Jim Alves-Foss

Orcid: 0000-0002-5125-1470

According to our database1, Jim Alves-Foss authored at least 79 papers between 1991 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Is Formal Verification of seL4 Adequate to Address the Key Security Challenges of Kernel Design?
IEEE Access, 2023

Calibrating Cybersecurity Experiments: Evaluating Coverage Analysis for Fuzzing Benchmarks.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

2022
The Inconvenient Truths of Ground Truth for Binary Analysis.
CoRR, 2022

A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure.
IEEE Access, 2022

2019
Percentages, Probabilities and Professions of Performance.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

Use of an SDN Switch in Support of NIST ICS Security Recommendations and Least Privilege Networking.
Proceedings of the Fifth Annual Industrial Control System Security Workshop, 2019

Function boundary detection in stripped binaries.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Analysis of Web Browser Security Configuration Options.
KSII Trans. Internet Inf. Syst., 2018

METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

HESTIA: Adversarial Modeling and Risk Assessment for CPCS.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
A Structured Analysis of SQL Injection Runtime Mitigation Techniques.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
The DARPA Cyber Grand Challenge: A Competitor's Perspective, Part 2.
IEEE Secur. Priv., 2016

A Fast Boot, Fast Shutdown Technique for Android OS Devices.
Computer, 2016

Combining Mandatory and Attribute-Based Access Control.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
The DARPA Cyber Grand Challenge: A Competitor's Perspective.
IEEE Secur. Priv., 2015

Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Shortening the Boot Time of Android OS.
Computer, 2014

2013
The Known Unknowns.
IEEE Secur. Priv., 2013

Security Policy Refinement: High-Level Specification to Low-Level Implementation.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

On Designing an ACL2-Based C Integer Type Safety Checking Tool.
Proceedings of the NASA Formal Methods, 2013

Security Tagging for a Zero-Kernel Operating System.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

An Experimental Study to Explore Attacker Response to Changes in Security and Reward.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Introduction to Software Cybersecurity, Assurance, and Testing Minitrack.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2011
Multiple Independent Levels of Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Securing Database as a Service: Issues and Compromises.
IEEE Secur. Priv., 2011

Autonomous rule creation for intrusion detection.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
Analyzing uncertainty in TG protection graphs with TG/MC.
J. Comput. Secur., 2010

A Security Review of the Cell Broadband Engine Processor.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
A formal framework for real-time information flow analysis.
Comput. Secur., 2009

Detecting Compromised Nodes in a Wireless Sensor Network using Trust.
Proceedings of the ISCA First International Conference on Sensor Networks and Applications (SNA-2009), 2009

2008
Analysis of fault models for student use.
ACM SIGCSE Bull., 2008

Security policy refinement and enforcement for the design of multi-level secure systems.
J. Comput. Secur., 2008

Formal Verification and Visualization of Security Policies.
J. Comput., 2008

A Layered Decision Model for cost-effective system security.
Int. J. Inf. Comput. Secur., 2008

2007
A high assurance MLS file server.
ACM SIGOPS Oper. Syst. Rev., 2007

A communication-computation efficient group key algorithm for large and dynamic groups.
Comput. Networks, 2007

Validating A Layered Decision Framework for Cost-Effective Network Defense.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

Rationality Validation of a Layered Decision Model for Network Defense.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

Implementation-Oriented Secure Architectures.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Implementing middleware for content filtering and information flow control.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

2006
Hidden Implementation Dependencies in High Assurance and Critical Computing Systems.
IEEE Trans. Software Eng., 2006

Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems.
J. High Speed Networks, 2006

The MILS architecture for high-assurance embedded systems.
Int. J. Embed. Syst., 2006

Architecture-based refinements for secure computer systems design.
Proceedings of the 2006 International Conference on Privacy, 2006

The Effect of Rebalancing on the Performance of a Group Key Agreement Protocol.
Proceedings of the LCN 2006, 2006

Using SPARK-Ada to Model and Verify a MILS Message Router.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

Applying the layered decision model to the design of language-based security systems.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

Programming Education in the Era of the Internet: A Paradigm Shift.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

An MSLS-EMM for enforcing confidentiality in malicious environments.
Proceedings of the Third IASTED International Conference on Communication, 2006

Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems.
Proceedings of the Third IASTED International Conference on Communication, 2006

2005
Performance of Group Key Agreement Protocols over Multiple Operations.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Diversity as a computer defense mechanism.
Proceedings of the New Security Paradigms Workshop 2005, 2005

A layered decision model for cost-effective network defense.
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005

2004
The construction of secure mobile agents via evaluating encrypted functions.
Web Intell. Agent Syst., 2004

Formal Reasoning About Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Experiments on Processing and Linking Semantically Augmented Requirement Specifications.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

The Use of Encrypted Functions for Mobile Agent Security.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

A Multi-Layered Approach to Security in High Assurance Systems.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Attack Recognition for System Survivability: A Low-level Approach.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Efficient Allocation in Distributed Object Oriented Databases.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
What are Multi-Protocol Guessing Attacks and How to Prevent Them.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002

An empirical analysis of NATE: Network Analysis of Anomalous Traffic Events.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

Experiments in the Use of XML to Enhance Traceability between Object-Oriented Design Specifications and Source Code.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

2001
The Watson Theorem Prover.
J. Autom. Reason., 2001

Certificate Based Authorization Simulation System.
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001

2000
Cryptographic Protocol Engineering-Building Security from the Ground Up.
Proceedings of the International Conference on Internet Computing, 2000

Quantum Genetic Algorithms.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '00), 2000

1999
Dynamic Denotational Semantics of Java.
Proceedings of the Formal Syntax and Semantics of Java, 1999

Formal Grammar for Java.
Proceedings of the Formal Syntax and Semantics of Java, 1999

Formal Methods and Industry - Introduction.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1998
The Architecture of Secure Systems.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1996
Mutual authenticating protocol with key distribution in client/server environment.
XRDS, 1996

1995
Assessing Computer Security Vulnerability.
ACM SIGOPS Oper. Syst. Rev., 1995

An overview of SNIF: a tool for Surveying Network Information Flow.
Proceedings of the 1995 Symposium on Network and Distributed System Security, 1995

1992
Modelling Non-Deterministic System in HOL.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1992

1991
Mechanical Verification of Secure Distributed Systems in Higher Order Logic.
Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, 1991

Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

The verification of secure distributed systems.
Proceedings of the Compcon Spring '91, San Francisco, 1991


  Loading...