Papers

[2000] [1999] [1998] [1997][1996][1995][1994][1993][1992][1991][1990][1989]

2000

    S. Cheung and K.N. Levitt. 2000. "A Formal-Specification Based Approach for Protecting the Domain Name System." Proceedings of the International Conference on Dependable Systems and Networks, New York City, New York, June 25-28, 2000, pp.641-651. [Postscript

    J.R. Hughes. "Conservation of Flow as a Security Mechanism in Network Protocols." Masters Thesis, June 2000. [PDF] [PostScript

    J.R. Hughes, T. Aura, M. Bishop. 2000. "Using Conservation of Flow as a Security Mechanism in Network Protocols." Proceedings of the 2000 IEEE Symposium on Security and Privacy, Oakland, California, May 14-17, 2000, pp. 132-141. [PDF] [PostScript

1999

    M. Bellare and P. Rogaway. 1999. "On the construction of variable-input-length ciphers." Fast Software Encryption, 6th International Workshop, FSE'99, Springer-Verlag.[Abstract] [PDF] [PostScript

    A. Borgida and P. Devanbu, P. 1999. "Component inter-operability---putting 'DL' to 'IDL'." Proceedings of the International Conference on Software Enginering. [PDF

    S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, J. Rowe, S. Staniford-Chen, R. Yip, D. Zerkle. 1999. "The Design of GrIDS: A Graph-Based Intrusion Detection System." U.C. Davis Computer Science Department Technical Report CSE-99-2, 1999. [PDF] [Postscript]

    C. Chung, M. Gertz, K. Levitt.  1999. "DEMIDS:  A Misuse Detection System for Database Systems." To appear in Integrity and Internal Control in Information Systems IFIP WG11.5 1999. [PDF] [Postscript]

    W. Cohen and P. Devanbu. 1999. "Automatically Exploring Hypotheses about Fault Prediction: a Comparative Study of Inductive Logic Programming Methods." International Journal of Software Engineering and Knowledge Engineering, to appear. [PDF]

    P. Devanbu. 1999. "Chime: Customizable Hyperlink Insertion and Maintenance Engine for Software Engineering Environments." International Conference on Software Engineering, in press. [PDF]

    P. Devanbu. 1999. "GENOA - A Customizable, front-end retargetable Source Code Analysis Framework." ACM Transactions on Software Engineering and Methodology 27; accepted. [PDF

    P. Devanbu and S. G. Stubblebine. 1999. "Cryptographic Verification of Test Coverage Claims." IEEE Transactions on Software Engineering 24; in press.[PDF

    P. Devanbu. 1999. "A Reuse Nightmare: Honey, I got the wrong DLL (Invited Panel Position Paper)." Proceedings of the ACM Symposium on Software Reusability (ACM SSR'99). [PDF

    R. Feiertag, L. Benzinger, S. Rho, S. Wu, K. Levitt, D. Peticolas, M. Heckman, S. Staniford-Chen, C. Zhang. 1999. "Intrusion Detection Inter-component Adaptive Negotiation." Proceedings of the RAID 99: Recent Advances in Intrusion Detection. [PDF] [Postscript]

    M. Gertz, S. Stubblebine, and P. Devanbu. 1999. "Security for Automated, Distributed Configuration Management." Proceedings of the ICSE 99 Workshop on Software Engineering over the Internet. [PDF

1998

    M. Bellare, T. Krovetz, and P. Rogaway, "Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible," Advances in Cryptology-Eurocrypt 98 Proceedings, Lecture Notes in Computer ScienceVol. 1403 Springer-Verlag (1998) [PDF][Postscript]

    K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R.A. Olsson, "Detecting Disruptive Routers: A Distributed Network Monitoring Approach," Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, California, May 3-6, 1998, pp.115-124. [PDF][Postscript]

    M. Clifford, C. Lavine, and M. Bishop, "The Solar Trust Model: Authentication Without Limitation," Proceedings of the 14th Annual Computer Security Applications Conference, 1998, pp. 300-307 [PDF]

