Search results
- MD5 considered harmful today: Creating a rogue CA certificate, Alex Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David A Molnar, Dag Arne Osvik, Benne de Weger, 30, December, 2008
- Amending the ECPA to Enable a Culture of Cybersecurity Research, Aaron Burstein, Harvard Journal of Law & Technology, 22, 1, 167-222, December, 2008
- AMI System Security Requirements, Coalton Bennett, Bobby Brown, Brad Singletary, Darren Highfill, Doug Houseman, Frances Cleveland, Howard Lipson, James Ivers, Jeff Gooding, Jeremy McDonald, Neil Greenfield, Sharon Li, Utility Communication Architecture International User Group (UCAIUG), December, 2008
- Device driver safety through a reference validation mechanism, Fred Schneider, Dan Williams, Patrick Reynolds, Kevin Walsh & Emin Gun Sirer, Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation OSDI '08, December, 2008
- Hyperproperties, Fred Schneider, Michael R. Clarkson, Journal of Computer Security, December, 2008
- Characterization of the Critical Value for Kalman Filtering with Intermittent Observations, Y.Mo, B. Sinopoli, Proceedings of IEEE Conference on Decision and Control, December, 2008
- A One-shot Random Access Game for Wireless Networks – Behavior of Nodes at Nash Equilibria, Hazer Inaltekin, IEEE/ACM Transactions on Networking, December, 2008
- LQG Control Over Multi-Channel TCP-like Erasure Networks with Probabilistic Packet Acknowledgements, E. Garone, B. Sinopoli, A. Casavola, Proceedings of IEEE Conference on Decision and Control, December, 2008
- A Security Standard for AMI Smart Meters, Coalton Bennett, Stephen Wicker, Darren Highfill, IEEE Energy 2030 Proceedings, EnerNex Corporation & Team for Research in Ubiquitous Secure Technologies, 8, 17, November, 2008
- Comparison of Blackbox and Whitebox Fuzzers in Finding Software Bugs, Marjan Aslani, NGA CHUNG, Jason Doherty, Nichole Stockman, William Quach, 12, November, 2008
- Smoke and Mirrors: Shadowing Files at a Geographically Remote Location Without Loss of Performance, Hakim Weatherspoon, Lakshmi Ganesh, Tudor Marian, Mahesh Balakrishnan, Ken Birman, 12, November, 2008
- Programming with Live Distributed Objects, Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong Hoon Ahnn, 12, November, 2008
- Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications, David Brumley, Pongsin Poosankam, Dawn Song, Jiang Zheng, 12, November, 2008
- Quantitative Information Flow as Network Flow Capacity, Stephen McCamant, Michael D. Ernst, 12, November, 2008
- Verifiable Functional Purity in Java, Matthew Finifter, Adrian Mettler, Naveen Sastry, David Wagner, 12, November, 2008
- Verifying the Safety of User Pointer Dereferences, Suhabe Bugrara, Alex Aiken, 12, November, 2008
- An Algorithmic Approach to Authorization RulesConflict Resolution in Software Security, Weider D. Yu, Ellora Nayak, 12, November, 2008
- The TRUST-SCADA Experimental Testbed: Design and Experiments, Annarita Giani, Gabor Karsai, Aakash Shah, Bruno Sinopoli, Jon Wiley, 12, November, 2008
- The FBI and Emerging Threats of Computer Intrusions and Cyber Crime, Scott E. Augenbaum, 11, November, 2008
- Towards a Scalable System for Distributed Management of Private Information, Michael Siegenthaler, Ken Birman, 11, November, 2008
- Redundancy Minimizing Techniques for Robust Transmission in Wireless Networks, Anna Kacewicz, Stephen Wicker, 11, November, 2008
- A Model-Integrated Approach toImplementing Individualized Patient Care PlansBased on Guideline-Driven Clinical Decision Support and Process Management, Jason B. Martin, Janos L. Mathe, Peter Miller, Akos Ledeczi, Liza Weavind, Ann Miller, David J. Maron, Andras Nadas, Janos Sztipanovits, 11, November, 2008
- Integration of Clinical Workflows with Privacy Policies on a Common Semantic Domain, Jan Werner, Bradley Malin, Yonghwan Lee, Akos Ledeczi, Janos Sztipanovits, 11, November, 2008
