Meredith L. Patterson

According to our database1, Meredith L. Patterson authored at least 14 papers between 2008 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Curing the Vulnerable Parser: Design Patterns for Secure Input Handling.
login Usenix Mag., 2017

Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic Security.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

2016
The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them.
Proceedings of the IEEE Cybersecurity Development, 2016

Implementing a vertically hardened DNP3 control stack for power applications.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016

2015
The Bugs We Have to Kill.
login Usenix Mag., 2015

More ties than we thought.
PeerJ Comput. Sci., 2015

2014
Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier.
IEEE Secur. Priv., 2014

More ties than we thought.
CoRR, 2014

2013
Security Applications of Formal Language Theory.
IEEE Syst. J., 2013

2012
A Patch for Postel's Robustness Principle.
IEEE Secur. Priv., 2012

2011
The Halting Problems of Network Stack Insecurity.
login Usenix Mag., 2011

Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.
login Usenix Mag., 2011

2010
PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2008
Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model.
Proceedings of the Usability, Psychology, and Security, 2008


  Loading...