Adaptive Autonomous Secure Cyber Systems

[1]  Florian Kammüller,et al.  Modeling and Verification of Insider Threats Using Logical Analysis , 2017, IEEE Systems Journal.

[2]  Mathias Payer,et al.  Control-Flow Integrity , 2017, ACM Comput. Surv..

[3]  Yitzchak M. Gottlieb,et al.  ACyDS: An adaptive cyber deception system , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[4]  Srikanth V. Krishnamurthy,et al.  Cyber Deception: Virtual Networks to Defend Insider Reconnaissance , 2016, MIST@CCS.

[5]  Maximilian Golla,et al.  On the Security of Cracking-Resistant Password Vaults , 2016, CCS.

[6]  R. K. Chavan,et al.  Sandboxing in Linux: From Smartphone to Cloud , 2016 .

[7]  Sushil Jajodia,et al.  Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning , 2016, ACM Trans. Intell. Syst. Technol..

[8]  Amanda Bonnie,et al.  Design and Implementation of a Scalable HPC Monitoring System , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).

[9]  Hovav Shacham,et al.  HIPStR: Heterogeneous-ISA Program State Relocation , 2016, ASPLOS.

[10]  George C. Necula,et al.  Minimizing Faulty Executions of Distributed Systems , 2016, NSDI.

[11]  Thomas Ludwig,et al.  MPI-checker: static analysis for MPI , 2015, LLVM '15.

[12]  Josephine Micallef,et al.  CINDAM: Customized Information Networks for Deception and Attack Mitigation , 2015, 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops.

[13]  Cristian Cadar,et al.  VARAN the Unbelievable: An Efficient N-version Execution Framework , 2015, ASPLOS.

[14]  Seif Haridi,et al.  Apache Flink™: Stream and Batch Processing in a Single Engine , 2015, IEEE Data Eng. Bull..

[15]  Martin Schulz,et al.  Towards Providing Low-Overhead Data Race Detection for Large OpenMP Applications , 2014, 2014 LLVM Compiler Infrastructure in HPC.

[16]  Úlfar Erlingsson,et al.  Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.

[17]  Fan Yang,et al.  Mesa: Geo-Replicated, Near Real-Time, Scalable Data Warehousing , 2014, Proc. VLDB Endow..

[18]  Rajiv Ranjan,et al.  Streaming Big Data Processing in Datacenter Clouds , 2014, IEEE Cloud Computing.

[19]  Jignesh M. Patel,et al.  Storm@twitter , 2014, SIGMOD Conference.

[20]  Ehab Al-Shaer,et al.  Efficient Random Route Mutation considering flow and network constraints , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[21]  Ronald L. Rivest,et al.  Honeywords: making password-cracking detectable , 2013, CCS.

[22]  Mingwei Zhang,et al.  Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.

[23]  Cristian Cadar,et al.  Safe software updates via multi-version execution , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[24]  Marco Ramilli,et al.  Return-Oriented Programming , 2012, IEEE Security & Privacy.

[25]  Jérémy Briffaut,et al.  Advanced MAC in HPC Systems: Performance Improvement , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[26]  Bianca Schroeder,et al.  Cosmic rays don't strike twice: understanding the nature of DRAM errors and the implications for system design , 2012, ASPLOS XVII.

[27]  Christian Payne,et al.  Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM , 2011, TSEC.

[28]  Lior Rokach,et al.  HoneyGen: An automated honeytokens generator , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.

[29]  John R. Douceur,et al.  Cycles, cells and platters: an empirical analysisof hardware failures on a million consumer PCs , 2011, EuroSys '11.

[30]  Martin Schulz,et al.  A Scalable and Distributed Dynamic Formal Verifier for MPI Programs , 2010, 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis.

[31]  Dominique Devriese,et al.  Noninterference through Secure Multi-execution , 2010, 2010 IEEE Symposium on Security and Privacy.

[32]  P. Hovland,et al.  Depth Analysis of MPI Programs , 2010 .