- Automatic Detection of Policies from Electronic Medical Record Access Logs, John Paulett, Bradley Malin, 11, November, 2008
- Fault Tolerant Sensor Network Routing for Patient Monitoring, Shanshan Jiang, Annarita Giani, Allen Yang, Yuan Xue, Ruzena Bajcsy, 11, November, 2008
- DexterNet: An Open Platform for Heterogeneous Body Sensor Networks and Its Applications, Philip Kuryloski, Annarita Giani, Roberta Giannantonio, Katherine S. Gilani, Ville-Pekka Seppa , Edmund Seto , Raffaele Gravina , Victor Shia, Curtis Wang, Posu Yan, Allen Yang, Jari Hyttinen, Shankar Sastry, Stephen Wicker, Ruzena Bajcsy, 11, November, 2008
- An Intrusion Detection System for Wireless Process Control Systems, Adrian Lauf, Jon Wiley, Tanya Roosta, William H. Robinson, Gabor Karsai, 11, November, 2008
- Expressing and Enforcing Flow-Based Network Security Policies, Tim Hinrichs, Natasha Gude, Martin Casado, John C. Mitchell, Scott Shenker, 11, November, 2008
- Poster - Applying Policy-Based Intrusion Detection to SCADA Networks, Adrian Lauf, Tanya Roosta, Jon Wiley, William H. Robinson, Gabor Karsai, 11, November, 2008
- Secure Control and the Analysis of Denial of Service Attacks, Saurabh Amin, Alvaro Cardenas, Alex Bayen, Shankar Sastry, 11, November, 2008
- A Security Standard for Smart Power Meters, Coalton Bennett, Darren Highfill, Stephen Wicker, 11, November, 2008
- Detecting Forged TCP Reset Packets, Nicholas Weaver, Robin Sommer, Vern Paxson, 11, November, 2008
- Bootstrapping Trust in a 'Trusted' Platform, Bryan Parno, 11, November, 2008
- Applying policy-based intrusion detection to scada networks, Adrian Lauf, William H. Robinson, Gabor Karsai, Jon Wiley, Tanya Roosta, 11, November, 2008
- Online Information Security Education through Anchored Instruction, Eric Imsand, Larry Howard, Ken Pence, Mike Byers, Dipankar Dasgupta, 11, November, 2008
- Open Problems in the Security of Learning, Marco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony Joseph, Blaine Nelson, Benjamin I. Rubinstein, Udam Saini, Doug Tygar, 11, November, 2008
- On the Connectivity of Finite Wireless Networks with Multiple Base Stations, Sergio Bermudez, Stephen Wicker, 11, November, 2008
- STEEP - A Model-IntegratedClinical Information System Application, Janos Laszlo Mathe, Jason Martin, Peter Miller, Akos Ledeczi, Liza Weavind, Anne Miller, David Maron, Andras Nadas, Janos Sztipanovits, November, 2008
- A Model-Integrated Approach to Implementing Individualized Patient Care PlansBased on Guideline-Driven Clinical Decision Support and Process Management, Janos Laszlo Mathe, Jason Martin, Peter Miller, Liza Weavind, David Maron, Akos Ledeczi, Anne Miller, Andras Nadas, Janos Sztipanovits, November, 2008
- CyberRadar: A Regression Analysis Approach to the Identification of Cyber-Physical Mappings in Process Control Systems, Julian L. Rrushi, Kyoung-Don Kang, Proceedings of the IEEE/ACM Workshop on Embedded Systems Security, Catherine Gebotys, Dimitrios Serpanos, October, 2008
- Integration of Clinical Workflows with Privacy Policies on a Common Semantic Platform, Jan Werner, Bradley Malin, Yonghwan Lee, Akos Ledeczi, Janos Sztipanovits, 30, September, 2008
- A Model-Integrated Approach to Implementing Individualized Patient Care Plans Based on Guideline-Driven Clinical Decision Support and Process Management - A Progress Report, Jason Martin, Janos Laszlo Mathe, Peter Miller, Akos Ledeczi, Liza Weavind, Anne Miller, David Maron, Andras Nadas, Janos Sztipanovits, 30, September, 2008
- GAnGS: Gather, Authenticate 'n Group Securely, Chia-Hsin Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu, Proceedings of ACM Mobicom, September, 2008
