ILR: Where'd my gadgets go? J Hiser, A Nguyen-Tuong, M Co, M Hall, JW Davidson 2012 IEEE Symposium on Security and Privacy, 571-585, 2012 | 323 | 2012 |
Zipr: Efficient static binary rewriting for security WH Hawkins, JD Hiser, M Co, A Nguyen-Tuong, JW Davidson 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 37 | 2017 |
Methods, systems and computer readable media for detecting command injection attacks A Nguyen-Tuong, JW Davidson, JD Hiser, JC Knight US Patent 9,635,033, 2017 | 34 | 2017 |
Method of instruction location randomization (ILR) and related system JD Hiser, A Nguyen-Tuong, JW Davidson US Patent 10,193,927, 2019 | 25 | 2019 |
Xandra: An autonomous cyber battle system for the Cyber Grand Challenge A Nguyen-Tuong, D Melski, JW Davidson, M Co, W Hawkins, JD Hiser, ... IEEE Security & Privacy 16 (2), 42-51, 2018 | 21 | 2018 |
Defense against stack-based attacks using speculative stack layout transformation BD Rodes, A Nguyen-Tuong, JD Hiser, JC Knight, M Co, JW Davidson Runtime Verification: Third International Conference, RV 2012, Istanbul …, 2013 | 19 | 2013 |
Zipr++ Exceptional Binary Rewriting J Hiser, A Nguyen-Tuong, W Hawkins, M McGill, M Co, J Davidson Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017 | 14 | 2017 |
Evaluating trace cache energy efficiency M Co, DAB Weikle, K Skadron ACM Transactions on Architecture and Code Optimization (TACO) 3 (4), 450-476, 2006 | 11 | 2006 |
Mixr: Flexible runtime rerandomization for binaries W Hawkins, A Nguyen-Tuong, JD Hiser, M Co, JW Davidson Proceedings of the 2017 Workshop on Moving Target Defense, 27-37, 2017 | 9 | 2017 |
Double Helix and RAVEN: a system for cyber fault tolerance and recovery M Co, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong, W Weimer, ... Proceedings of the 11th Annual Cyber and Information Security Research …, 2016 | 8 | 2016 |
A case study of security case development BD Rodes, JC Knight, A Nguyen-Tuong, JD Hiser, M Co, JW Davidson Engineering systems for safety, 187-204, 2015 | 8 | 2015 |
To B or not to B: blessing OS commands with software DNA shotgun sequencing A Nguyen-Tuong, JD Hiser, M Co, N Kennedy, D Melski, W Ella, D Hyde, ... 2014 Tenth European Dependable Computing Conference, 238-249, 2014 | 8 | 2014 |
Securing binary code W Hawkins, JD Hiser, A Nguyen-Tuong, JW Davidson IEEE Security & Privacy 15 (06), 77-81, 2017 | 6 | 2017 |
The effects of context switching on branch predictor performance M Co, K Skadron 2001 IEEE International Symposium on Performance Analysis of Systems and …, 2001 | 6 | 2001 |
PEASOUP: Preventing exploits against software of uncertain provenance (position paper) M Co, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong, D Cok, ... Proceedings of the 7th International Workshop on Software Engineering for …, 2011 | 4 | 2011 |
A framework for creating binary rewriting tools (short paper) JD Hiser, A Nguyen-Tuong, M Co, B Rodes, M Hall, CL Coleman, ... 2014 Tenth European Dependable Computing Conference, 142-145, 2014 | 3 | 2014 |
A lightweight software control system for cyber awareness and security M Co, CL Coleman, JW Davidson, S Ghosh, JD Hiser, JC Knight, ... 2009 2nd International Symposium on Resilient Control Systems, 19-24, 2009 | 3 | 2009 |
Online control adaptation for safe and secure autonomous vehicle operations M Elnaggar, JD Hiser, TX Lin, A Nguyen-Tuong, M Co, JW Davidson, ... 2017 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), 101-108, 2017 | 2 | 2017 |
Kevlar: Transitioning helix for research to practice JW Davison, JC Knight, JD Hiser, A Nguyen-Tuong | 1 | 2016 |
Designing energy-efficient fetch engines. M Co | | 2005 |