105 results on '"Anh Nguyen-Tuong"'
Search Results
2. Measuring and Mitigating Gaps in Structural Testing.
3. START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report).
4. Artifact: Measuring and Mitigating Gaps in Structural Testing.
5. Helix++: A platform for efficiently securing software.
6. Zipr: A High-Impact, Robust, Open-source, Multi-platform, Static Binary Rewriter.
7. BigMap: Future-proofing Fuzzers with Efficient Large Maps.
8. Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing.
9. Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing.
10. Cubismo: decloaking server-side malware via cubist program analysis.
11. MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis.
12. Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing.
13. Zipr: Efficient Static Binary Rewriting for Security.
14. Online control adaptation for safe and secure autonomous vehicle operations.
15. Zipr++: Exceptional Binary Rewriting.
16. Mixr: Flexible Runtime Rerandomization for Binaries.
17. Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge.
18. A System for the Security Protection of Embedded Binary Programs.
19. Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery.
20. Securing Binary Code.
21. Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks.
22. Diversity in Cybersecurity.
23. A Framework for Creating Binary Rewriting Tools (Short Paper).
24. To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing.
25. Moving Target Defenses in the Helix Self-Regenerative Architecture.
26. ILR: Where'd My Gadgets Go?
27. Defense against Stack-Based Attacks Using Speculative Stack Layout Transformation.
28. PEASOUP: preventing exploits against software of uncertain provenance (position paper).
29. Component-Oriented Monitoring of Binaries for Security.
30. Effectiveness of Moving Target Defenses.
31. On the effectiveness of the metamorphic shield.
32. Security through redundant data diversity.
33. Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections.
34. Meeting virtual organization performance goals through adaptive grid reconfiguration.
35. Secure and practical defense against code-injection attacks using software dynamic translation.
36. Automatically Hardening Web Applications Using Precise Tainting.
37. The Development of Dependable and Survivable Grids.
38. Grid-based File Access: The Legion I/O Model.
39. Security through Diversity: Leveraging Virtual Machine Technology.
40. Enabling Flexibility in the Legion Run-Time Library.
41. Exploiting Data-Flow for Fault-Tolerance in a Wide-Area Parallel System.
42. Fault Tolerance via Replication in Coarse Grain Data-Flow.
43. Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing
44. Support for extensibility and site autonomy in the Legion grid system object model.
45. The Legion Grid Portal.
46. Using Reflection for Incorporating Fault-Tolerance Techniques into Distributed Applications.
47. BigMap: Future-proofing Fuzzers with Efficient Large Maps
48. Campus-Wide Computing : Early Results Using Legion At the University of Virginia.
49. Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge
50. Securing Binary Code
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.