2005 |
17 | EE | Richard Clayton,
Drew Dean,
Markus Jakobsson,
Steven Myers,
Stuart G. Stubblebine,
Michael Szydlo:
A Chat at the Old Phishin' Hole.
Financial Cryptography 2005: 88 |
2004 |
16 | EE | Ajay Chander,
Drew Dean,
John C. Mitchell:
A Distributed High Assurance Reference Monitor.
ISC 2004: 231-244 |
15 | EE | Hao Chen,
Drew Dean,
David Wagner:
Model Checking One Million Lines of C Code.
NDSS 2004 |
14 | EE | Drew Dean,
Alan J. Hu:
Fixing Races for Fun and Profit: How to Use access(2).
USENIX Security Symposium 2004: 195-206 |
13 | | Ajay Chander,
Drew Dean,
John C. Mitchell:
Reconstructing Trust Management.
Journal of Computer Security 12(1): 131-164 (2004) |
2002 |
12 | EE | Jessica Staddon,
Sara K. Miner,
Matthew K. Franklin,
Dirk Balfanz,
Michael Malkin,
Drew Dean:
Self-Healing Key Distribution with Revocation.
IEEE Symposium on Security and Privacy 2002: 241-257 |
11 | EE | Hao Chen,
David Wagner,
Drew Dean:
Setuid Demystified.
USENIX Security Symposium 2002: 171-190 |
10 | EE | Drew Dean,
Matthew K. Franklin,
Adam Stubblefield:
An algebraic approach to IP traceback.
ACM Trans. Inf. Syst. Secur. 5(2): 119-137 (2002) |
2001 |
9 | EE | Ajay Chander,
John C. Mitchell,
Drew Dean:
A State-Transition Model of Trust Management and Access Control.
CSFW 2001: 27-43 |
8 | EE | David Wagner,
Drew Dean:
Intrusion Detection via Static Analysis.
IEEE Symposium on Security and Privacy 2001: 156- |
7 | EE | Drew Dean,
Matthew K. Franklin,
Adam Stubblefield:
An Algebraic Approach to IP Traceback.
NDSS 2001 |
6 | EE | Tom Berson,
Drew Dean,
Matthew K. Franklin,
Diana K. Smetters,
Mike Spreitzer:
Cryptology As a Network Service.
NDSS 2001 |
2000 |
5 | EE | Dirk Balfanz,
Drew Dean,
Mike Spreitzer:
A Security Infrastructure for Distributed Java Applications.
IEEE Symposium on Security and Privacy 2000: 15-26 |
1997 |
4 | EE | Drew Dean:
The Security of Static Typing with Dynamic Linking.
ACM Conference on Computer and Communications Security 1997: 18-27 |
3 | EE | Marvin Schaefer,
Sylvan Pinsky,
Drew Dean,
Li Gong,
Jim Roskind,
Barbara Fox:
Ensuring Assurance in Mobile Computing.
IEEE Symposium on Security and Privacy 1997: 114-118 |
2 | | Dan S. Wallach,
Dirk Balfanz,
Drew Dean,
Edward W. Felten:
Extensible Security Architecture for Java.
SOSP 1997: 116-128 |
1996 |
1 | EE | Drew Dean,
Edward W. Felten,
Dan S. Wallach:
Java Security: From HotJava to Netscape and Beyond.
IEEE Symposium on Security and Privacy 1996: 190-200 |