- Supporting Large-scale Continuous Stream Datacenters via Pub/Sub Middleware and Adaptive Transport Protocols, Joe Hoffert, Douglas Schmidt, Mahesh Balakrishnan, Ken Birman, September, 2008
- LQG Control over Lossy TCP-like Networks with Probabilistic Packet Acknowledgements, E. Garone, B. Sinopoli, A. Casavola, The Forty-Sixth Annual Allerton Conference on Communication, Control, and Computing, September, 2008
- Supporting Large-scale Continuous Stream Datacenters via Pub/Sub, Joe Hoffert, Douglas Schmidt, Mahesh Balakrishnan, Ken Birman, Proceedings of the Large-Scale Distributed Systems and Middleware Workshop (LADIS 2008), September, 2008
- Optimal Sensor Density for Remote Estimation Over Wireless Sensor Networks, R. Ambrosino, B. Sinopoli, K. Poolla, S. Sastry, Proceedings of the Forty-Sixth Annual Allerton Conference on Communication, Control, and Computing, September, 2008
- Distributed Sensor Localization in Euclidean Spaces: Dynamic Environments, U. A. Khan, S. Kar, B. Sinopoli, J. M. F. Moura, Proceedings of the Forty-Sixth Annual Allerton Conference on Communication, Control, and Computing, September, 2008
- CITRIC: A LOW-BANDWIDTH WIRELESS CAMERA NETWORK PLATFORM, Phoebus Chen, Parvez Ahammad, Colby Boyer, Shih-I Huang, Leon Lin, Edgar Lobaton, Marci Meingast, Songhwai Oh, Simon Wang, Posu Yan, Allen Y. Yang, Chuohao Yeo, Lung-Chung Chang, J.D. Tygar, and S. Shankar Sastry, Proceedings of the 2nd ACM/IEEE International Conference on Distributed Smart Cameras, September, 2008
- Evading Anomaly Detection through Variance Injection Attacks on PCA, B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, N. Taft, and J. D. Tygar, September, 2008
- Integration of Clinical Workflows with Privacy Policies on a Common Semantic Platform, Jan Werner, Bradley Malin, Yonghwan Lee, Akos Ledeczi, Janos Sztipanovits, 2nd International Workshop on Model-Based Design of Trustworthy Health Information Systems, September, 2008
- TRUST 2nd 5-Year Strategic and Implementation Plan, Ruzena Bajcsy, Kristen Gates, Sigurd Meldal, John C. Mitchell, Deirdre Mulligan, Adrian Perrig, William H. Robinson, Larry Rohrbough, Shankar Sastry, Fred Schneider, Janos Sztipanovits, Doug Tygar, Stephen Wicker, TRUST Science & Technology Center, September, 2008
- A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance., C. Ni, T. Hsiang, J. D. Tygar, August, 2008
- Actuator Networks for Navigating an Unmonitored Mobile Robot., Jeremy Schiff, Anand Kulkarni, Danny Bazo, Vincent Duindam, Ron Alterovitz, Dezhen Song, Ken Goldberg, IEEE Conference on Automation Science and Engineering (CASE)., August, 2008
- Supporting Scalability and Adaptability via ADAptive Middleware And Network Transports (ADAMANT), Joe Hoffert, Douglas Schmidt, Mahesh Balakrishnan, Ken Birman, July, 2008
- An Algorithmic Approach to Authorization Rules Conflict Resolution in Software Security, Weider D. Yu, Ellora Nayak, Proceedings of the Thirty-second IEEE International Computer Software & Applications Conference(COMPSAC), IEEE Computer Society, 32-35, July, 2008
- SWOON: A Testbed for Secure Wireless Overlay Networks., Y.L. Huang, J.D. Tygar, H.Y. Lin, L.Y. Yeh, H.Y. Tsai, K. Sklower, S.P. Shieh, C.C. Wu, P.H. Lu, S.Y. Chien, Z.S. Lin, L.W. Hsu, C.W. Hsu, C.T. Hsu, Y.C. Wu, and M.S. Leong, Proceedings USENIX Workshop on Cyber Security and Test, July, 2008
- Security, Safety and Privacy – Pervasive Themes for Engineering Education, Sigurd Meldal, Kristen Gates, Russell Smith, Xiao Su, ICEE 2008, Geza Varady, iNEER, July, 2008
- • Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking., Michael Martin and Monica S. Lam., 17th USENIX Security Symposium, July, 2008
- A Web-Based Wireless Mobile System Design of Security and Privacy Framework for u-Healthcare, Weider D. Yu, Sriram Mudumbi, Roopa Gummadikayala, Proceedings of the 10th IEEE International Conference on e-Health Networking, Applications and Services(HEALTHCOM), IEEE Computer Society, July, 2008
