News From 2006

Two WiSA students graduate with doctorates

Shai Rubin and Jonathon Giffin have successfully defended their doctoral thesis.

Vulnerability-Based Signature Generation Paper Appeared at Oakland 2006

The paper Towards automatic generation of vulnerability-based signatures, by David Brumley, James Newsome, Dawn Song, Hao Wang, and Somesh Jha appeared at the 2006 IEEE Symposium on Security and Privacy, held May 21–24 in Oakland, California.

Legacy Code Retrofitting Paper Appeared at Oakland 2006

The paper Retrofitting Legacy Code for Authorization Policy Enforcement by Vinod Ganapathy, Trent Jaeger, and Somesh Jha appeared at the IEEE Symposium on Security and Privacy, held in Oakland, California in May 2006.

News From 2005

Software Tamper Resistance Paper Appeared at ACSAC 2005

The paper Strengthening software self-checksumming via self-modifying code by Jonathon T. Giffin, Mihai Christodorescu, and Louis Kruger appeared at the 21st Annual Computer Security Applications Conference (ACSAC).

Authorization Paper Appeared at CCS 2005

The paper Automatic Placement of Authorization Hooks in the Linux Security Modules Framework by Vinod Ganapathy, Trent Jaeger and Somesh Jha appeared at the ACM Conference on Computer and Communications Security (CCS 2005), held at Alexandria, Virginia, in November 2005.

Fraud Detection Paper Appeared at CCS 2005

The paper An Auctioning Reputation System Based on Anomaly Detection by Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, and Nicholas Kidd appeared at the ACM Conference on Computer and Communications Security in November 2005.

Paper Appeared at ESORICS 2005

The paper Privacy Preserving Clustering by Somesh Jha, Louis Kruger, and Patrick McDaniel appeared at the Tenth European Symposium on Research in Computer Security (ESORICS).

Paper Appeared at RAID 2005

The paper Environment-Sensitive Intrusion Detection by Jonathon T. Giffin, Somesh Jha, Barton P. Miller, David Dagon, and Wenke Lee appeared at the Eighth International Conference on Recent Advances in Intrusion Detection (RAID).

Paper Appeared at 14th USENIX Security Symposium

The paper An Architecture for Generating Semantics-Aware Signatures by Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, and Somesh Jha appeared at the 14th USENIX Security Symposium.

Paper Appeared at 27th ICSE

The paper Automatic Discovery of API-Level Exploits by Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, and Randal E. Bryant appeared at the 27th International Conference on Software Engineering.

NIDS Signatures Paper Appeared at Oakland 2005

The paper Language-Based Generation and Evaluation of NIDS Signatures by Shai Rubin, Somesh Jha, and Barton P. Miller appeared at the 2005 IEEE Symposium on Security and Privacy.

Malware Detection Paper Appeared at Oakland 2005

The paper Semantics-Aware Malware Detection by Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Song, and Randal E. Bryant appeared at the 2005 IEEE Symposium on Security and Privacy.

Paper Appeared at 14th Conference on Compiler Construction

The paper Codesurfer/x86—A Platform for Analyzing x86 Executables by Gogul Balakrishnan, Radu Gruian, Thomas Reps, and Tim Teitelbaum appeared at the 14th International Conference on Compiler Construction.

News From 2004

Rubin, Jha, and Miller Receive Best Paper Award

Shai Rubin, Somesh Jha, and Bart Miller received the ACSAC 2004 Best Paper Award for their paper, Automatic Generation and Analysis of NIDS Attacks, which appeared at the 20th Annual Computer Security Applications Conference (ACSAC 2004).

Rubin, Jha, and Miller Receive Best Student Paper Award

Shai Rubin, Somesh Jha, and Bart Miller received the ACSAC 2004 Best Student Paper Award for their paper, Automatic Generation and Analysis of NIDS Attacks, which appeared at the 20th Annual Computer Security Applications Conference (ACSAC 2004).

Christodorescu and Jha Receive Best Paper Award

Mihai Christodorescu and Somesh Jha received the ACM SIGSOFT Distinguished Paper Award for their paper, Testing Malware Detectors, which appeared at the International Symposium on Software Testing and Analysis.

Paper Appeared at ISSTA 2004

The paper Testing Malware Detectors appeared at the International Symposium on Software Testing and Analysis in Boston, Massachusetts, on July 12, 2004.

Paper Appeared at Oakland 2004

The paper Formalizing Sensitivity in Static Analysis for Intrusion Detection appeared at the IEEE Symposium on Security and Privacy at Oakland, California.

Balakrishnan and Reps Receive Best Paper Award

The paper Analyzing Memory Accesses in x86 Executables by Gogul Balakrishnan and Thomas Reps received the European Association for Programming Languages and Systems (EAPLS) best paper award at the 2004 European Joint Conferences on Theory and Practice of Software (ETAPS).

Paper Appeared in 13th CC

The paper Analyzing Memory Accesses in x86 Executables by Gogul Balakrishnan and Thomas Reps appeared in the 13th International Conference on Compiler Construction (CC).

Paper Appeared in 11th NDSS

The paper Efficient Context-Sensitive Intrusion Detection by Jonathon T. Giffin, Somesh Jha, and Barton P. Miller appeared in the 11th Annual Network and Distributed System Security Symposium.

News From 2003

Thomas Reps Named Highly Cited Researcher

Thomas Reps was recognized as a "Highly Cited Researcher" in the field of Computer Science -- one of 230 worldwide who received such recognition by the Institute for Scientific Information.

Paper Appeared in 10th CCS

The paper Buffer Overrun Detection using Linear Programming and Static Analysis by Vinod Ganapathy and Somesh Jha of the WiSA Project and David Chandler, David Melski, and David Vitek of Grammatech, Inc appeared in the 10th ACM Conference on Computer and Communications Security (CCS).

November 2003 MURI Review Meeting

The November 2003 MURI review meeting was held November 12-13 on the shores of the Baltimore, Maryland harbor. This semi-annual meeting provided an opportunity for interested parties to hear the latest developments from the WiSA group and the three-valued logic analysis group at the University of Wisconsin--Madison and the model checking group at Carnegie Mellon University. This meeting featured technical presentations, demonstrations, and poster sessions.

Paper Appeared in 12th USENIX Security Symposium

The paper Static analysis of executables to detect malicious patterns by project members Mihai Christodorescu and Somesh Jha appeared in the 12th USENIX Security Symposium.

July 2003 MURI Review Meeting

The July 2003 MURI review meeting was held in Pittsburgh, Pennsylvania on July 22 and 23. This semi-annual meeting provides an opportunity for interested parties to hear about the latest developments from the WiSA project and the three-valued logic analysis group at the University of Wisconsin, Madison and from the model checking group at Carnegie Mellon University.

News From 2002

Spring 2003 Visitors

During Spring 2003, we had two visitors: Stefan Schwoon and Bertrand Jeannet.

Dependence Graph Paper Included in PLDI Most Influential

The paper

Horwitz, S., Reps, T., and Binkley, D., Interprocedural slicing using dependence graphs. In Proceedings of the ACM SIGPLAN 88 Conference on Programming Language Design and Implementation, (Atlanta, GA, June 22-24, 1988), ACM SIGPLAN Notices 23, 7 (July 1988), pp. 35-46.

was selected for inclusion in a special SIGPLAN proceedings of the 50 most influential papers from the SIGPLAN Conference on Programming Language Design and Implementation from 1979 to 1999.

Three WiSA Students Pass Qualifying Exams

The members of the WiSA project are pleased to announce that three graduate students on the project passed their Ph.D qualifying exams this semester.

This page updated July 29, 2006.