2008 |
12 | EE | Kapil Singh,
Abhinav Srivastava,
Jonathon T. Giffin,
Wenke Lee:
Evaluating email's feasibility for botnet command and control.
DSN 2008: 376-385 |
11 | EE | Italo Dacosta,
Neel Mehta,
Evan Metrock,
Jonathon T. Giffin:
Security Analysis of an IP Phone: Cisco 7960G.
IPTComm 2008: 236-255 |
10 | EE | Abhinav Srivastava,
Jonathon T. Giffin:
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections.
RAID 2008: 39-58 |
9 | EE | Abhinav Srivastava,
Andrea Lanzi,
Jonathon T. Giffin:
System Call API Obfuscation (Extended Abstract).
RAID 2008: 421-422 |
2007 |
8 | EE | Monirul I. Sharif,
Kapil Singh,
Jonathon T. Giffin,
Wenke Lee:
Understanding Precision in Host Based Intrusion Detection.
RAID 2007: 21-41 |
2006 |
7 | EE | Jonathon T. Giffin,
Somesh Jha,
Barton P. Miller:
Automated Discovery of Mimicry Attacks.
RAID 2006: 41-60 |
2005 |
6 | EE | Shai Rubin,
Mihai Christodorescu,
Vinod Ganapathy,
Jonathon T. Giffin,
Louis Kruger,
Hao Wang,
Nicholas Kidd:
An auctioning reputation system based on anomaly.
ACM Conference on Computer and Communications Security 2005: 270-279 |
5 | EE | Jonathon T. Giffin,
Mihai Christodorescu,
Louis Kruger:
Strengthening Software Self-Checksumming via Self-Modifying Code.
ACSAC 2005: 23-32 |
4 | EE | Jonathon T. Giffin,
David Dagon,
Somesh Jha,
Wenke Lee,
Barton P. Miller:
Environment-Sensitive Intrusion Detection.
RAID 2005: 185-206 |
2004 |
3 | EE | Henry Hanping Feng,
Jonathon T. Giffin,
Yong Huang,
Somesh Jha,
Wenke Lee,
Barton P. Miller:
Formalizing Sensitivity in Static Analysis for Intrusion Detection.
IEEE Symposium on Security and Privacy 2004: 194- |
2 | EE | Jonathon T. Giffin,
Somesh Jha,
Barton P. Miller:
Efficient Context-Sensitive Intrusion Detection.
NDSS 2004 |
2002 |
1 | EE | Jonathon T. Giffin,
Somesh Jha,
Barton P. Miller:
Detecting Manipulated Remote Call Streams.
USENIX Security Symposium 2002: 61-79 |