|
Search the dblp DataBase
Jonathon T. Giffin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger
Strengthening Software Self-Checksumming via Self-Modifying Code. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:23-32 [Conf]
- Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd
An auctioning reputation system based on anomaly. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:270-279 [Conf]
- Jonathon T. Giffin, Somesh Jha, Barton P. Miller
Efficient Context-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
Environment-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:185-206 [Conf]
- Jonathon T. Giffin, Somesh Jha, Barton P. Miller
Automated Discovery of Mimicry Attacks. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:41-60 [Conf]
- Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller
Formalizing Sensitivity in Static Analysis for Intrusion Detection. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2004, pp:194-0 [Conf]
- Jonathon T. Giffin, Somesh Jha, Barton P. Miller
Detecting Manipulated Remote Call Streams. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2002, pp:61-79 [Conf]
- Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee
Understanding Precision in Host Based Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2007, pp:21-41 [Conf]
Robust signatures for kernel data structures. [Citation Graph (, )][DBLP]
Evaluating email's feasibility for botnet command and control. [Citation Graph (, )][DBLP]
Impeding Malware Analysis Using Conditional Code Obfuscation. [Citation Graph (, )][DBLP]
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. [Citation Graph (, )][DBLP]
System Call API Obfuscation (Extended Abstract). [Citation Graph (, )][DBLP]
Automatic Discovery of Parasitic Malware. [Citation Graph (, )][DBLP]
Automatic Reverse Engineering of Malware Emulators. [Citation Graph (, )][DBLP]
Security Analysis of an IP Phone: Cisco 7960G. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|