2008 |
73 | EE | Xiaoming Lu,
Matt Spear,
Karl N. Levitt,
Norman S. Matloff,
Shyhtsun Felix Wu:
Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks.
ICC 2008: 2309-2316 |
72 | EE | Xiaoming Lu,
Matt Spear,
Karl N. Levitt,
Shyhtsun Felix Wu:
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks.
INFOCOM 2008: 968-976 |
71 | EE | Senthilkumar G. Cheetancheri,
John Mark Agosta,
Karl N. Levitt,
Shyhtsun Felix Wu,
Jeff Rowe:
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
RAID 2008: 231-250 |
70 | EE | Xiaoming Lu,
Matt Spear,
Karl N. Levitt,
Norman S. Matloff,
Shyhtsun Felix Wu:
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols.
SECURWARE 2008: 403-411 |
2007 |
69 | EE | Lynette Qu Nguyen,
Tufan Demir,
Jeff Rowe,
Francis Hsu,
Karl N. Levitt:
A framework for diversifying windows native APIs to tolerate code injection attacks.
ASIACCS 2007: 392-394 |
68 | EE | Chinyang Henry Tseng,
Shiau-Huey Wang,
Karl N. Levitt:
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET.
ASIACCS 2007: 395-397 |
67 | EE | Cynthia E. Irvine,
Karl N. Levitt:
Trusted Hardware: Can It Be Trustworthy?
DAC 2007: 1-4 |
66 | EE | Shiau-Huey Wang,
Chinyang Henry Tseng,
Karl N. Levitt,
Matthew Bishop:
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks.
RAID 2007: 127-145 |
2006 |
65 | EE | Ebrima N. Ceesay,
Jingmin Zhou,
Michael Gertz,
Karl N. Levitt,
Matt Bishop:
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs.
DIMVA 2006: 1-16 |
64 | EE | Senthilkumar G. Cheetancheri,
Denys L. Ma,
Karl N. Levitt,
Todd L. Heberlein:
Towards a framework for worm-defense evaluation.
IPCCC 2006 |
63 | EE | Rick Crawford,
Matt Bishop,
Bhume Bhumiratana,
Lisa Clark,
Karl N. Levitt:
Sanitization models and their limitations.
NSPW 2006: 41-56 |
62 | EE | Chinyang Henry Tseng,
Shiau-Huey Wang,
Calvin Ko,
Karl N. Levitt:
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET.
RAID 2006: 249-271 |
61 | EE | Matt Bishop,
Rick Crawford,
Bhume Bhumiratana,
Lisa Clark,
Karl N. Levitt:
Some Problems in Sanitizing Network Data.
WETICE 2006: 307-312 |
2005 |
60 | EE | Tao Song,
Calvin Ko,
Chinyang Henry Tseng,
Poornima Balasubramanyam,
Anant Chaudhary,
Karl N. Levitt:
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.
Formal Aspects in Security and Trust 2005: 16-33 |
59 | | Daniel F. Sterne,
Poornima Balasubramanyam,
David Carman,
Brett Wilson,
Rajesh Talpade,
Calvin Ko,
Ravindra Balupari,
Chin-Yang Tseng,
Thomas F. Bowen,
Karl N. Levitt,
Jeff Rowe:
A General Cooperative Intrusion Detection Architecture for MANETs.
IWIA 2005: 57-70 |
58 | EE | Chinyang Henry Tseng,
Tao Song,
Poornima Balasubramanyam,
Calvin Ko,
Karl N. Levitt:
A Specification-Based Intrusion Detection Model for OLSR.
RAID 2005: 330-350 |
2004 |
57 | EE | Archana Pasupulati,
Jason Coit,
Karl N. Levitt,
Shyhtsun Felix Wu,
S. H. Li,
J. C. Kuo,
K. P. Fan:
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities.
NOMS (1) 2004: 235-248 |
56 | EE | Tao Song,
Calvin Ko,
Jim Alves-Foss,
Cui Zhang,
Karl N. Levitt:
Formal Reasoning About Intrusion Detection Systems.