- Security and Insurance Management in Networks with Heterogeneous Agents, J. Grossklags, N. Christin, J. Chuang, Proceedings of ACM E-Commerce Conference, July, 2008
- TRUST: A Collaborative Approach to Advancing Cyber Security Research and Development, Larry Rohrbough, 12, June, 2008
- Sound, Complete and Scalable Path-Sensitive Analysis, I. Dillig, T. Dillig, A. Aiken, Conference on Programming Language Design and Implementation, 270-280, June, 2008
- End-to-End Enforcement of Erasure and Declassification, Stephen Chong, Andrew C. Myers, Proceedings of the IEEE Computer Security Foundations Symposium, 98–111, June, 2008
- TRUST Annual Report 2007-2008, Faculty and Staff, Team for Research in Ubiquitous Secure Technology (TRUST), June, 2008
- Securing Nonintrusive Web Encryption through Information Flow, Lantian Zheng, Andrew C. Myers, June, 2008
- Secure Control: Towards Survivable Cyber-Physical Systems, Alvaro Cardenas, Saurabh Amin, Shankar Sastry, First International Workshop on Cyber-Physical Systems (WCPS2008), IEEE, June, 2008
- Perspectives: Improving SSH-style Host Authentication with Multi-path Network Probing, Dan Wendlandt, Dave Andersen, Adrian Perrig, USENIX Annual Technical Conference, June, 2008
- A New Outer Bound to the Capacity Region of Deterministic-Code Discrete Memoryless Arbitrary Varying General Broadcast Channel, Amin Aminzadeh Gohari, Venkatachalam Anantharam, UC Berkeley, UCB/EECS-2008-81, June, 2008
- Mechanisms to Provide Integrity in SCADA and PCS Devices, A. Shah, A. Perrig, B. Sinopoli, Proceedings of the International Workshop on Cyber-Physical Systems - Challenges and Applications (CPS-CA '08)., June, 2008
- Reconfiguration in Heterogeneous Mobile Wireless Sensor Networks, Mikhail Lisovich, Sergio Bermudez, Stephen Wicker, ISWPC 2008, May, 2008
- Verifying the Safety of User Pointer Dereferences., Suhabe Bugrara, Alex Aiken, IEEE Symposium on Security and Privacy, May, 2008
- Civitas: Toward a Secure Voting System, Andrew C. Myers, Michael Clarkson, Stephen Chong, IEEE Symposium on Security and Privacy, IEEE, 354-368, May, 2008
- Conducting Cybersecurity Research Legally and Ethically, Aaron Burstein, 15, April, 2008
- Trustworthy Conferencing via Domain-specific Modeling and Low Latency Reliable Protocols, Joe Hoffert, Douglas Schmidt, Mahesh Balakrishnan, Ken Birman, 3, April, 2008
- Experimental Platform for Model-Integrated Clinical Information Systems, Janos Laszlo Mathe, Jan Werner, Yonghwan Lee, Bradley Malin, Akos Ledeczi, John C. Mitchell, Janos Sztipanovits, 3, April, 2008
- Automated Whitebox Fuzz Testing, Patrice Godefroid, Michael Levin, David A Molnar, 3, April, 2008
- Securing Frame Communication in Browsers, Adam Barth, Collin Jackson, John C. Mitchell, 3, April, 2008
- Deploying Distributed Real-time Healthcare Applications on Wireless Body Sensor Networks, Allen Yang, Sameer Iyengar, Shanshan Jiang, Philip Kuryloski, Yanchuan Cao, Roozbeh Jafari, Yuan Xue, Ruzena Bajcsy, Stephen Wicker, Shankar Sastry, 3, April, 2008
- Flicker: An Execution Infrastructure for TCB Minimization, Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael Reiter, Hiroshi Isozaki, 3, April, 2008
- Write Markers for Probabilistic Quorum Systems, Michael Merideth, Michael Reiter, 3, April, 2008
- The Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks, Tanya Roosta, Sameer Pai, Phoebus Chen, Shankar Sastry, Stephen Wicker, 3, April, 2008
- A Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Networks, Adrian Lauf, Richard A. Peters, William H. Robinson, 3, April, 2008
- Maelstrom: An Enterprise Continuity Protocol for Financial Data Centers, Ken Birman, Mahesh Balakrishnan, Tudor Marian, Hakim Weatherspoon, 3, April, 2008