    P. Devanbu, S. Stubblebine, "Preserving data structure integrity on hostile platforms," IEEE Symposium on Security and Privacy Oakland, CA (1998). [PDF][Postscript]

    P. Devanbu, P.W. Wong, S. Stubblebine, "Techniques for trusted software engineering," Proceedings of the 20th International Conference on Software Engineering Kyoto, Japan (1998). [PDF][Postscript]

    B. Hashii, M. Lal, R. Pandey and S. Samorodin, "Securing Systems against External Programs," IEEE Internet Computing 2(6): 35-45 [PDF]

    M. R. Heckman, and K. N. Levitt, "Applying the Composition Principle to Verify a Hierarchy of Security Servers," Proceedings of the Thirty-First Hawaii International Conference on System Sciences, 3, pp. 338-347 [PDF]

    R. Pandey and B. Hashii, "Providing fine-grained access control for mobile programs through binary editing" Submitted to 5th ACM Conference on Computer and Communications Security

    R. Yip, K. Levitt, "Data Level Inference Detection in Database Systems," Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 9-11, 1998, pp. 179-189. [PDF][Postscript]

    R. Yip, K. Levitt, "The Design and Implementation of a Data Level Database Inference Detection System," Proceedings of the Twelfth Annual IFIP WG 11.3 Working Conference on Database Security, Chalkidiki, Greece, July 15-17, 1998. [PDF][Postscript]

1997

    M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, "A Concrete Security Treatment of Symmetric Encryption," Proceedings of the 38th Annual Symposium on Foundations of Computer Science pp. 115-124 [PDF].

    M. Bishop, "Conspiracy and Information Flow in the Take-Grant Protection Model" Journal of Computer Security4(4)(1996)pp. 331-359 [PDF][Postscript]

    M. Bishop, "Information Survivability, Security, and Fault Tolerance," position paper for the Information Survivability Workshop Journal of Computer Security #6(Feb.1997) [PDF][Postscript]

    M. Bishop, "Teaching Computer Security," position paper for the Workshop on Education in Computer Security, Monterey, CA (Jan. 1997). [PDF][Postscript]

    M. Bishop, S. Cheung, C. Wee, J. Frank, J. Hoagland, and S. Samorodin, "The Threat from the Net" IEEE Spectrum, 34(8):56-63 [PDF]

    S. Cheung, K. N. Levitt, "Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection" Proc. New Security Paradigms Workshop 1997, Cumbria, UK, September 23-26, 1997. [PDF][PostScript]

    S. Cheung, "An Efficient Message Authentication Scheme for Link State Routing". Proc.13th Annual Computer Security Applications Conference, San Diego, California, December 8-12, 1997, pp. 90-98. [PDF][PostScript]

    P. Devanbu, S. Stubblebine, "Cryptographic verification of test coverage claims," Proceedings, Fifth ACM/SIGSOFT Conference on Foundations of Software Engineering Zurich, Switzerland (1997). [PDF][Postscript]

    G. Fink, M. Bishop, "Property Based Testing: A New Approach to Testing for Assurance," ACM SIGSOFT Software Engineering Notes, 22(4) (July 1997). [PDF][Postscript]

    C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-critical Programs in Distributed Systems: A Specification-based Approach," Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 134-144 [PDF].

    N. Puketza, M. Chung, R. A. Olsson and B. Mukherjee, "A Software Platform for Testing Intrusion Detection Systems," IEEE Software, 14(5): 43-51 [PDF]

    C. Zhang, B. R. Becker, D. Peticolas, M. Heckman, K. Levitt, and R. A. Olsson, "Verification of a distributed computing system by layered proofs," Proceedings of the Thirtieth Hawaii International Conference on System Sciences, 5, pp. 252-261 [PDF]

1996

    M. Bishop, M. Dilger , "Checking for Race Conditions in File Access". Computing Systems 9(2) (Spring 1996), pp. 131-152. [Abstract][PDF][PostScript].