RAID 2004: 278-295 |
55 | EE | Matt Bishop,
Bhume Bhumiratana,
Rick Crawford,
Karl N. Levitt:
How to Sanitize Data.
WETICE 2004: 217-222 |
54 | EE | Phillip A. Porras,
Linda Briesemeister,
Keith Skinner,
Karl N. Levitt,
Jeff Rowe,
Yu-Cheng Allen Ting:
A hybrid quarantine defense.
WORM 2004: 73-82 |
53 | EE | Ruzena Bajcsy,
Terry Benzel,
Matt Bishop,
Robert Braden,
Carla E. Brodley,
Sonia Fahmy,
Sally Floyd,
W. Hardaker,
Anthony D. Joseph,
George Kesidis,
Karl N. Levitt,
Robert Lindell,
Peng Liu,
David Miller,
Russ Mundy,
Cliford Neuman,
Ron Ostrenga,
Vern Paxson,
Phillip A. Porras,
Catherine Rosenberg,
J. Doug Tygar,
Shankar Sastry,
Daniel F. Sterne,
Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation.
Commun. ACM 47(3): 58-61 (2004) |
2003 |
52 | EE | Tye Stallard,
Karl N. Levitt:
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking.
ACSAC 2003: 160-169 |
51 | EE | D. Nojiri,
Jeff Rowe,
Karl N. Levitt:
Cooperative Response Strategies for Large Scale Attack Mitigation.
DISCEX (1) 2003: 293-302 |
50 | EE | Calvin Ko,
Karl N. Levitt:
System Health and Intrusion Monitoring (SHIM): Project Summary.
DISCEX (2) 2003: 202-207 |
49 | | Melissa Danforth,
Karl N. Levitt:
Immune System Model for Detecting Web Server Attacks.
ICMLA 2003: 161-167 |
48 | EE | Marcus Tylutki,
Karl N. Levitt:
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller.
RAID 2003: 1-16 |
47 | EE | Ivan Balepin,
Sergei Maltsev,
Jeff Rowe,
Karl N. Levitt:
Using Specification-Based Intrusion Detection for Automated Response.
RAID 2003: 136-154 |
46 | EE | Chin-Yang Tseng,
Poornima Balasubramanyam,
Calvin Ko,
Rattapon Limprasittiporn,
Jeff Rowe,
Karl N. Levitt:
A specification-based intrusion detection system for AODV.
SASN 2003: 125-134 |
2002 |
45 | EE | Dustin Lee,
Jeff Rowe,
Calvin Ko,
Karl N. Levitt:
Detecting and Defending against Web-Server Fingerprinting.
ACSAC 2002: 321-332 |
44 | EE | Karl N. Levitt:
Intrusion Detection: Current Capabilities and Future Directions.
ACSAC 2002: 365-370 |
43 | EE | James C. Reynolds,
James E. Just,
Ed Lawson,
Larry A. Clough,
Ryan Maglich,
Karl N. Levitt:
The Design and Implementation of an Intrusion Tolerant System.
DSN 2002: 285-292 |
42 | EE | James E. Just,
James C. Reynolds,
Larry A. Clough,
Melissa Danforth,
Karl N. Levitt,
Ryan Maglich,
Jeff Rowe:
Learning Unknown Attacks - A Start.
RAID 2002: 158-176 |
2001 |
41 | EE | Calvin Ko,
Paul Brutch,
Jeff Rowe,
Guy Tsafnat,
Karl N. Levitt:
System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Recent Advances in Intrusion Detection 2001: 190-204 |
2000 |
40 | | Christina Yip Chung,
Michael Gertz,
Karl N. Levitt:
Discovery of Multi-Level Security Policies.
DBSec 2000: 173-184 |
39 | EE | Steven Cheung,
Karl N. Levitt:
A Formal-Specification Based Approach for Protecting the Domain Name System.
DSN 2000: 641- |
38 | EE | Richard J. Feiertag,
Stuart Staniford-Chen,
Karl N. Levitt,
Mark Heckman,
Dave Peticolas,
Rick Crawford,
Lee Benzinger,
Sue Rho,
Stephen Wu:
Intrusion detection inter-component adaptive negotiation.
