linking," Ph.D. Thesis, 1992. title sheet ps postscript |
|
1991 |
|
J. Alves-Foss, K. Levitt, "The Verification of Secure Distributed Systems," COMPCON Spring '91. Digest of Papers. San Francisco, CA, 25 Feb.-1 March 1991, pp. 177-184 pdf |
J. Alves-Foss, K. Levitt, "Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components," Proc. of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy. Oakland, CA, 20-22 May 1991, pp. 122-35 pdf |
J. Alves-Foss, K. Levitt, "Mechanical Verification of Secure Distributed Systems in Higher Order Logic," Proc. of the 1991 International Workshop on the HOL Theorem Prover and its Applications, August 1991, pp. 263-278. |
M. Archer, J. Bock, J. Frincke and K. Levitt, "Effectiveness of Operating System Prototyping from a Template: Application to MIMIX," Second International Workshop on Rapid System Prototyping: Shortening the Path from Specification to Prototype, 1991, pp. 55-66 pdf |
M. Bishop, "An Authentication Mechanism for USENET," Proc. of the Winter 1991 USENIX Conference. 21-25 Jan. 1991, pp. 281-287. abstract |
M. Bishop, "Password Management," COMPCON Spring '91. Digest of Papers. San Francisco, CA, 25 Feb.-1 March 1991, pp. 167-169. abstract pdf |
M. Bishop, "A Proactive Password Checker," Proc. of the 7th International Conference on Information Security. May 1991, pp. 169-181. abstract postscript |
M. Bishop, "Privacy-Enchanced Electronic Mail," Journal of Internetworking: Research and Experience. Vol.2, No.4, Dec. 1991, pp. 199-233. abstract |
P. Rogaway, "The Round Complexity of Secure Protocols," MIT Ph.D. Thesis, June 1991 pdf |
J. Brentano, S.R. Snapp, G.V. Dias, T.L. Goan, L.T. Heberlein, C.L. Ho, K.N. Levitt, B. Mukherjee, (with S.E. Smaha), "An Architecture for a Distributed Intrusion Detection System," Proc. of the 14th Department of Energy Computer Security Group Conference, May 1991, pp.(17)25-(17)45. |
R. Crawford, R. Lo, J. Crossley, P. Kerchen, G. Fink, W. Ho, K. Levitt, R. Olsson, M. Archer, "A Testbed for Malicious Code Detection: A Synthesis of Static and Dynamic Analysis Techniques," Proc. of the 14th Department of Energy Computer Security Group Conference, May 1991, pp.(17)1-(17)23. |
D. A. Frincke, G. L. Fisher, M. Archer and K. Levitt, "An Application of Template Methodology: Rapid Prototyping of User Interface Management Systems," Second International Workshop on Rapid System Prototyping: Shortening the Path from Specification to Prototype, 1991, pp. 55-66. pdf |
|
1990 |
|
M. Archer, D. Frincke and K. Levitt, "A Template for Rapid Prototyping of Operating Systems," First International Workshop on Rapid System Prototyping: Shortening the Path from Specification to Prototype, 1990, pp. 119-127 [PDF] |
|
M. Bishop, "Collaboration Using Roles," Software -- Practice and Experience. Vol.20, No.5, May 1990, pp. 485-498 [Abstract] |
|
M. Bishop, "An Extendable Password Checker,"
Proc. UNIX Security II Portland, OR, 27-28 Aug. 1990, pp. 15-16 [Abstract] |
|
M. Bishop, "A Security Analysis of the NTP Protocol Version 2," Proc. 6th Annual Computer Security Applications Conference Tucson, AZ, 3-7 Dec. 1990, pp. 20-29. [Abstract] [PDF] |
|
D. Frincke, M. Archer, K. Levitt, "A Planning System for the Intelligent Testing of Secure Software," Proc. 5th Annual RADC Knowledge Based Software Assistant (KBSA) Conference, 1990 |
|
D. Gusfield, "A Little Knowledge Goes a Long Way: A Faster Algorithm for Finding Compromised Data in 2-D Tables," Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. Oakland, CA, 7-9 May 1990, pp. 86-94. [Abstract] |
|
L.T. Heberlein, G.V. Dias, K.N. Levitt, B. Mukherjee with J. Wood, D. Wolber, "A Network Security Monitor," Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. Oakland, CA, 7-9 May 1990, pp. 296-304. [Abstract][PDF] |
|
P. Kerchen, R. Lo, J. Crossley, G. Elkinbard, R. Olsson, "Static Analysis Virus Detection Tools for UNIX Systems," Proc. 13th National Computer Security Conference. Washington, DC, 1-4 Oct. 1990, pp. 350-365. [Abstract] |
|
P. Rogaway with D. Beaver, J. Feigenbaum, J. Kilian, "Security with Low Communication Overhead," Proc. Advances in Cryptology - CRYPTO '90, Santa Barbara, CA, 11-15 August, 1990, pp. 62-76. [Abstract] |
|
P. Rogaway with D. Beaver, S. Micali, "The Round Complexity of Secure Protocols," Proceedings of the 22nd Annual ACM Symposium on Theory of Computing. Baltimore, MD, 14-16 May 1990, pp. 503-513. [Abstract] |
|
D.R. Wichers, D.M. Cook, R.A. Olsson, J. Crossley, P. Kerchen, K. Levitt, R. Lo, "PACL's: An Access Control List Approach to Anti-viral Security," Proc. 13th National Computer Security Conference. Washington, DC, 1-4 Oct. 1990, pp. 340-349. [Abstract] |
|
P.J. Windley, "A Hierarchical Methodology for Verifying Microprogrammed Microprocessors," Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. Oakland, CA, 7-9 May 1990, pp. 345-357. [Abstract] |
|
|
1989 |
|
M. Bishop, "A Model of Security Monitoring," Proceedings of the Fifth Annual Computer Security Applications Conference, 1989, pp. 46-52 [PDF] |
|
|