    M. Bishop, L.T. Heberlein , "An Isolated Network for Research". The 19th National Information Systems Security Conference. [PostScript]. [PDF].

    M. Bishop, C. Wee, J. Frank , "Goal Oriented Auditing and Logging." Submitted to IEEE Transactions on Computing Systems [PostScript]. [PDF].

    J. Frank, M. Bishop , "Extending the Take-Grant Protection Model." Submitted to The IEEE Oakland Conference on Research in Security and Privacy. [PDF][PostScript].

    B. Guha, B. Mukherjee , "Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions". Proc. of the IEEE Infocom'96 , San Francisco, CA, March 1996, pp. 603-610. [Abstract][PDF][PostScript].

    L.T. Heberlein, M. Bishop , "Attack Class: Address Spoofing". The 19th National Information Systems Security Conference. [Paper/PDF][Slides/PDF]

    C.C.W. Ko , "Execution Monitoring of Security-Critical Programs in a Distributed System: A Specification-Based Approach", Ph.D. Thesis, August 1996. [Abstract][PDF][PostScript]

    N. F. Puketza, K. Zhang, M. Chung, B. Mukherjee, R. A. Olsson , "A Methodology for Testing Intrusion Detection Systems". IEEE Transactions on Software Engineering, Vol.22, No.10, October 1996, pp.719-729. [PDF][PostScript].

    D. O'Brien , "Recognizing and Recovering from Rootkit Attacks". Sys Admin 5(11) (November 1996), pp. 8-20.

    P. Rogaway (with M. Bellare), "The Exact Security of Digital Signatures--How to Sign with RSA and Rabin". Earlier version appears in Advances in Cryptology -- Eurocrypt '96 , LNCS Vol.1070, U. Maurer ed., Springer-Verlag, pp. 399-416. [Abstract][PDF][PostScript].

    P. Rogaway (with J. Kilian), "How to Protect DES Against Exhaustive Key Search". Advances in Cryptology - CRYPTO '96.[Abstract][PDF][PostScript].

    S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, D. Zerkle, "GrIDS -- A Graph-Based Intrusion Detection System for Large Networks". The 19th National Information Systems Security Conference. [PDF][PostScript].

    D. Zerkle, K. Levitt , "NetKuang--A Multi-Host Configuration Vulnerability Checker". Proc. of the 6th USENIX Security Symposium. San Jose, California, July 22-25, 1996, pp. 195-204. [PDF][PostScript].

1995

    M. Bishop , "Theft of Information in the Take-Grant Protection System". Journal of Computer Security, Vol.3, No.4, pp. 283-308. [Abstract].

    M. Bishop , "A Standard Audit Log Format". Proc. of the 1995 National Information Systems Security Conference. Baltimore, Maryland, October 10-13, 1995, pp. 136-145. [PostScript][PDF].

    M. Bishop, D.V. Klein , "Improving System Security via Proactive Password Checking". Computers & Security, 1995, Vol.14, No.3, pp. 233-249. [PostScript].

    S. Cheung, K.N. Levitt, C. Ko , "Intrusion Detection for Network Infrastructures". The 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 1995. Short Presentation. [PostScript].

    M. Chung, N. Puketza, R.A. Olsson, B. Mukherjee , "Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions". Proc. of the 1995 National Information Systems Security Conference. Baltimore, Maryland, October 10-13, 1995, pp. 173-183. [Abstract][PostScript].

    L.T. Heberlein , "Network Security Monitor (NSM) - Final Report". Lawrence Livermore National Laboratory project deliverable. [PDF]

    J. Hoagland, C. Wee, K.N. Levitt , "Audit Log Analysis Using the Visual Audit Browser Toolkit". U.C. Davis Computer Science Department Technical Report CSE-95-11, 1995. [Abstract][PostScript].