Computer Networks 34(4): 605-621 (2000) |
1999 |
37 | | Christina Yip Chung,
Michael Gertz,
Karl N. Levitt:
DEMIDS: A Misuse Detection System for Database Systems.
IICIS 1999: 159-178 |
36 | EE | Richard J. Feiertag,
Stuart Staniford-Chen,
Karl N. Levitt,
Mark Heckman,
Dave Peticolas,
Rick Crawford,
Lee Benzinger,
Sue Rho,
Stephen Wu:
Intrusion Detection Inter-component Adaptive Negotiation.
Recent Advances in Intrusion Detection 1999 |
35 | EE | Christina Yip Chung,
Michael Gertz,
Karl N. Levitt:
Misuse Detection in Database Systems Through User Profiling.
Recent Advances in Intrusion Detection 1999 |
34 | | Cui Zhang,
Brian R. Becker,
Dave Peticolas,
Ronald A. Olsson,
Karl N. Levitt:
LVT: A Layered Verification Technique for Distributed Computing Systems.
Softw. Test., Verif. Reliab. 9(2): 107-133 (1999) |
33 | EE | Cui Zhang,
Ronald A. Olsson,
Karl N. Levitt:
Formal Verification of a Programming Logic for a Distributed Programming Language.
Theor. Comput. Sci. 216(1-2): 213-235 (1999) |
1998 |
32 | EE | Raymond W. Yip,
Karl N. Levitt:
Data Level Inference Detection in Database Systems.
CSFW 1998: 179-189 |
31 | | Raymond W. Yip,
Karl N. Levitt:
The Design and Implementation of a Data Level Database Inference Detection System.
DBSec 1998: 253-266 |
30 | EE | Mark Heckman,
Karl N. Levitt:
Applying the Composition Principle to Verify a Hierarchy of Security Servers.
HICSS (3) 1998: 338-347 |
29 | EE | James A. Hoagland,
Raju Pandey,
Karl N. Levitt:
Security Policy Specification Using a Graphical Approach
CoRR cs.CR/9809124: (1998) |
1997 |
28 | EE | Cui Zhang,
Brian R. Becker,
Dave Peticolas,
Mark Heckman,
Karl N. Levitt,
Ronald A. Olsson:
Verification of a Distributed Computing.
HICSS (5) 1997: 252-261 |
27 | EE | Calvin Ko,
Manfred Ruschitzka,
Karl N. Levitt:
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
IEEE Symposium on Security and Privacy 1997: 175-187 |
26 | | Raymond W. Lo,
Karl N. Levitt,
Ronald A. Olsson:
Validation of Array Accesses: Integration of Flow Analysis and Program Verification Techniques.
Softw. Test., Verif. Reliab. 7(4): 201-227 (1997) |
1996 |
25 | | Mark Heckman,
Cui Zhang,
Brian R. Becker,
Dave Peticolas,
Karl N. Levitt,
Ronald A. Olsson:
Towards Applying the Composition Principle to Verify a Microkernel Operating System.
TPHOLs 1996: 235-250 |
1995 |
24 | | Cui Zhang,
Brian R. Becker,
Mark Heckman,
Karl N. Levitt,
Ronald A. Olsson:
A Hierarchical Method for Reasoning about Distributed Programming Languages.
TPHOLs 1995: 385-400 |
23 | EE | Raymond W. Lo,
Karl N. Levitt,
Ronald A. Olsson:
MCF: a malicious code filter.
Computers & Security 14(6): 541-566 (1995) |
1993 |
22 | EE | Calvin Ko,
Deborah A. Frincke,
Terrance Goan,
Todd L. Heberlein,
Karl N. Levitt,
Biswanath Mukherjee,
Christopher Wee:
Analysis of an Algorithm for Distributed Recognition and Accountability.
ACM Conference on Computer and Communications Security 1993: 154-164 |
21 | | Tej Arora,
Tony Leung,
Karl N. Levitt,
E. Thomas Schubert,
Phillip J. Windley:
Report on the UCD Microcoded Viper Verification Project.
HUG 1993: 239-252 |
20 | | Cui Zhang,
Robert J. Shaw,
Ronald A. Olsson,
Karl N. Levitt,
Myla Archer,
Mark Heckman,
Gregory D. Benson:
Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL.
HUG 1993: 29-42 |
1992 |
19 | | Myla Archer,
Jeffrey J. Joyce,
Karl N. Levitt,
Phillip J. Windley:
Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, August 1991, Davis, California, USA
IEEE Computer Society 1992 |
18 | | William L. Harrison,
Myla Archer,
Karl N. Levitt:
A HOL Mechanisation of the Axiomatic Semantics of a Simple Distributed Programming Language.
TPHOLs 1992: 347-356 |
17 | | Saraswati Kalvala,
Myla Archer,
Karl N. Levitt:
Implementation and Use of Annotations in HOL.
TPHOLs 1992: 407-426 |
16 | | Jing Pan,
Karl N. Levitt,
Myla Archer,
Saraswati Kalvala:
Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit.
TPHOLs 1992: 427-447 |
1991 |
15 | | Jim Alves-Foss,
Karl N. Levitt:
Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components.
IEEE Symposium on Security and Privacy 1991: 122-135 |
14 | | Deborah A. Frincke,
Myla Archer,
Karl N. Levitt:
CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms.
KBSE 1991: 151-160 |
13 | | William L. Harrison,
Karl N. Levitt:
Mechanizing Security in HOL.
TPHOLs 1991: 63-66 |
1990 |
12 | | L. Todd Herberlein,
Gihan V. Dias,
Karl N. Levitt,
Biswanath Mukherjee,
Jeff Wood,
David Wolber:
A Network Security Monitor.
IEEE Symposium on Security and Privacy 1990: 296-305 |
1979 |
11 | | Karl N. Levitt,
Lawrence Robinson,
Brad A. Silverberg:
Writing Simulatable Specifications in SPECIAL.
The Use of Formal Specification of Software 1979: 39-78 |
1978 |
10 | | Jay M. Spitzen,
Karl N. Levitt,
Lawrence Robinson:
An Example of Hierarchical Design and Proof.
Commun. ACM 21(12): 1064-1075 (1978) |
1977 |
9 | | Richard J. Feiertag,
Karl N. Levitt,
Lawrence Robinson:
Proving Multilevel Security of a System Design.
SOSP 1977: 57-65 |
8 | | Lawrence Robinson,
Karl N. Levitt:
Proof Techniques for Hierarchically Structured Programs.
Commun. ACM 20(4): 271-283 (1977) |
1976 |
7 | | Peter G. Neumann,
Richard J. Feiertag,
Karl N. Levitt,
Lawrence Robinson:
Software Development and Proofs of Multi-Level Security.
ICSE 1976: 421-428 |
6 | | John H. Wensley,
Milton W. Green,
Karl N. Levitt,
Robert E. Shostak:
The Design, Analysis, and Verification of the SIFT Fault-Tolerant System.
ICSE 1976: 458-469 |
1974 |
5 | | Richard J. Waldinger,
Karl N. Levitt:
Reasoning about Programs.
Artif. Intell. 5(3): 235-316 (1974) |
1973 |
4 | | Richard J. Waldinger,
Karl N. Levitt:
Reasoning About Programs.
POPL 1973: 169-182 |
1972 |
3 | | Bernard Elspas,
Karl N. Levitt,
Richard J. Waldinger,
Abraham Waksman:
An Assessment of Techniques for Proving Program Correctness.
ACM Comput. Surv. 4(2): 97-147 (1972) |
2 | | Karl N. Levitt,
William H. Kautz:
Cellular Arrays for the Solution of Graph Problems.
Commun. ACM 15(9): 789-801 (1972) |
1968 |
1 | EE | Karl N. Levitt,
Milton W. Green,
Jack Goldberg:
A study of the data commutation problems in a self-repairable multiprocessor.
AFIPS Spring Joint Computing Conference 1968: 515-527 |