- Taking Advantage of Data Correlation to Control the Topology of Wireless Sensor Networks, Sergio Bermudez, Stephen Wicker, 3, April, 2008
- California Top-To-Bottom Review of Voting Systems, David Wagner, 3, April, 2008
- Power Consumption Monitoring - An Emerging Threat to Privacy, Mikhail Lisovich, Stephen Wicker, 3, April, 2008
- A Testbed for Secure and Robust SCADA Systems, Annarita Giani, Gabor Karsai, Tanya Roosta, Aakash Shah, Bruno Sinopoli, Jon Wiley, 3, April, 2008
- Detecting Data Leakage, Panagiotis Papadimitriou, Hector Garcia-Molina, 3, April, 2008
- Keynote Speech–California Top-To-Bottom Review of Voting Systems, David Wagner, 3, April, 2008
- Security Breach Notification Laws: A "Race-to-the-Top"?, Deirdre Mulligan, 3, April, 2008
- Effective Testing via Symbolic Execution and Input Recombination, Daniel Dunbar, Cristian Cadar, Peter Pawlowski, Dawson Engler, 3, April, 2008
- Experimental Platform for Model-Integrated Clinical Information Systems, Janos Laszlo Mathe, Jan Werner, Yonghwan Lee, Akos Ledeczi, Bradley Malin, Janos Sztipanovits, 2, April, 2008
- MICIS - A Model-IntegratedClinical Information System, Janos Laszlo Mathe, Jan Werner, Yonghwan Lee, Akos Ledeczi, Bradley Malin, Janos Sztipanovits, April, 2008
- Poster - Embeddable Hybrid Intrusion Detection System, Adrian Lauf, Richard A. Peters, William H. Robinson, April, 2008
- Maelstrom: Transparent Error Correction for Lambda Networks, Mahesh Balakrishnan, Tudor Marian, Ken Birman, Hakim Weatherspoon, Einar Vollset, 5th USENIX Symposium on Networked Systems Design and Implementation, April, 2008
- Secure or Insure? A Game-Theoretic Analysis of Information Security Games, J. Grossklags, N. Christin, J. Chuang, Proceedings of the 17th International World Wide Web Conference, April, 2008
- Exploiting machine learning to subvert your spam filter, B. Nelson, M. Barreno, F. Chi, A. D. Joseph, B. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and Kai Xia, Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, April, 2008
- Characterizing Botnets from Email Spam Records., L. Zhuang, J. Dunagan, D. Simon, H. Wang, I. Osipkov, G. Hulten and J. D. Tygar, Proceedings of First USENIX Workshop on Large Scale Exploits and Emergent Threats, April, 2008
- Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications, David Brumley, Pongsin Poosankam, Dawn Song, Jiang Zheng, 2008 IEEE Symposium on Security and Privacy,, April, 2008
- Privacy: Theory meets Practice on the Map., Johannes Gehrke, Daniel Kifer, Ashwin Machanavajjhala, John Abowd, Lars Vilhuber, International Conference on Data Engineering, Cornell University Comuputer Science Department, Cornell, USA, 10, April, 2008
- Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups, Cynthia Kuo, Ahren Studer, Adrian Perrig, ACM Conference on Wireless Network Security (WiSec), ACM, April, 2008
- Predicted and Observed User Behavior in the Weakest-Link Security Game, J. Grossklags, N. Christin, J. Chuang, Proceedings of the 2008 USENIX Workshop on Usability, Psychology, and Security, April, 2008
- Using Deception to Facilitate Intrusion Detection in Nuclear Power Plants, Julian L. Rrushi, Roy Campbell, 3rd International Conference on Information Warfare and Security, William Mahoney, Peter Kiewit Institute, University of Nebraska, Omaha, USA; Edwin Leigh Armistead, Edith Cowan University, Australia, Peter Kiewit Institute, University of Nebraska Omaha, USA, April, 2008
- Tradeoffs in Byzantine-Fault-Tolerant State-Machine-Replication Protocol Design, Michael Merideth, Institute for Software Research, Carnegie Mellon University, CMU-ISR-08-110, March, 2008
- Principled Reasoning and Practical Applications of Alert Fusion in Intrusion Detection Systems, Guofei Gu, Alvaro Cardenas, Wenke Lee, ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)., ACM, March, 2008
