Peng Liu

According to our database1, Peng Liu
  • authored at least 185 papers between 1998 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Computer-Aided Human Centric Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Computer Virology and Hacking Techniques, 2017

Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection.
IEEE Trans. Software Eng., 2017

Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots.
CoRR, 2017

Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices.
CoRR, 2017

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Proceedings of the 26th USENIX Security Symposium, 2017

WindowGuard: Systematic Protection of GUI Security in Android.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Online Algorithms for Adaptive Cyber Defense on Bayesian Attack Graphs.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

Attack-resilient estimation of switched nonlinear cyber-physical systems.
Proceedings of the 2017 American Control Conference, 2017

2016
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection.
IEEE Trans. Reliability, 2016

Towards service continuity for transactional applications via diverse device drivers.
IJICS, 2016

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Empirical Analysis and Modeling of Black-Box Mutational Fuzzing.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android.
Proceedings of the Computer Security - ESORICS 2016, 2016

Repackage-Proofing Android Apps.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

JRed: Program Customization and Bloatware Mitigation Based on Static Analysis.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Towards a Science for Adaptive Defense: Revisit Server Protection.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Demo: A Symbolic N-Variant System.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

MTD 2016: Third ACM Workshop on Moving Target Defense.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

2015
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Trans. Software Eng., 2015

Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation.
IEEE Trans. Knowl. Data Eng., 2015

Reviewing the book "Principles of Cyber-physical Systems" from a security perspective.
ICST Trans. Security Safety, 2015

Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack.
CoRR, 2015

Towards Discovering and Understanding Task Hijacking in Android.
Proceedings of the 24th USENIX Security Symposium, 2015

TaintPipe: Pipelined Symbolic Taint Analysis.
Proceedings of the 24th USENIX Security Symposium, 2015

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract).
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

A Practical Approach for Adaptive Data Structure Layout Randomization.
Proceedings of the Computer Security - ESORICS 2015, 2015

HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Towards Collaborative Query Planning in Multi-party Database Networks.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

An Empirical Study of Web Vulnerability Discovery Ecosystems.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Discover and Tame Long-running Idling Processes in Enterprise Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015

Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Cognitive Process.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Defeating buffer overflow attacks via virtualization.
Computers & Electrical Engineering, 2014

ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Droidmarking: resilient software watermarking for impeding android application repackaging.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Program Logic Based Software Plagiarism Detection.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation.
Proceedings of the Information Systems Security - 10th International Conference, 2014

RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.
Proceedings of the Computer Security - ESORICS 2014, 2014

System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

DeltaPath: Precise and Scalable Calling Context Encoding.
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014

Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

Comparing Different Moving Target Defense Techniques.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

Software Cruising: A New Technology for Building Concurrent Software Monitor.
Proceedings of the Secure Cloud Computing, 2014

2013
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
IEEE Trans. Information Forensics and Security, 2013

Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes.
Security and Communication Networks, 2013

Semantic aware attribution analysis of remote exploits.
Security and Communication Networks, 2013

Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems".
Security and Communication Networks, 2013

Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Network and Computer Applications, 2013

HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware.
IACR Cryptology ePrint Archive, 2013

Towards transparent and distributed workload management for large scale web servers.
Future Generation Comp. Syst., 2013

Practical Fine-grained Privilege Separation in Multithreaded Applications
CoRR, 2013

A Framework for Evaluating Mobile App Repackaging Detection Algorithms.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

How to use experience in cyber analysis: An analytical reasoning support system.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
Anonymous proxy re-encryption.
Security and Communication Networks, 2012

Evaluating Intrusion-Tolerant Certification Authority Systems.
Quality and Reliability Eng. Int., 2012

Achieving key privacy without losing CCA security in proxy re-encryption.
Journal of Systems and Software, 2012

Replacement attacks: automatically evading behavior-based software birthmark.
Int. J. Inf. Sec., 2012

Modeling and Checking the Security of DIFC System Configurations.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Assessing the Trustworthiness of Drivers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A first step towards algorithm plagiarism detection.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Stalking online: on user privacy in social networks.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Letting applications operate through attacks launched from compromised drivers.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata.
VLDB J., 2011

PEDA: Comprehensive Damage Assessment for Production Environment Server Systems.
IEEE Trans. Information Forensics and Security, 2011

SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption.
Security and Communication Networks, 2011

Secure and privacy-preserving information aggregation for smart grids.
IJSN, 2011

Event-driven modelling of evolving social networks.
IJSCCPS, 2011

SAS: semantics aware signature generation for polymorphic worm detection.
Int. J. Inf. Sec., 2011

New threats to health data privacy.
BMC Bioinformatics, 2011

Privacy Preserving Group Linkage.
Proceedings of the Scientific and Statistical Database Management, 2011

SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits.
Proceedings of the Security and Privacy in Communication Networks, 2011

A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures.
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011

Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
Proceedings of the Network and Distributed System Security Symposium, 2011

Replacement Attacks on Behavior Based Software Birthmark.
Proceedings of the Information Security, 14th International Conference, 2011

Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules.
Proceedings of the Information Security Practice and Experience, 2011

Analyzing Intelligence on WMD Attacks Using Threaded Event-Based Simulation.
Proceedings of the Critical Infrastructure Protection V, 2011

Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering, 2011

HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Multi-Use Unidirectional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

LeakProber: a framework for profiling sensitive data leakage paths.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Distributed workload and response time management for web applications.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
RPD-based Hypothesis Reasoning for Cyber Situation Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

SigFree: A Signature-Free Buffer Overflow Attack Blocker.
IEEE Trans. Dependable Sec. Comput., 2010

PWC: a proactive worm containment solution for enterprise networks.
Security and Communication Networks, 2010

CCA-Secure PRE Scheme without Random Oracles.
IACR Cryptology ePrint Archive, 2010

Worm virulence estimation for the containment of local worm outbreak.
Computers & Security, 2010

Creation of the importance scanning worm using information collected by Botnets.
Computer Communications, 2010

Behavior Evolution and Event-Driven Growth Dynamics in Social Networks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Protecting Kernel Data through Virtualization Technology.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes.
Proceedings of the Security and Privacy in Communication Networks, 2010

SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection.
Proceedings of the Security and Privacy in Communication Networks, 2010

Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
Proceedings of the SECRYPT 2010, 2010

Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010

Rate-Based Watermark Traceback: A New Approach.
Proceedings of the Information Security, 2010

Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.
Proceedings of the Information Security, 2010

Study of effect of node seniority in social networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control.
Proceedings of the Computational Science and Its Applications, 2010

Using Bayesian networks for cyber security analysis.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems.
Proceedings of the ARES 2010, 2010

2009
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services.
IEEE Trans. Dependable Sec. Comput., 2009

A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems.
Proceedings of the EDBT 2009, 2009

Behavior based software theft detection.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Detecting Software Theft via System Call Based Birthmarks.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Damage Quarantine and Recovery in Data Processing Systems.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Protecting web services from remote exploit code: a static analysis approach.
Proceedings of the 17th International Conference on World Wide Web, 2008

Detecting Remote Exploits Using Data Mining.
Proceedings of the Advances in Digital Forensics IV, 2008

A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Threshold Smart Walk for the Containment of Local Worm Outbreak.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Proceedings of the Computer Security, 2008

Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008

A light weighted damage tracking quarantine and recovery scheme for mission-critical database systems.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

Using virtual machines to do cross-layer damage assessment.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008

STILL: Exploit Code Detection via Static Taint and Initialization Analyses.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Trusted Recovery.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Can-Follow Concurrency Control.
IEEE Trans. Computers, 2007

Defence against packet injection in ad hoc networks.
IJSN, 2007

Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies.
IJICS, 2007

Analysis of area-congestion-based DDoS attacks in ad hoc networks.
Ad Hoc Networks, 2007

Evaluation of Collaborative Worm Containments on DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

Framework for Intrusion Tolerant Certification Authority System Evaluation.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

PWC: A proactive worm containment solution for enterprise networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Pragmatic XML Access Control Using Off-the-Shelf RDBMS.
Proceedings of the Computer Security, 2007

Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Incremental adaptation of XPath access control views.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Real-time data attack isolation for commercial database applications.
J. Network and Computer Applications, 2006

Visual toolkit for network security experiment specification and data analysis.
Proceedings of the 3rd Workshop on Visualization for Computer Security (VizSEC 2006), 2006

SigFree: A Signature-free Buffer Overflow Attack Blocker.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Semantic access control for information interoperation.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System.
Proceedings of the Computer Security, 2006

Privacy-preserving semantic interoperation and access control of heterogeneous databases.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Towards Database Firewall: Mining the Damage Spreading Patterns.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Deep Set Operators for XQuery.
Proceedings of the Second International Workshop on XQuery Implementation, 2005

KTR: an Efficient Key Management Scheme For Air Access Control.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Defending against packet injection attacks unreliable ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Towards Database Firewalls.
Proceedings of the Data and Applications Security XIX, 2005

2004
The Design and Implementation of a Self-Healing Database System.
J. Intell. Inf. Syst., 2004

Cyber defense technology networking and evaluation.
Commun. ACM, 2004

A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery.
Proceedings of the Information Security, 7th International Conference, 2004

QFilter: fine-grained run-time XML access control via NFA-based query rewriting.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

2003
Supporting XML Security Models Using Relational Databases: A Vision.
Proceedings of the Database and XML Technologies, 2003

2002
Recovery from Malicious Transactions.
IEEE Trans. Knowl. Data Eng., 2002

2001
Avoiding loss of fairness owing to failures in fair data exchange systems.
Decision Support Systems, 2001

Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
Intrusion Confinement by Isolation in Information Systems.
Journal of Computer Security, 2000

Rewriting Histories: Recovering from Malicious Transactions.
Distributed and Parallel Databases, 2000

Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

Intrusion Confinement by Isolation in Information Systems.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

1998
Application-Level Isolation to Cope with Malicious Database Users.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998


  Loading...