    R.W. Lo, K.N. Levitt, R.A. Olsson , "MCF: a Malicious Code Filter". Computers & Security, 1995, Vol.14, No.6, pp. 541-566. [Abstract][PostScript].

    P. Rogaway , "Bucket Hashing and Its Applications to Fast Message Authentication". Advances in Cryptology - CRYPTO '95.[Abstract][PostScript].

    P. Rogaway (with M. Bellare), "Provably Secure Session Key Distribution --- The Three Party Case". Proc. of the 27th Annual ACM Symposium on Theory of Computing. Las Vegas, NV, May 29-June 1, 1995. [Abstract][PostScript].

    P. Rogaway (with M. Bellare, R. Guerin), "XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions". Advances in Cryptology - CRYPTO '95. [Abstract][PostScript].

    S. Staniford-Chen, and L.T. Heberlein , "Holding Intruders Accountable on the Internet". Proc. of the 1995 IEEE Symposium on Security and Privacy, Oakland, CA, 8-10 May 1995, pp. 39-49. [Abstract][PostScript][PDF].

    C. Wee , "LAFS: A Logging and Auditing File System". The 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 1995. [Extended Abstract].

    C. Wee , "LAFS: A Logging and Auditing File System". Proc. of the 11th Computer Security Applications Conference, 1995. [PostScript], [PDF].

1994

    G. Fink, C. Ko, M. Archer, K. Levitt , "Toward a Property-based Testing Environment with Application to Security Critical Software". Proc. of the 4th Irvine Software Symposium. April 1994, pp. 39-48. [Abstract][PostScript]

    G. Fink, K. Levitt , "Property-based Testing of Privileged Programs". Proceedings of the 10th Annual Computer Security Applications Conference Orlando, FL, 5-9 Dec. 1994, pp. 154-163. [Abstract][PostScript][PDF]

    J. Frank , "Machine Learning and Intrusion Detection: Current and Future Directions". Proc. of the 17th National Computer Security Conference, October 1994. [PostScript]

    C. Ko, G. Fink, K. Levitt , "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring". Proc. of the 10th Annual Computer Security Applications Conference, Orlando, FL, 5-9 Dec. 1994, pp. 134-144. [Abstract] [PostScript][PDF]

    K.N. Levitt, S. Cheung, "Common Techniques in Fault-Tolerance and Security". Proc. of the Dependable Computing for Critical Applications 4 , San Diego, california, 4-6 Jan. 1994, pp. 373-377. [PostScript]

    B. Mukherjee, L.T. Heberlein, K.N. Levitt , "Network Intrusion Detection". IEEE Network , May-June 1994, Vol.8, No.3, pp.26-41. [Abstract][PDF]

    N. Puketza, B. Mukherjee, R.A. Olsson, K. Zhang , "Testing Intrusion Detection Systems: Design Methodologies and Results from an Early Prototype". Proc. of the 17th National Computer Security Conference, October 1994, pp. 1-10. 

    P. Rogaway (with M. Bellare), "Optimal Asymmetric Encryption". Eurocrypt '94.[Abstract][PostScript]

    P. Rogaway (with M. Bellare, J. Kilian), "The Security of Cipher Clock Chaining". Advances in Cryptology - CRYPTO '94. Santa Barbara, CA, 21-25 August, 1994, pp. 341-358. [Abstract][PostScript]

    P. Tendick, N. Matloff , "A Modified Random Perturbation Method for Database Security". ACM Transactions on Database Systems , March 1994, Vol.19, No.1, pp.47-63. [Abstract].

1993

    M. Bishop , "Recent Changes to Privacy-Enchanced Electronic Mail". Journal of Internetworking: Research and Experience. Vol.4, No.1, March 1993, pp. 47-59. [Abstract].

    M. Bishop , "Password Selection Criteria". Proc. of the 6th International Computer Virus and Security Conference. New York, NY, March 1993.