- Optimizing Redundancy Using MDS Codes and Dynamic Symbol Allocation in Mobile Ad Hoc Networks, Anna Kacewicz, Stephen Wicker, Proceedings of the 43rd Annual Conference on Information Sciences and Systems (CISS), Princeton University, March, 2008
- rivacy Concerns in Upcoming Residential and Commercial Demand-Response Systems, Mikhail Lisovich, Stephen Wicker, Clemson University Power Systems Conference, Clemson University, March, 2008
- Privacy Concerns in Upcoming Residential and Commercial Demand-Response Systems, Mikhail Lisovich, Stephen Wicker, 2008 Clemson University Power Systems Conference, Clemson University, March, 2008
- Residential Demand Response Wireless Sensor Network, Coalton Bennett, Judith Cardell, Stephen Wicker, Fourth Annual Carnegie Mellon Conference on the Electricity Industry, Carnegie Mellon University Department of Electrical Engineering, 5, March, 2008
- How Low Can You Go? Recommendations for Hardware-Supported Minimal TCB Code Execution, Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael Reiter, Arvind Seshadri, ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), ACM, March, 2008
- CareNet: An Integrated Wireless Sensor Networking Environment for Remote Healthcare, Shanshan Jiang, Yanchuan Cao, Philip Kuryloski, Roozbeh Jafari, Yuan Xue, Ruzena Bajcsy, Stephen Wicker, Sameer Iyengar, Third International Conference on Body Area Networks, ICST, March, 2008
- BitBlaze - Binary Analysis for COTS Protection and Malicious Code Defense, Prateek Saxena, Dawn Song, 21, February, 2008
- Traitor Tracing with Constant Size Ciphertext, D. Boneh, M. Naor, February, 2008
- Securing Web Applications Using Static and Dynamic Information Flow Tracking., M. Lam, M. Martin, B. Livshits, J. Whaley, January, 2008
- A Relaxation Approach to Dynamic Sensor Selection in Large-Scale Wireless Networks, E. Garone, B. Sinopoli, A. Goldsmith, and A. Casavola, Proceedings of the First International Workshop on Cyber-Physical Systems., January, 2008
- Privacy Decision Making in Administrative Agencies, Kenneth A. Bamberger, Deirdre Mulligan, Chicago Law Review, 75, 1, 75, January, 2008
- Detecting Attacks in Power Plant Interfacing Substations through Probabilistic Validation of Attack-Effect Bindings, Julian L. Rrushi, Roy H. Campbell, Proceedings of the SCADA Security Scientific Symposium 2008, Dale Peterson, 24, January, 2008
- Optimal ROC for a Combination of Classifiers, Marco Barreno, Alvaro Cardenas, Doug Tygar, Advances in Neural Information Processing Systems (NIPS) 20, 2008, January, 2008
- Active Property Checking, Patrice Godefroid, Michael Y. Levin, David A Molnar, EMSOFT, Association for Computing Machinery, 2008
- Automated Whitebox Fuzz Testing, Patrice Godefroid, Michael Y. Levin, David A Molnar, Network Distributed Security Symposium (NDSS), Internet Society, 2008
- Automatic Inference of Stationary Fields: a Generalization of Java's Final Fields, C. Unkel, M. Lam, 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (San Francisco, CA) ACM, 2008
- Model-based design of clinical information systems., Janos Laszlo Mathe, Jan Werner, Yonghwan Lee, Bradley Malin, Akos Ledeczi, Methods of Information in Medicine, 47, 5, 399-408, 2008
- • Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems, M. Chen, P. Subrahmanyam, C. Waldspurger, E. C. Lewis, Tal Garfinkel, D. Boneh, D. Ports, and J. Dwoskin, ASPLOS, 2008
- Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Networks, Adrian Lauf, William H. Robinson, Elsevier Journal of Ad Hoc Newtorks, 2008
- • Generalized Identity Based and Broadcast Encryption Schemes, D. Boneh, M. Hamburg, 2008
- • On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations, D. Boneh, A. Papakonstantinou, C. Rackoff, Y. Vahlis, and B. Waters, FOCS, 2008
