Seguir
Jay Ligatti
Jay Ligatti
Dirección de correo verificada de cse.usf.edu - Página principal
Título
Citado por
Citado por
Año
Control-flow integrity principles, implementations, and applications
M Abadi, M Budiu, U Erlingsson, J Ligatti
ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009
25472009
Control-flow integrity principles, implementations, and applications
M Abadi, M Budiu, U Erlingsson, J Ligatti
ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009
25272009
Control-flow integrity principles, implementations, and applications
M Abadi, M Budiu, U Erlingsson, J Ligatti
ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009
25272009
Edit automata: Enforcement mechanisms for run-time security policies
J Ligatti, L Bauer, D Walker
International Journal of Information Security 4, 2-16, 2005
4442005
Run-time enforcement of nonsafety policies
J Ligatti, L Bauer, D Walker
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-41, 2009
2542009
Composing security policies with polymer
L Bauer, J Ligatti, D Walker
Proceedings of the 2005 ACM SIGPLAN conference on Programming language …, 2005
2422005
More enforceable security policies
L Bauer, J Ligatti, D Walker
Proceedings of the Workshop on Foundations of Computer Security (FCS’02 …, 2002
1822002
A theory of aspects
D Walker, S Zdancewic, J Ligatti
ACM SIGPLAN Notices 38 (9), 127-139, 2003
1732003
Enforcing non-safety security policies with program monitors
J Ligatti, L Bauer, D Walker
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
1252005
A theory of secure control flow
M Abadi, M Budiu, U Erlingsson, J Ligatti
Formal Methods and Software Engineering: 7th International Conference on …, 2005
1102005
Defining code-injection attacks
D Ray, J Ligatti
Acm Sigplan Notices 47 (1), 179-190, 2012
1082012
A theory of runtime enforcement, with results
J Ligatti, S Reddy
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
862010
System and methods for authentication using multiple devices
JA Ligatti, D Goldgof, C Cetin, JB Subils
US Patent 9,659,160, 2017
762017
Composing expressive runtime security policies
L Bauer, J Ligatti, D Walker
ACM Transactions on Software Engineering and Methodology (TOSEM) 18 (3), 1-43, 2009
602009
Fault-tolerant typed assembly language
F Perry, L Mackey, GA Reis, J Ligatti, DI August, D Walker
Proceedings of the 28th ACM SIGPLAN conference on programming language …, 2007
602007
Modeling runtime enforcement with mandatory results automata
E Dolzhenko, J Ligatti, S Reddy
International Journal of Information Security 14, 47-60, 2015
582015
Software security based on control flow integrity
M Abadi, MD Budiu, U Erlingsson, JA Ligatti
US Patent 7,577,992, 2009
582009
Policy enforcement via program monitoring
JA Ligatti
Princeton University, 2006
532006
Software memory access control
M Abadi, U Erlingsson, JA Ligatti, MD Budiu
US Patent 7,337,291, 2008
492008
An Ethnographic Understanding of Software ({In) Security} and a {Co-Creation} Model to Improve Secure Software Development
H Palombo, AZ Tabari, D Lende, J Ligatti, X Ou
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 205-220, 2020
432020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20