    M. Bishop , "Teaching Computer Security". Proc. of the 9th IFIP International Symposium on Computer Security, IFIP/Sec '93. May 1993, pp. 43-52. [Abstract].

    R. Crawford, P. Kerchen, K. Levitt, R. Olsson, M. Archer, M. Casillas , "Automated Assistance for Detecting Malicious Code". Proc. of the 6th International Computer Virus and Security Conference. New York, NY, 1993.

    D. Gusfield (with M.Y. Kao), "Detection and Protection of Linear Information in Cross Tabulation". SIAM Journal on Discrete Mathematics. Vol.6, No.3, August 1993, pp.460-476.

    C. Ko, D. Frincke, T. Goan, L.T. Heberlein, K. Levitt, B. Mukherjee, C. Wee , "Analysis of an Algorithm for Distributed Recognition and Accountability". Proc. 1st ACM Conference on Computer and Communication Security. Fairfax, VA, Nov. 1993, pp. 154-164. [Abstract][PostScript].

    P. Rogaway (with M. Bellare), "Entity Authentication and Key Distribution". Advances in Cryptology - CRYPTO '93. Santa Barbara, CA, 22-26 August, 1993, pp. 232-249. [Abstract][PostScript].

    P. Rogaway (with M. Bellare), "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols". Proc. of the 1st ACM Conference on Computer and Communication Security. Fairfax, VA, Nov. 1993, pp. 154-164. [PostScript].

    P. Rogaway (with D. Coppersmith), "A Software-optimized Encryption Algorithm". Proc. of the Fast Software Encryption. Cambridge Security Workshop. Cambridge, UK, 9-11 Dec. 1993, pp. 56-63. [Abstract][PostScript]

    B. Wetmore , "Audit Browsing", Masters Thesis, 1993. [PDF][PostScript][PostScript (ver. 2)]

1992

    M. Bishop , "Anatomy of a Proactive Password Changer". Proc. of the UNIX Security Symposium III Baltimore, MD, 14-16 Sept. 1992, pp. 171-84. [Abstract][PostScript].

    R. H. Crawford, R. A. Olsson, W. W. Ho, C. E. Wee, "Semantic Issues in the Design of Languages for Debugging," Proceedings of the 1992 International Conference on Computer Languages, pp. 252-261 [PDF]

    G. Fink, L. Yang, M. Archer, "PM: A Unified Automated Deduction Tool for Verification". Proc. of the 15th National Computer Security Conference, Baltimore, MD, 13-16 October 1992, pp. 473-481.

    D. Frincke, M. Archer, K. Levitt, "Finding Security Flaws in Concurrent Systems". Proc. of the 15th National Computer Security Conference, Baltimore, MD, 13-16 October 1992, pp. 194-203.

    L.T. Heberlein, B. Mukherjee, K.N. Levitt, "Internetwork Security Monitor". Proc. of the 15th National Computer Security Conference, October 1992, pp. 262-271. 

    W. Ho , "Debugging and dynamic linking", Ph.D. Thesis, 1992. Title Sheet [PostScript]. [PostScript]

1991

    J. Alves-Foss, K. Levitt , "The Verification of Secure Distributed Systems". COMPCON Spring '91. Digest of Papers. San Francisco, CA, 25 Feb.-1 March 1991, pp. 177-184 [PDF].

    J. Alves-Foss, K. Levitt , "Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components". Proc. of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy. Oakland, CA, 20-22 May 1991, pp. 122-35 [Abstract][PDF].

    J. Alves-Foss, K. Levitt , "Mechanical Verification of Secure Distributed Systems in Higher Order Logic". Proc. of the 1991 International Workshop on the HOL Theorem Prover and its Applications. August 1991, pp. 263-278. 

    M. Archer, J. Bock, J. Frincke and K. Levitt, "Effectiveness of Operating System Prototyping from a Template: Application to MIMIX," Second International Workshop on Rapid System Prototyping: Shortening the Path from Specification to Prototype, 1991, pp. 55-66 [PDF]

    M. Bishop , "An Authentication Mechanism for USENET". Proc. of the Winter 1991 USENIX Conference. 21-25 Jan. 1991, pp. 281-287. [Abstract].