- Attacking Path Explosion in Constraint-Based Test Generation, Cristian Cadar, Dawson Engler, Peter Boonstoppel, ETAPS Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2008) Budapest, Hungary, March-April 2008, 2008
- Link Privacy in Social Networks., A. Korolova, S. Nabar, Y. Xu, R. Motwani, Proceedings of the 21st International Conference on Data Engineering (ICDE), 2008
- Proceedings of the 17th Usenix Security Symposium, Michael Martin, Monica Lam, Automatic generation of XSS and SQL injection attacks with goal-directed model checking., 2008
- Gossip-based Distribution Estimation in, Maya Haridasan, Robbert van Renesse, 7th International Workshop on Peer-to-Peer Systems (IPTPS '08, 2008
- New Bounds on the Information-Theoretic Key Agreement of Multiple Terminals, Amin Aminzadeh Gohari, Venkatachalam Anantharam, To appear in ``Proceedings of the IEEE International Symposium on Information Theory", Toronto, Canada, 2008
- Information-Theoretic Key Agreement of Multiple Terminals - Part II: Channel Model, Amin Aminzadeh Gohari, Venkatachalam Anantharam, Submitted to ``IEEE Transactions on Information Theory", 2008
- Optimal ROC Curve for a Combination of Classifiers., Marco Barreno, Alvaro Cardenas, Doug Tygar, Advances in Neural Information Processing Systems (NIPS), MIT Press, 57-64, 2008
- Confidentiality in Sensor Networks: Transactional Information, Sameer Pai, Marci Meingast, Tanya Roosta, Sergio Bermudez, Stephen Wicker, Deirdre K. Mulligan, Shankar Sastry, IEEE Security and Privacy Magazine, 2008
- Open Problems in the Security of Learning., M. Barreno, P. Bartlett, F. Chi, A. Joseph, B. Nelson, B. Rubinstein, U. Saini, and J. D. Tygar, Proceedings of the First ACM Workshop on AISec, 2008
- Power Consumption Monitoring - an Emerging Threat to Privacy, Mikhail Lisovich, Stephen Wicker, 2008
- Game Theoretic Modeling of Trust in Networks of Bayesian-Learning Sensors, Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry, 2008
- Taking Advantage of Data Correlation to Control the Topology of Wireless Sensor Networks, Sergio Bermudez, Stephen Wicker, International Conference on Telecommunications, 2008
- On the Asymptotic Behavior of Selfish Transmitters Sharing a Common Wireless Communication Channel, Hazer Inaltekin, Mung Chiang, H. Vincent Poor, Stephen Wicker, IEEE ISIT 2008, 2008
- A Combined Localization and Geographic Routing Algorithm for Rapidly-Deployed Wireless Sensor Networks, Hui Qu, Stephen Wicker, International Journal of Distributed Sensor Networks, 4, 1, 44-63, 2008
- Co-designed anchor-free localization and location-based routing algorithm for rapidly-deployed wireless sensor networks, Hui Qu, Stephen Wicker, Information Fusion, 2008
- CareNet: An Integrated Wireless Sensor Networking Environment for Remote Healthcare, Shanshan Jiang, Yanchuan Cao, Sameer Iyengar, Philip Kuryloski, Roozbeh Jafari, Yuan Xue, Ruzena Bajcsy, Stephen Wicker, BodyNets, 2008
- DQML: A Modeling Language for Configuring Distributed Publish/Subscribe Quality of Service Policies, Joe Hoffert, Douglas Schmidt, Aniruddha Gokhale, Proceedings of the 10th International Symposium on Distributed Objects, Middleware, and Applications, 2008
- Information-Theoretic Key Agreement of Multiple Terminals - Part I: Source Model, Amin Aminzadeh Gohari, Venkatachalam Anantharam, Submitted to ``IEEE Transactions on Information Theory", 2008, 2008
- Predictive or Oblivious: A Comparative Study of Routing Strategies for Wireless Mesh Networks Under Uncertain Demand, Jonathan Wellons, Liang Dai, Yi Cui, Yuan Xue, The Fifth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, 2008
- Integrating Traffic Estimation and Routing Optimization for Multi-Radio Multi-Channel Wireless Mesh Networks, Liang Dai, Yuan Xue, Bin Chang, Yi Cui, IEEE INFOCOM, 2008
