Anh Nguyen-Tuong

Affiliations:
  • University of Virginia, VA, USA


According to our database1, Anh Nguyen-Tuong authored at least 45 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Zipr: A High-Impact, Robust, Open-source, Multi-platform, Static Binary Rewriter.
CoRR, 2023

Artifact: Measuring and Mitigating Gaps in Structural Testing.
CoRR, 2023

Helix++: A platform for efficiently securing software.
CoRR, 2023

Measuring and Mitigating Gaps in Structural Testing.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

2021
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing.
Proceedings of the 30th USENIX Security Symposium, 2021

BigMap: Future-proofing Fuzzers with Efficient Large Maps.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2019
MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Cubismo: decloaking server-side malware via cubist program analysis.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge.
IEEE Secur. Priv., 2018

2017
Securing Binary Code.
IEEE Secur. Priv., 2017

Zipr: Efficient Static Binary Rewriting for Security.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Zipr++: Exceptional Binary Rewriting.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

Mixr: Flexible Runtime Rerandomization for Binaries.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

Online control adaptation for safe and secure autonomous vehicle operations.
Proceedings of the 2017 NASA/ESA Conference on Adaptive Hardware and Systems, 2017

2016
Diversity in Cybersecurity.
Computer, 2016

A System for the Security Protection of Embedded Binary Programs.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing.
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

A Framework for Creating Binary Rewriting Tools (Short Paper).
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

2013
Moving Target Defenses in the Helix Self-Regenerative Architecture.
Proceedings of the Moving Target Defense II, 2013

2012
ILR: Where'd My Gadgets Go?
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Defense against Stack-Based Attacks Using Speculative Stack Layout Transformation.
Proceedings of the Runtime Verification, Third International Conference, 2012

2011
Effectiveness of Moving Target Defenses.
Proceedings of the Moving Target Defense, 2011

PEASOUP: preventing exploits against software of uncertain provenance (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

Component-Oriented Monitoring of Binaries for Security.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
On the effectiveness of the metamorphic shield.
Proceedings of the Software Architecture, 4th European Conference, 2010

2009
Security through Diversity: Leveraging Virtual Machine Technology.
IEEE Secur. Priv., 2009

2008
Security through redundant data diversity.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections.
Proceedings of the High Performance Computing and Communications, 2007

Meeting virtual organization performance goals through adaptive grid reconfiguration.
Proceedings of the 8th IEEE/ACM International Conference on Grid Computing (GRID 2007), 2007

2006
Secure and practical defense against code-injection attacks using software dynamic translation.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

2005
Automatically Hardening Web Applications Using Precise Tainting.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

The Development of Dependable and Survivable Grids.
Proceedings of the Computational Science, 2005

2003
Support for extensibility and site autonomy in the Legion grid system object model.
J. Parallel Distributed Comput., 2003

2002
The Legion Grid Portal.
Concurr. Comput. Pract. Exp., 2002

2000
Grid-based File Access: The Legion I/O Model.
Proceedings of the Ninth IEEE International Symposium on High Performance Distributed Computing, 2000

1999
Using Reflection for Incorporating Fault-Tolerance Techniques into Distributed Applications.
Parallel Process. Lett., 1999

1998
Extending Metasystem Functionality Using Reflection.
Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, 1998

1997
Campus-Wide Computing : Early Results Using Legion At the University of Virginia.
Int. J. High Perform. Comput. Appl., 1997

Enabling Flexibility in the Legion Run-Time Library.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

1996
Exploiting Data-Flow for Fault-Tolerance in a Wide-Area Parallel System.
Proceedings of the 15th Symposium on Reliable Distributed Systems, 1996

1995
Fault Tolerance via Replication in Coarse Grain Data-Flow.
Proceedings of the Parallel Symbolic Languages and Systems, 1995


  Loading...