Virgil D. Gligor

Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA, USA


According to our database1, Virgil D. Gligor authored at least 168 papers between 1978 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
An I/O Separation Model for Formal Verification of Kernel Implementations.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2019
A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion).
Proceedings of the Security Protocols XXVII, 2019

A Rest Stop on the Unending Road to Provable Security.
Proceedings of the Security Protocols XXVII, 2019

Establishing Software Root of Trust Unconditionally.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Winning Against any Adversary on Commodity Computer Systems.
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019

Establishing and Maintaining Root of Trust on Commodity Computer Systems.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Anonymity Leakage in Private VoIP Networks.
IEEE Trans. Dependable Secur. Comput., 2018

Requirements for Root of Trust Establishment.
Proceedings of the Security Protocols XXVI, 2018

Requirements for Root of Trust Establishment (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

2017
k-Connectivity in Random K-Out Graphs Intersecting Erdős-Rényi Graphs.
IEEE Trans. Inf. Theory, 2017

On Connectivity and Robustness in Random Intersection Graphs.
IEEE Trans. Autom. Control., 2017

PrivateRide: A Privacy-Enhanced Ride-Hailing Service.
Proc. Priv. Enhancing Technol., 2017

Assuring the Safety of Asymmetric Social Protocols.
Proceedings of the Security Protocols XXV, 2017

The Case for In-Network Replay Suppression.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents.
Proceedings of the Security Protocols XXIV, 2016

Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016

SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Toward k-Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links.
IEEE Trans. Inf. Theory, 2015

k-Connectivity in Random Key Graphs With Unreliable Links.
IEEE Trans. Inf. Theory, 2015

Network Adversary Attacks against Secure Encryption Schemes.
IEICE Trans. Commun., 2015

Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation.
IEEE Secur. Priv., 2015

Random intersection graphs and their applications in security, wireless communication, and social networks.
CoRR, 2015

Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs.
CoRR, 2015

k-Connectivity of Random Key Graphs.
CoRR, 2015

Threshold Functions in Random s-Intersection Graphs.
CoRR, 2015

Exact analysis of k-connectivity in secure sensor networks with unreliable links.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Optimal strategies for side-channel leakage in FCFS packet schedulers.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Trusted Display on Untrusted Commodity Platforms.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

On <i>k</i>-Connectivity and Minimum Vertex Degree in Random <i>s</i>-Intersection Graphs.
Proceedings of the Twelfth Workshop on Analytic Algorithmics and Combinatorics, 2015

2014
On asymptotically exact probability of $k$-connectivity in random key graphs intersecting Erdős-Rényi graphs.
CoRR, 2014

Towards $k$-connectivity of the random graph induced by a pairwise key predistribution scheme with unreliable links.
CoRR, 2014

On $k$-connectivity and minimum vertex degree in random $s$-intersection graphs.
CoRR, 2014

Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

Dancing with the Adversary: A Tale of Wimps and Giants.
Proceedings of the Security Protocols XXII, 2014

Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on/off channels.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

On the strengths of connectivity and robustness in general random intersection graphs.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Connectivity in secure wireless sensor networks under transmission constraints.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
A New Privacy-Enhanced Matchmaking Protocol.
IEICE Trans. Commun., 2013

Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure.
Proceedings of the 22nd International World Wide Web Conference, 2013

KISS: "Key It Simple and Secure" Corporate Key Management.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets.
Proceedings of the Security Protocols XXI, 2013

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

The Crossfire Attack.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Secure k-connectivity in wireless sensor networks under an on/off channel model.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Proceedings of the Financial Cryptography and Data Security, 2013

Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
Proceedings of the Financial Cryptography and Data Security, 2013

CoDef: collaborative defense against large-scale link-flooding attacks.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

STRIDE: sanctuary trail - refuge from internet DDoS entrapment.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Two-server password-only authenticated key exchange.
J. Comput. Syst. Sci., 2012

k-Connectivity in Secure Wireless Sensor Networks with Physical Link Constraints - The On/Off Channel Model
CoRR, 2012

