Sergey Bratus

According to our database1, Sergey Bratus authored at least 71 papers between 1999 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Ghostbusting: mitigating spectre with intraprocess memory isolation.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

2019
Human-Computability Boundaries.
Proceedings of the Security Protocols XXVII, 2019

Mismorphism: The Heart of the Weird Machine.
Proceedings of the Security Protocols XXVII, 2019

Converting an Electric Power Utility Network to Defend Against Crafted Inputs.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Dynamic Repair of Mission-Critical Applications with Runtime Snap-Ins.
Proceedings of the Critical Infrastructure Protection XIII, 2019

2018
PhasorSec: Protocol Security Filters for Wide Area Measurement Systems.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

2017
Curing the Vulnerable Parser: Design Patterns for Secure Input Handling.
login Usenix Mag., 2017

Exploitation as code reuse: On the need of formalization.
it Inf. Technol., 2017

Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic Security.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them.
Proceedings of the IEEE Cybersecurity Development, 2016

Implementing a vertically hardened DNP3 control stack for power applications.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016

2015
The Bugs We Have to Kill.
login Usenix Mag., 2015

Bolt-On Security Extensions for Industrial Control System Protocols: A Case Study of DNP3 SAv5.
IEEE Secur. Priv., 2015

2014
Why Wassenaar Arrangement's Definitions of "Intrusion Software" and "Controlled Items" Put Security Research and Defense At Risk.
login Usenix Mag., 2014

Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research.
login Usenix Mag., 2014

From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring System.
IEEE Trans. Mob. Comput., 2014

Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier.
IEEE Secur. Priv., 2014

Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

'Weird Machine' Patterns.
Proceedings of the Cyberpatterns, 2014

2013
Security Applications of Formal Language Theory.
IEEE Syst. J., 2013

Avoiding a War on Unauthorized Computation.
IEEE Secur. Priv., 2013

"Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

The Page-Fault Weird Machine: Lessons in Instruction-less Computation.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

2012
Intrusion detection for resource-constrained embedded control systems in the power grid.
Int. J. Crit. Infrastructure Prot., 2012

A Patch for Postel's Robustness Principle.
IEEE Secur. Priv., 2012

Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert Channels.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
The Halting Problems of Network Stack Insecurity.
login Usenix Mag., 2011

Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.
login Usenix Mag., 2011

Domain-specific entity extraction from noisy, unstructured data using ontology-guided search.
Int. J. Document Anal. Recognit., 2011

Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Using Hierarchical Change Mining to Manage Network Security Policy Evolution.
Proceedings of the USENIX Workshop on Hot Topics in Management of Internet, 2011

Using Active Intrusion Detection to Recover Network Trust.
Proceedings of the Past, 2011

Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing.
Proceedings of the Critical Infrastructure Protection V, 2011

Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems.
Proceedings of the Critical Infrastructure Protection V, 2011

2010
Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain.
Int. J. Secur. Softw. Eng., 2010

Automated mapping of large binary objects using primitive fragment type classification.
Digit. Investig., 2010

On the reliability of wireless fingerprinting using clock skews.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Software on the Witness Stand: What Should It Take for Us to Trust It?
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Teaching the principles of the hacker curriculum to undergraduates.
Proceedings of the 41st ACM technical symposium on Computer science education, 2010

VM-based security overkill: a lament for applied systems security research.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Distributed monitoring of conditional entropy for anomaly detection in streams.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

Katana: A Hot Patching Framework for ELF Executables.
Proceedings of the ARES 2010, 2010

2009
Bickering In-Depth: Rethinking the Composition of Competing Security Systems.
IEEE Secur. Priv., 2009

Dartmouth Internet Security Testbed (DIST): Building a Campus-wide Wireless Testbed.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

The cake is a lie: privilege rings as a policy resource.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009

Using domain knowledge for ontology-guided entity extraction from noisy, unstructured text data.
Proceedings of the Third Workshop on Analytics for Noisy Unstructured Text Data, 2009

2008
Why Do Street-Smart People Do Stupid Things Online?
IEEE Secur. Priv., 2008

Active behavioral fingerprinting of wireless devices.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Backhoe, a Packet Trace and Log Browser.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

TOCTOU, Traps, and Trusted Computing.
Proceedings of the Trusted Computing, 2008

Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

2007
What Hackers Learn that the Rest of Us Don't: Notes on Hacker Curriculum.
IEEE Secur. Priv., 2007

Hacker Curriculum: How We Can Use It in Teaching.
IEEE Distributed Syst. Online, 2007

Hacker Curriculum : How Hackers Learn Networking.
IEEE Distributed Syst. Online, 2007

Pastures: Towards Usable Security Policy Engineering.
Proceedings of the The Second International Conference on Availability, 2007

2006
Semi-supervised Data Organization for Interactive Anomaly Analysis.
Proceedings of the Fifth International Conference on Machine Learning and Applications, 2006

2005
Ubiquitous Redirection as Access Control Response.
Proceedings of the Third Annual Conference on Privacy, 2005

2004
The Kerf Toolkit for Intrusion Analysis.
IEEE Secur. Priv., 2004

2001
Experiments in Multi-Modal Automatic Content Extraction.
Proceedings of the First International Conference on Human Language Technology Research, 2001

FactBrowser Demonstration.
Proceedings of the First International Conference on Human Language Technology Research, 2001

2000
Fast Constructive Recognition of a Black Box Group Isomorphic to Sn or An using Goldbach's Conjecture.
J. Symb. Comput., 2000

1999
On Sampling Generating Sets of Finite Groups and Product Replacement Algorithm (extended abstract).
Proceedings of the 1999 International Symposium on Symbolic and Algebraic Computation, 1999


  Loading...