    M. Bishop , "Password Management". COMPCON Spring '91. Digest of Papers. San Francisco, CA, 25 Feb.-1 March 1991, pp. 167-169. [Abstract][PDF]..

    M. Bishop , "A Proactive Password Checker". Proc. of the 7th International Conference on Information Security. May 1991, pp. 169-181. [Abstract][PostScript].

    M. Bishop , "Privacy-Enchanced Electronic Mail". Journal of Internetworking: Research and Experience. Vol.2, No.4, Dec. 1991, pp. 199-233. [Abstract].

    J. Brentano, S.R. Snapp, G.V. Dias, T.L. Goan, L.T. Heberlein, C.L. Ho, K.N. Levitt, B. Mukherjee, (with S.E. Smaha), "An Architecture for a Distributed Intrusion Detection System". Proc. of the 14th Department of Energy Computer Security Group Conference, May 1991, pp.(17)25-(17)45.

    R. Crawford, R. Lo, J. Crossley, P. Kerchen, G. Fink, W. Ho, K. Levitt, R. Olsson, M. Archer , "A Testbed for Malicious Code Detection: A Synthesis of Static and Dynamic Analysis Techniques". Proc. of the 14th Department of Energy Computer Security Group Conference, May 1991, pp.(17)1-(17)23. 

    D. A. Frincke, G. L. Fisher, M. Archer and K. Levitt, "An Application of Template Methodology: Rapid Prototyping of User Interface Management Systems," Second International Workshop on Rapid System Prototyping: Shortening the Path from Specification to Prototype, 1991, pp. 55-66. [PDF]

    D. A. Frincke, M. Archer and K. Levitt, "CTPLAN: A Planning-based Approach to Automatically Detecting Flaws in Concurrent Algorithms," Proceedings of the 6th Annual Knowledge-Based Software Engineering Conference, pp. 151-160 [PDF]

    W. L. Harrison, and K. N. Levitt, "Mechanizing Security in HOL", International Workshop on the HOL Theorem Proving System and Its Applications, pp. 63-66 [PDF]

    L. T. Heberlein, B. Mukherjee, K. N. Levitt, "A Method to Detect Intrusive Activity in a Networked Environment". Proc. of the 14th National Computer Security Conference, October 1991, pp. 362-371. 

    L.T. Heberlein, B. Mukherjee, K.N. Levitt, G. Dias, (with D. Mansur), "Towards Detecting Intrusions in a Networked Environment". Proc. of the 14th Department of Energy Computer Security Group Conference, May 1991, pp.(17)47-(17)65. 

    R. Lo, P. Kerchen, R. Crawford, W. Ho, J. Crossley, G. Fink, K. Levitt, R. Olsson, M. Archer , "Towards a Testbed for Malicious Code Detection". COMPCON Spring '91. Digest of Papers. San Francisco, CA, 25 Feb.-1 March 1991, pp. 160-166. [Abstract][PDF]

    R. A. Olsson, "Parallelism, Distribution, and Synchornization in SR," COMPCON Spring '91. Digest of Papers. pp. 407-412 [PDF]

    R. A. Olsson, R. H. Crawford, W. W. Ho, and C. E. Wee, "Sequential Debugging at a High Level of Abstraction," IEEE Software 8(3): 27-36 [PDF]

    P. Rogaway (with S. Micali), "Secure Computation". Proc. Advances in Cryptology - CRYPTO '91, Santa Barbara, CA, 11-15 August, 1991, pp. 392-404. [Abstract].

    S.R. Snapp, J. Brentano, G.V. Dias, T.L. Goan, L.T. Heberlein, C.L. Ho, K.N. Levitt, B. Mukherjee, (with T. Grance D.L. Mansur, K.L. Pon, S.E. Smaha), "A System for Distributed Intrusion Detection". COMPCON Spring '91. Digest of Papers. San Francisco, CA, 25 Feb.-1 March 1991, pp. 170-176. [Abstract][PDF]..

