Jonathon T. Giffin

According to our database1, Jonathon T. Giffin authored at least 30 papers between 2002 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Trusted VM Snapshots in Untrusted Cloud Infrastructures.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Static detection of C++ vtable escape vulnerabilities in binary code.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Efficient protection of kernel data structures via object partitioning.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
End-to-End Software Diversification of Internet Services.
Proceedings of the Moving Target Defense, 2011

Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Efficient Monitoring of Untrusted Kernel-Mode Execution.
Proceedings of the Network and Distributed System Security Symposium, 2011

Operating System Interface Obfuscation and the Revealing of Hidden Operations.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

Automated remote repair for mobile malware.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
A Declarative Framework for Intrusion Analysis.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Automatic Generation of Remediation Procedures for Malware Infections.
Proceedings of the 19th USENIX Security Symposium, 2010

Protecting E-healthcare Client Devices against Malware and Physical Theft.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Automatic Discovery of Parasitic Malware.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Attribution of Malicious Behavior.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2009
Automatic Reverse Engineering of Malware Emulators.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Robust signatures for kernel data structures.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
System Call API Obfuscation (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Impeding Malware Analysis Using Conditional Code Obfuscation.
Proceedings of the Network and Distributed System Security Symposium, 2008

Security Analysis of an IP Phone: Cisco 7960G.
Proceedings of the Principles, 2008

Evaluating email's feasibility for botnet command and control.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Understanding Precision in Host Based Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

2006
Automated Discovery of Mimicry Attacks.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

2005
An Architecture for Generating Semantic Aware Signatures.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Environment-Sensitive Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

An auctioning reputation system based on anomaly.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Strengthening Software Self-Checksumming via Self-Modifying Code.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Formalizing Sensitivity in Static Analysis for Intrusion Detection.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Efficient Context-Sensitive Intrusion Detection.
Proceedings of the Network and Distributed System Security Symposium, 2004

2002
Detecting Manipulated Remote Call Streams.
Proceedings of the 11th USENIX Security Symposium, 2002


  Loading...