- Enforcing Fairness in a Live-Streaming System, Robbert van Renesse, Maya Haridasan, Ingrid Jansch-Porto, Multimedia Computing and Networking (MMCN 2008, 2008
- The Building Blocks of Consensus, Yee Jiun Song, Robbert van Renesse, Fred Schneider, Danny Dolev, 9th International Conference on Distributed Computing and Networking (ICDCN '08, 2008
- On the connectivity of finite wireless networks with multiple base stations, Sergio Bermudez, Stephen Wicker, International Conference on Computer Communications and Networks, 2008
- Programming with Live Distributed Objects, Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong Hoon Ahnn, 22nd European Conference on Object-Oriented Programming (ECOOP 2008, 2008
- QuickPay online payment protocol, Mark Stamp, Jian Dai, Proceedings of SEKE '08, 2008
- Quicksilver Scalable Multicast (QSM), Krzysztof Ostrowski, Ken Birman, Danny Dolev, 7th IEEE International Symposium on Network Computing and Applications (IEEE NCA 2008, 2008
- Exploiting Interference Diversity for Event-Based Spectrum Sensing, Arash Parsa, Amin Aminzadeh Gohari, Anant Sahai, 2008 IEEE Symposium on Dynamic Spectrum Access Networks (DySpAN)., 2008
- Memory Corruption Attacks, Defenses, and Evasions, Carlo Bellettini, Julian L. Rrushi, Jatinder N. D. Gupta, Sushil K. Sharma, 12, 139-151, 1st, Information Science, 2008
- Oblivious Routing for Wireless Mesh Networks, Jonathan Wellons, Yuan Xue, IEEE International Conference on Communications (ICC), 2008
- Minimum Disruption Service Composition and Recovery in Mobile Ad Hoc Networks, Shanshan Jiang, Yuan Xue, Douglas Schmidt, Computer Network Journal, Special Issue on Autonomic and Self-Organizing Systems, 2008
- A Model-Integrated Approach to Implementing Individualized Patient Care Plans Based on Guideline-Driven Clinical Decision Support and Process Management - A Progress Report, Jason Martin, Janos Laszlo Mathe, Peter Miller, Akos Ledeczi, Liza Weavind, Anne Miller, David Maron, Andras Nadas, Janos Sztipanovits, 2nd International Workshop on Model-Based Design of Trustworthy Health Information Systems MOTHIS 2008, 2008
- A Logic for Reasoning about Networked Secure Systems, Deepak Garg, Jason Franklin, Dilsun Kaynar, Anupam Datta, Joint Workshop FCS-ARSPA-WITS, 2008
- Secrecy Analysis in Protocol Composition Logic, A. Roy, A. Datta, A. Derek, J. C. Mitchell, J.P. Seifert, Formal Logical Methods for System Security and Correctness, IOS Press, 2008
- A Survey of Worm Detection and Containment, Pele Li, Mehdi Salour, Xiao Su, IEEE Communications Surveys and Tutorials, 10, 20-35, 2008
- Profile hidden Markov models and metamorphic virus detection, Mark Stamp, Srilatha Attaluri, Scott McGhee, Journal in Computer Virology, 2008
- Digital rights management for streaming media, Mark Stamp, Deepali Brahmbhatt, IGI Global, 2008
- Digital rights management for untrusted peer-to-peer networks, Mark Stamp, Pallavi Priyadarshini, IGI Global, 2008
- P2PTunes: A peer-to-peer digital rights management system, Mark Stamp, Ramya Venkataramu, IGI Global, 2008
- An agent-based privacy enhancing model, M. Stamp, H.-H. Lee, Information Management & Computer Security, 2008
- Formalizing the Structural Semantics of Domain-Specific Modeling Languages, Ethan Jackson, Janos Sztipanovits, Journal of Software and Systems Modeling, 2008
- Model-Based Design of Trustworthy Health Information Systems, Ruth Breu, Janos Sztipanovits, Elske Ammenwerth, Methods of Information in Medicine, 2008
- An Outer Bound to the Admissible Source Region of Discrete Memoryless Arbitrarily Varying General Broadcast Channels, Amin Aminzadeh Gohari, Venkatachalam Anantharam, ``Proceedings of the 46th Annual Allerton Conference on Communications, Control and Computing", Urbana, Illinois, September 23 -26, 2008, 2008
Found 169 publications.
Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.