Analysis of complex contagions in random multiplex networks
CoRR, 2012

Private communication detection: a stochastic approach.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Street-Level Trust Semantics for Attribute Authentication.
Proceedings of the Security Protocols XX, 2012

Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Building Verifiable Trusted Path on Commodity x86 Computers.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

GeoPKI: Converting Spatial Trust into Certificate Trust.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

Discovering records of private VoIP calls without wiretapping.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

On the foundations of trust in networks of humans and computers.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Towards a Theory of Trust in Networks of Humans and Computers.
Proceedings of the Security Protocols XIX, 2011

Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Network fault localization with small TCB.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Editorial.
IEEE Trans. Dependable Secur. Comput., 2010

Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Security Limitations of Virtualization and How to Overcome Them.
Proceedings of the Security Protocols XVIII, 2010

TrustVisor: Efficient TCB Reduction and Attestation.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Architectures for practical security.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Dependable connection setup for network capabilities.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Secure wireless networking.
J. Commun. Networks, 2009

Brief Encounters with a Random Key Graph.
Proceedings of the Security Protocols XVII, 2009

Brief Encounters with a Random Key Graph.
Proceedings of the Security Protocols XVII, 2009

Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Privacy-Preserving Relationship Path Discovery in Social Networks.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Surviving Insider Attacks: A Call for System Experiments.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008

Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Handling New Adversaries in Wireless Ad-Hoc Networks.
Proceedings of the Security Protocols XVI, 2008

On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Efficient Handling of Adversary Attacks in Aggregation Applications.
Proceedings of the Computer Security, 2008

Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Guest Editorial Vehicular Networks.
IEEE J. Sel. Areas Commun., 2007

MiniSec: a secure sensor network communication architecture.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007

On the evolution of adversary models in security protocols: from the beginning to sensor networks.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Information Assurance Technology Forecast 2005.
IEEE Secur. Priv., 2006

Towards a secure and interoperable DRM architecture.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

Emergent properties in ad-hoc networks: a security perspective.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2005

On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike).
Proceedings of the Security Protocols, 2005

Distributed Detection of Node Replication Attacks in Sensor Networks.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Advances in sensor and ad-hoc network security: perspective and status.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Panel: Authentication in Constrained Environments.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Administering Access Control in Dynamic Coalitions.
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005

2004
A Model for Access Negotiations in Dynamic Coalitions.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

2003
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion).
Proceedings of the Security Protocols, 2003

Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.
Proceedings of the Security Protocols, 2003

Bootstrapping security associations for routing in mobile ad-hoc networks.
Proceedings of the Global Telecommunications Conference, 2003

Integrated Security Services for Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Weak Key Authenticity and the Computational Completeness of Formal Encryption.
Proceedings of the Advances in Cryptology, 2003

2002
On Trust Establishment in Mobile Ad-Hoc Networks.
Proceedings of the Security Protocols, 2002

Reasoning about Joint Administration of Access Policies for Coalition Resources.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

A key-management scheme for distributed sensor networks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
On the Negotiation of Access Control Policies.
Proceedings of the Security Protocols, 2001

Negotiation of Access Control Policies (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Non-Interference: Who Needs It?
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
Review and Revocation of Access Privileges Distributed with PKI Certificates.
Proceedings of the Security Protocols, 2000

Denial of Service - Panel Discussion.
Proceedings of the Security Protocols, 2000

Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

SubDomain: Parsimonious Server Security.
Proceedings of the 14th Conference on Systems Administration (LISA 2000), 2000

1999
Integrity-Aware PCBC Encryption Schemes.
Proceedings of the Security Protocols, 1999

20 Years of Operating Systems Security.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1998
Panel Session - Future Directions.
Proceedings of the Security Protocols, 1998

Discussion Session: Differences Between Academic and Commercial Security.
Proceedings of the Security Protocols, 1998

Application-Oriented Security Policies and Their Composition (Position Paper).
Proceedings of the Security Protocols, 1998

