David Bigelow

According to our database1, David Bigelow authored at least 8 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Proactive Provenance Policies for Automatic Cryptographic Data Centric Security.
Proceedings of the Provenance and Annotation of Data and Processes, 2021

2019
Controller-Oblivious Dynamic Access Control in Software-Defined Networks.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2017
Identifier Binding Attacks and Defenses in Software-Defined Networks.
Proceedings of the 26th USENIX Security Symposium, 2017

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

QUASAR: Quantitative Attack Space Analysis and Reasoning.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2015
Timely Rerandomization for Mitigating Memory Disclosures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Finding Focus in the Blur of Moving-Target Techniques.
IEEE Secur. Priv., 2014

On the Challenges of Effective Movement.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014


  Loading...