Jay Ligatti

Affiliations:
  • University of South Florida, Tampa, FL, USA


According to our database1, Jay Ligatti authored at least 40 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Preliminary Study on Using Large Language Models in Software Pentesting.
CoRR, 2024

2022
ProProv: A Language and Graphical Tool for Specifying Data Provenance Policies.
Proceedings of the 4th IEEE International Conference on Trust, 2022

2021
Far Proximity Identification in Wireless Systems.
IEEE Trans. Dependable Secur. Comput., 2021

An Analysis of the Role of Situated Learning in Starting a Security Culture in a Software Company.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Stream-Monitoring Automata.
Proceedings of the 9th International Conference on Software and Computer Applications, 2020

PoCo: A Language for Specifying Obligation-Based Policy Compositions.
Proceedings of the 9th International Conference on Software and Computer Applications, 2020

An Evaluation of the Power Consumption of Coauthentication as a Continuous User Authentication Method in Mobile Systems.
Proceedings of the 2020 ACM Southeast Conference, 2020

2019
Coauthentication.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

A Dual-Task Interference Game-Based Experimental Framework for Comparing the Usability of Authentication Methods.
Proceedings of the 12th International Conference on Human System Interaction, 2019

SQL-Identifier Injection Attacks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2017
On Subtyping-Relation Completeness, with an Application to Iso-Recursive Types.
ACM Trans. Program. Lang. Syst., 2017

POSTER: Towards Precise and Automated Verification of Security Protocols in Coq.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
Design of Adiabatic Dynamic Differential Logic for DPA-Resistant Secure Integrated Circuits.
IEEE Trans. Very Large Scale Integr. Syst., 2015

Modeling runtime enforcement with mandatory results automata.
Int. J. Inf. Sec., 2015

Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

A Theory of Gray Security Policies.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Defining Injection Attacks.
Proceedings of the Information Security - 17th International Conference, 2014

Fingerprinting Far Proximity from Radio Emissions.
Proceedings of the Computer Security - ESORICS 2014, 2014

2012
A location-based policy-specification language for mobile devices.
Pervasive Mob. Comput., 2012

Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Defining code-injection attacks.
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012

2011
PoliSeer: A Tool for Managing Complex Security Policies.
J. Inf. Process., 2011

2010
A Theory of Runtime Enforcement, with Results.
Proceedings of the Computer Security, 2010

2009
Composing expressive runtime security policies.
ACM Trans. Softw. Eng. Methodol., 2009

Run-Time Enforcement of Nonsafety Policies.
ACM Trans. Inf. Syst. Secur., 2009

Control-flow integrity principles, implementations, and applications.
ACM Trans. Inf. Syst. Secur., 2009

Inline Visualization of Concerns.
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, 2009

LoPSiL: A Location-Based Policy-Specification Language.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

2008
A Dynamic Query-Rewriting Mechanism for Role-Based Access Control in Databases.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Fault-tolerant typed assembly language.
Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation, 2007

2006
A type-theoretic interpretation of pointcuts and advice.
Sci. Comput. Program., 2006

Static typing for a faulty lambda calculus.
Proceedings of the 11th ACM SIGPLAN International Conference on Functional Programming, 2006

2005
Edit automata: enforcement mechanisms for run-time security policies.
Int. J. Inf. Sec., 2005

Composing security policies with polymer.
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, 2005

A Theory of Secure Control Flow.
Proceedings of the Formal Methods and Software Engineering, 2005

Enforcing Non-safety Security Policies with Program Monitors.
Proceedings of the Computer Security, 2005

Control-flow integrity.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2003
A theory of aspects.
Proceedings of the Eighth ACM SIGPLAN International Conference on Functional Programming, 2003

2002
Types and Effects for Non-interfering Program Monitors.
Proceedings of the Software Security -- Theories and Systems, 2002


  Loading...