Application-Oriented Security Policies and Their Composition (Transcript of Discussion).
Proceedings of the Security Protocols, 1998

On the Formal Definition of Separation-of-Duty Policies and their Composition.
Proceedings of the Security and Privacy, 1998

1997
On a Pattern-Oriented Model for Intrusion Detection.
IEEE Trans. Knowl. Data Eng., 1997

1996
Detecting Illicit Leakage of Information in Operating Systems.
J. Comput. Secur., 1996

1995
Characteristics of role-based access control.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

1993
On Inter-Realm Authentication in Large Distributed Systems.
J. Comput. Secur., 1993

Protocol design for integrity protection.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

1992
Towards a Theory of Penetration-Resistant Systems and its Applications.
J. Comput. Secur., 1992

On message integrity in cryptographic protocols.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code.
Proceedings of the Computer Security, 1992

Trusted RUBIX architecture and policy model interpretation.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
A Pattern-Oriented Intrusion-Detection Model and Its Applications.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

On Belief Evolution in Authentication Protocols.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

Logics for Cryptographic Protocols - Virtues and Limitations.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
A Specification and Verification Method for Preventing Denial of Service.
IEEE Trans. Software Eng., 1990

On the Identification of Covert Storage Channels in Secure Systems.
IEEE Trans. Software Eng., 1990

A Fault-Tolerant Protocol for Atomic Broadcast.
IEEE Trans. Parallel Distributed Syst., 1990

Auditing the Use of Covert Storage Channels in Secure Systems.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

On the Formal Specification and Verification of a Multiparty Session Protocol.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

On Replay Detection in Distributed Systems.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1990), May 28, 1990

Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

1988
A formal specification and verification method for the prevention of denial of service.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

A bandwidth computation model for covert storage channels and its applications.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

1987
A New Security Testing Method and Its Application to the Secure Xenix Kernel.
IEEE Trans. Software Eng., 1987

Design and Implementation of Secure Xenix.
IEEE Trans. Software Eng., 1987

A Formal Method for the Identification of Covert Storage Channels in Source Code.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

Properties of Multiprocessor Scheduling Algorithms.
Proceedings of the International Conference on Parallel Processing, 1987

A Comparative Analysis of Multiprocessor Scheduling Algorithms.
Proceedings of the 7th International Conference on Distributed Computing Systems, 1987

1986
Transaction management in distributed heterogeneous database management systems.
Inf. Syst., 1986

A New Security Testing Method and Its Application to the Secure Xenix Kernel.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

On the Design and the Implementation of Secure Xenix Workstations.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

On Denial-of-Service in Computer Networks.
Proceedings of the Second International Conference on Data Engineering, 1986

1985
Foreword.
IEEE Trans. Software Eng., 1985

Analysis of the Hardware Verification of the Honeywell SCOMP.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985

1984
A Note on Denial-of-Service in Operating Systems.
IEEE Trans. Software Eng., 1984

Inteconnecting Heterogeneous Database Management Systems.
Computer, 1984

Concurrency Control Issues in Distributed Heterogeneous Database Management Systems.
Proceedings of the Distributed Data Sharing Systems, 1984

1983
The verification of the protection mechanisms of high-level language machines.
Int. J. Parallel Program., 1983

A Note on the Denial-of-Service Problem.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

1982
Finding Augmented-Set Bases.
SIAM J. Comput., 1982

1980
On Deadlock Detection in Distributed Systems.
IEEE Trans. Software Eng., 1980

1979
Object Migration and Authentication.
IEEE Trans. Software Eng., 1979

Review and Revocation of Access Privileges Distributed Through Capabilities.
IEEE Trans. Software Eng., 1979

Architectural Implementations of Abstract Data Type Implementation.
Proceedings of the 6th Annual Symposium on Computer Architecture, 1979

1978
Representing Data Bases in Segmented Name Spaces.
Proceedings of the International Conference on Databases: Improving Usability and Responiveness, 1978


  Loading...