MURI Review
February 14, 2005
Arlington, Virgina
Speaker and Talk | PPT | |
---|---|---|
Somesh Jha: Project Overview | X | X |
Gogul Balakrishnan: Identifying Variables in x86 Executables | X | X |
Jonathon T. Giffin: Environment-Sensitive Intrusion Detection | X | X |
Louis Kruger: The BREW Project at Sandia | X | X |
Shai Rubin and Mihai Christodorescu: Testing Defensive Systems | X | X |
Vinod Ganapathy: Automatic Discovery of API-Level Exploits | X | X |
Hao Wang: Distributed Certificate-Chain Discovery | X | X |
MURI Review
August 16, 2004
Annapolis, MD
Speaker and Talk | PPT | |
---|---|---|
Somesh Jha: Project Overview | X | X |
Thomas Reps: Codesurfer for x86 | ||
Mihai Christodorescu: A Threat Model Methodology for Generating Test Cases | X | X |
Jonathon Giffin: Efficient Context-Sensitive Intrusion Detection | X | X |
IEEE Symposium on Security and Privacy
May 9–12, 2004
Oakland, California
Speaker and Talk | PPT | |
---|---|---|
Jonathon T. Giffin: Work in Progress
Presenting work done by Mihai Christodorescu, Shai Rubin, Somesh Jha, and Barton P. Miller. |
X | X |
MURI Review
November 13, 2003
Baltimore, MD
Speaker and Talk | PPT | |
---|---|---|
Somesh Jha: Vulnerability and Information Flow Analysis of COTS | X | X |
Somesh Jha: Overview of the WiSA Infrastructure and Applications | X | X |
Tim Teitelbaum, GrammaTech, Inc.: Support and Transition of Wisconsin CIP/URI | X | |
Thomas Reps: Analyzing Memory Accesses in x86 Executables | X | X |
Barton Miller: Attacks and Defenses | X | X |
Somesh Jha: Wrap-Up | X |
MURI Workshop
July 22 - 23, 2003
Pittsburgh, PA
Speaker and Talk | PPT | |
---|---|---|
Somesh Jha: Project Overview | X | X |
WiSA Integrated Project Demos
Hao Wang: Binary Code Generation |
X | X |
Mihai Christodorescu: Malware Detection Testing | X | X |
Gogul Balakrishnan: Analyzing Memory Accesses in Object Code | X | X |
Vinod Ganapathy: Static Analysis to Detect Buffer Overruns | X | X |
Jonathon Giffin: Specification-Based Monitoring | X | X |
Hao Wang and Louis Kruger: Combating Spyware | X | X |
MURI Workshop
January 27 - 28, 2003
Williamsburg, VA
Speaker and Talk | PPT | |
---|---|---|
Mihai Christodorescu: General Purpose Binary Rewriting | X | X |
Jonathon Giffin: Specification-Based Monitoring: Improving Model Precision | X | X |
Vinod Ganapathy: Buffer Overrun Detection via Static Analysis | X | X |
Gogul Balakrishnan: Analyzing Memory Accesses in Object Code | X | X |
Tom Reps: Pushdown Systems and Weighted Pushdown Systems | X | X |
MURI Workshop
July 11 - 12, 2002
Harpers Ferry, WV
Speaker and Talk | PPT | |
---|---|---|
Somesh Jha: Project Overview | X | X |
Jonathon Giffin: Specification-Based Analysis and Enforcement | X | X |
Jonathon Giffin: Intel x86 Analysis Infrastructure and Demo | X | X |
Gogul Balakrishnan: Preparing Object Code for Static Analysis | X | X |
Vinod Ganapathy: Static Analysis Techniques to Detect Buffer Overrun Vulnerabilities | X | X |
Mihai Christodorescu: Detecting Malicious Patterns in Executables via Model Checking | X | X |
Alexey Loginov: Towards Abstraction Refinement in TVLA | X | X |
A. Mulhern: Verifying Behavioral Subtyping in TVLA | X | X |
MURI Workshop
January 14 - 15, 2002
Washington, DC
Speaker and Talk | PPT | |
---|---|---|
Somesh Jha: Project Overview | X | X |
Thomas Reps: Static Analysis Techniques for Security | X | X |
Gogul Balakrishnan: Infrastructure for Analysis of Object Code | X | X |
Vinod Ganapathy: Static Analysis Techniques to Detect Buffer Overrun Vulnerabilities | X | X |
Mihai Christodorescu: A Description of a Virus Scanner That Uses Model Checking Ideas | X | X |
Bart Miller: Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes | X | X |
Jonathon Giffin: Determining the Integrity of Remote System Call Streams | X | X |
Alexey Loginov: Towards Abstraction Refinement in TVLA | X | X |
ONR Site Visit
November 8, 2001
Madison, WI
Speaker and Talk | PPT | |
---|---|---|
Somesh Jha: CodeSurfer Overview | X | X |
Mihai Christodorescu: A Quick Look Into Model Checking of Binaries, With an Interesting Application: Virus Scanning | X | X |
Somesh Jha: Attack Graphs | X | X |
USENIX Security Symposium
Work-In-Progress Session
August 17, 2001
Washington, DC
Speaker | PPT | |
---|---|---|
Jonathon Giffin (untitled talk) | X | X |