    S.R. Snapp, J. Brentano, G.V. Dias, L.T. Heberlein, C. Ho, K.N. Levitt, B. Mukherjee, (with S.E. Smaha, T. Grance, D.M. Teal, D.L. Mansur), "DIDS -- Motivation, Architecture, and an Early Prototype". Proc. 14th National Computer Security Conference. Washington, DC, Oct. 1991, pp. 167-176. [PDF].

    S.R. Snapp, B. Mukherjee, K.N. Levitt, "Detecting Intrusions Through Attack Signature Analysis". Proc. 3rd Workshop on Computer Security Incident Handling. Herndon, VA, August 1991.

1990

    M. Archer, D. Frincke and K. Levitt, "A Template for Rapid Prototyping of Operating Systems," First International Workshop on Rapid System Prototyping: Shortening the Path from Specification to Prototype, 1990, pp. 119-127 [PDF]

    M. Bishop, "Collaboration Using Roles". Software -- Practice and Experience. Vol.20, No.5, May 1990, pp. 485-498. [Abstract].

    M. Bishop, "An Extendable Password Checker". Proc. UNIX Security II Portland, OR, 27-28 Aug. 1990, pp. 15-16. [Abstract].

    M. Bishop, "A Security Analysis of the NTP Protocol Version 2". Proc. 6th Annual Computer Security Applications Conference Tucson, AZ, 3-7 Dec. 1990, pp. 20-29. [Abstract] [PDF]..

    D. Frincke, M. Archer, K. Levitt, "A Planning System for the Intelligent Testing of Secure Software". Proc. 5th Annual RADC Knowledge Based Software Assistant (KBSA) Conference, 1990.

    D. Gusfield, "A Little Knowledge Goes a Long Way: A Faster Algorithm for Finding Compromised Data in 2-D Tables". Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. Oakland, CA, 7-9 May 1990, pp. 86-94. [Abstract].

    L.T. Heberlein, G.V. Dias, K.N. Levitt, B. Mukherjee, (with J. Wood, D. Wolber), "A Network Security Monitor". Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. Oakland, CA, 7-9 May 1990, pp. 296-304. [Abstract][PDF].

    P. Kerchen, R. Lo, J. Crossley, G. Elkinbard, R. Olsson, "Static Analysis Virus Detection Tools for UNIX Systems". Proc. 13th National Computer Security Conference. Washington, DC, 1-4 Oct. 1990, pp. 350-365. [Abstract].

    P. Rogaway (with D. Beaver, J. Feigenbaum, J. Kilian), "Security with Low Communication Overhead". Proc. Advances in Cryptology - CRYPTO '90, Santa Barbara, CA, 11-15 August, 1990, pp. 62-76. [Abstract].

    P. Rogaway (with D. Beaver, S. Micali), "The Round Complexity of Secure Protocols". Proceedings of the 22nd Annual ACM Symposium on Theory of Computing. Baltimore, MD, 14-16 May 1990, pp. 503-513. [Abstract].

    D.R. Wichers, D.M. Cook, R.A. Olsson, J. Crossley, P. Kerchen, K. Levitt, R. Lo, "PACL's: An Access Control List Approach to Anti-viral Security". Proc. 13th National Computer Security Conference. Washington, DC, 1-4 Oct. 1990, pp. 340-349. [Abstract].

    P.J. Windley, "A Hierarchical Methodology for Verifying Microprogrammed Microprocessors". Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. Oakland, CA, 7-9 May 1990, pp. 345-357. [Abstract].

1989

    M. Bishop, "A Model of Security Monitoring," Proceedings of the Fifth Annual Computer Security Applications Conference, 1989, pp. 46-52 [PDF].

Last Updated March 9, 2000