[33]  Konstantin Serebryany,et al.  ThreadSanitizer: data race detection in practice , 2009, WBIA '09.

[34]  Douglas Thain,et al.  Reflections on the virtues of modularity: a case study in linux security modules , 2009, Softw. Pract. Exp..

[35]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[36]  Daniel Grosu,et al.  A Game Theoretic Investigation of Deception in Network Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[37]  Michael Franz,et al.  Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space , 2009, EuroSys '09.

[38]  A. Prasad Sistla,et al.  Preventing Information Leaks through Shadow Executions , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).

[39]  Fausto Giunchiglia,et al.  RelBAC: Relation Based Access Control , 2008, 2008 Fourth International Conference on Semantics, Knowledge and Grid.

[40]  S. Habib,et al.  Introducing map-reduce to high end computing , 2008, 2008 3rd Petascale Data Storage Workshop.

[41]  Julie A. McCann,et al.  A survey of autonomic computing—degrees, models, and applications , 2008, CSUR.

[42]  S. Bhatkar,et al.  Data Space Randomization , 2008, DIMVA.

[43]  Mark Bickford,et al.  Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures , 2008, NSDI.

[44]  Stephen F. Siegel Verifying Parallel Programs with MPI-Spin , 2007, PVM/MPI.

[45]  Landon P. Cox,et al.  TightLip: Keeping Applications from Spilling the Beans , 2007, NSDI.

[46]  Karen Scarfone,et al.  Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.

[47]  David Evans,et al.  N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.

[48]  Kamran Sartipi,et al.  Dynamic Analysis of Software Systems using Execution Pattern Mining , 2006, 14th IEEE International Conference on Program Comprehension (ICPC'06).

[49]  Martín Abadi,et al.  Control-flow integrity , 2005, CCS '05.

[50]  Priya Narasimhan,et al.  Thema: Byzantine-fault-tolerant middleware for Web-service applications , 2005, 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05).

[51]  Robert C. Seacord,et al.  Secure coding in C and C , 2005 .

[52]  Jun Xu,et al.  Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.

[53]  George Bosilca,et al.  Open MPI: Goals, Concept, and Design of a Next Generation MPI Implementation , 2004, PVM/MPI.

[54]  Vikram S. Adve,et al.  LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..

[55]  Gregory A. Koenig,et al.  Cluster Security as a Unique Problem with Emergent Properties: Issues and Techniques , 2004 .

[56]  Angelos D. Keromytis,et al.  Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.

[57]  Nicholas Nethercote,et al.  Valgrind: A Program Supervision Framework , 2003, RV@CAV.

[58]  Niels Provos,et al.  Preventing Privilege Escalation , 2003, USENIX Security Symposium.

[59]  Crispin Cowan,et al.  Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[60]  Axelle Apvrille,et al.  Distributed Access Control for Carrier Class Clusters , 2003, PDPTA.

[61]  Michael M. Resch,et al.  MARMOT: An MPI Analysis and Checking Tool , 2003, PARCO.

[62]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[63]  David Evans,et al.  Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..

[64]  Bronis R. de Supinski,et al.  Dynamic Software Testing of MPI Applications with Umpire , 2000, ACM/IEEE SC 2000 Conference (SC'00).

[65]  K. Claessen,et al.  QuickCheck: a lightweight tool for random testing of Haskell programs , 2000, ICFP '00.

[66]  Naohiro Ishii,et al.  Analysis of software bug causes and its prevention , 1999, Inf. Softw. Technol..

[67]  Michael Hayden The Insider Threat to U.S. Government Information Systems , 1999 .

[68]  Crispan Cowan,et al.  StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.

[69]  Karl N. Levitt,et al.  Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[70]  Robert O. Hastings,et al.  Fast detection of memory leaks and access errors , 1991 .

[71]  Leslie Lamport,et al.  Time, clocks, and the ordering of events in a distributed system , 1978, CACM.

[72]  L.,et al.  SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .