2009 |
11 | EE | Jay Ligatti,
Lujo Bauer,
David Walker:
Run-Time Enforcement of Nonsafety Policies.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2007 |
10 | EE | Frances Perry,
Lester W. Mackey,
George A. Reis,
Jay Ligatti,
David I. August,
David Walker:
Fault-tolerant typed assembly language.
PLDI 2007: 42-53 |
2006 |
9 | EE | David Walker,
Lester W. Mackey,
Jay Ligatti,
George A. Reis,
David I. August:
Static typing for a faulty lambda calculus.
ICFP 2006: 38-49 |
8 | EE | Jay Ligatti,
David Walker,
Steve Zdancewic:
A type-theoretic interpretation of pointcuts and advice.
Sci. Comput. Program. 63(3): 240-266 (2006) |
2005 |
7 | EE | Martín Abadi,
Mihai Budiu,
Úlfar Erlingsson,
Jay Ligatti:
Control-flow integrity.
ACM Conference on Computer and Communications Security 2005: 340-353 |
6 | EE | Jay Ligatti,
Lujo Bauer,
David Walker:
Enforcing Non-safety Security Policies with Program Monitors.
ESORICS 2005: 355-373 |
5 | EE | Martín Abadi,
Mihai Budiu,
Úlfar Erlingsson,
Jay Ligatti:
A Theory of Secure Control Flow.
ICFEM 2005: 111-124 |
4 | EE | Lujo Bauer,
Jay Ligatti,
David Walker:
Composing security policies with polymer.
PLDI 2005: 305-314 |
3 | EE | Jay Ligatti,
Lujo Bauer,
David Walker:
Edit automata: enforcement mechanisms for run-time security policies.
Int. J. Inf. Sec. 4(1-2): 2-16 (2005) |
2003 |
2 | EE | David Walker,
Steve Zdancewic,
Jay Ligatti:
A theory of aspects.
ICFP 2003: 127-139 |
2002 |
1 | EE | Lujo Bauer,
Jarred Ligatti,
David Walker:
Types and Effects for Non-interfering Program Monitors.
ISSS 2002: 154-171 |