2008 | ||
---|---|---|
3 | EE | Chetan Parampalli, R. Sekar, Rob Johnson: A practical mimicry attack against powerful system-call monitors. ASIACCS 2008: 156-167 |
2007 | ||
2 | EE | David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin: RICH: Automatically Protecting Against Integer-Based Vulnerabilities. NDSS 2007 |
1995 | ||
1 | EE | Krysia Broda, Marcello D'Agostino, Rajeev Goré, Rob Johnson, Steve Reeves: Editorial. Logic Journal of the IGPL 3(6): 826 (1995) |
1 | Krysia Broda | [1] |
2 | David Brumley | [2] |
3 | Tzi-cker Chiueh | [2] |
4 | Marcello D'Agostino | [1] |
5 | Rajeev Goré | [1] |
6 | Huijia Lin | [2] |
7 | Chetan Parampalli | [3] |
8 | Steve Reeves | [1] |
9 | R. Sekar | [3] |
10 | Dawn Xiaodong Song | [2] |