Anna Shubina

According to our database1, Anna Shubina authored at least 21 papers between 2003 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Curing the Vulnerable Parser: Design Patterns for Secure Input Handling.
login Usenix Mag., 2017

Exploitation as code reuse: On the need of formalization.
it Inf. Technol., 2017

2015
The Bugs We Have to Kill.
login Usenix Mag., 2015

2014
Why Wassenaar Arrangement's Definitions of "Intrusion Software" and "Controlled Items" Put Security Research and Defense At Risk.
login Usenix Mag., 2014

Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier.
IEEE Secur. Priv., 2014

'Weird Machine' Patterns.
Proceedings of the Cyberpatterns, 2014

2013
Avoiding a War on Unauthorized Computation.
IEEE Secur. Priv., 2013

2011
The Halting Problems of Network Stack Insecurity.
login Usenix Mag., 2011

Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.
login Usenix Mag., 2011

2010
Automated mapping of large binary objects using primitive fragment type classification.
Digit. Investig., 2010

On the reliability of wireless fingerprinting using clock skews.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Software on the Witness Stand: What Should It Take for Us to Trust It?
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Teaching the principles of the hacker curriculum to undergraduates.
Proceedings of the 41st ACM technical symposium on Computer science education, 2010

Distributed monitoring of conditional entropy for anomaly detection in streams.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

2009
Dartmouth Internet Security Testbed (DIST): Building a Campus-wide Wireless Testbed.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

2008
Backhoe, a Packet Trace and Log Browser.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2007
Nearly Private Information Retrieval.
Proceedings of the Mathematical Foundations of Computer Science 2007, 2007

2004
Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System.
Proceedings of the Second Annual Conference on Privacy, 2004

2003
Using caching for browsing anonymity.
SIGecom Exch., 2003


  Loading...