The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jonathon T. Giffin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger
    Strengthening Software Self-Checksumming via Self-Modifying Code. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:23-32 [Conf]
  2. Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd
    An auctioning reputation system based on anomaly. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:270-279 [Conf]
  3. Jonathon T. Giffin, Somesh Jha, Barton P. Miller
    Efficient Context-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  4. Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
    Environment-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:185-206 [Conf]
  5. Jonathon T. Giffin, Somesh Jha, Barton P. Miller
    Automated Discovery of Mimicry Attacks. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:41-60 [Conf]
  6. Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller
    Formalizing Sensitivity in Static Analysis for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:194-0 [Conf]
  7. Jonathon T. Giffin, Somesh Jha, Barton P. Miller
    Detecting Manipulated Remote Call Streams. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:61-79 [Conf]
  8. Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee
    Understanding Precision in Host Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:21-41 [Conf]

  9. Robust signatures for kernel data structures. [Citation Graph (, )][DBLP]


  10. Evaluating email's feasibility for botnet command and control. [Citation Graph (, )][DBLP]


  11. Impeding Malware Analysis Using Conditional Code Obfuscation. [Citation Graph (, )][DBLP]


  12. Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. [Citation Graph (, )][DBLP]


  13. System Call API Obfuscation (Extended Abstract). [Citation Graph (, )][DBLP]


  14. Automatic Discovery of Parasitic Malware. [Citation Graph (, )][DBLP]


  15. Automatic Reverse Engineering of Malware Emulators. [Citation Graph (, )][DBLP]


  16. Security Analysis of an IP Phone: Cisco 7960G. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002