Control-flow integrity principles, implementations, and applications M Abadi, M Budiu, U Erlingsson, J Ligatti ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009 | 1910 | 2009 |
Control-flow integrity principles, implementations, and applications M Abadi, M Budiu, U Erlingsson, J Ligatti ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009 | 1894 | 2009 |
Control-flow integrity principles, implementations, and applications M Abadi, M Budiu, U Erlingsson, J Ligatti ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009 | 1894 | 2009 |
Edit automata: Enforcement mechanisms for run-time security policies J Ligatti, L Bauer, D Walker International Journal of Information Security 4 (1-2), 2-16, 2005 | 404 | 2005 |
Composing security policies with polymer L Bauer, J Ligatti, D Walker Proceedings of the 2005 ACM SIGPLAN conference on Programming language …, 2005 | 230 | 2005 |
Run-time enforcement of nonsafety policies J Ligatti, L Bauer, D Walker ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-41, 2009 | 214 | 2009 |
More enforceable security policies L Bauer, J Ligatti, D Walker Proceedings of the Workshop on Foundations of Computer Security (FCS’02 …, 2002 | 172 | 2002 |
A theory of aspects D Walker, S Zdancewic, J Ligatti ACM SIGPLAN Notices 38 (9), 127-139, 2003 | 170 | 2003 |
Enforcing non-safety security policies with program monitors J Ligatti, L Bauer, D Walker European Symposium on Research in Computer Security, 355-373, 2005 | 117 | 2005 |
A theory of secure control flow M Abadi, M Budiu, U Erlingsson, J Ligatti International Conference on Formal Engineering Methods, 111-124, 2005 | 91 | 2005 |
Defining code-injection attacks D Ray, J Ligatti Acm Sigplan Notices 47 (1), 179-190, 2012 | 74 | 2012 |
A theory of runtime enforcement, with results J Ligatti, S Reddy European Symposium on Research in Computer Security, 87-100, 2010 | 74 | 2010 |
Fault-tolerant typed assembly language F Perry, L Mackey, GA Reis, J Ligatti, DI August, D Walker Proceedings of the 28th ACM SIGPLAN Conference on Programming Language …, 2007 | 58 | 2007 |
Composing expressive runtime security policies L Bauer, J Ligatti, D Walker ACM Transactions on Software Engineering and Methodology (TOSEM) 18 (3), 1-43, 2009 | 53 | 2009 |
Policy enforcement via program monitoring JA Ligatti Princeton University, 2006 | 53 | 2006 |
System and methods for authentication using multiple devices JA Ligatti, D Goldgof, C Cetin, J Subils US Patent 9,659,160, 2017 | 49 | 2017 |
Software security based on control flow integrity M Abadi, M Budiu, U Erlingsson, JA Ligatti US Patent 7,577,992, 2009 | 47 | 2009 |
Software memory access control M Abadi, U Erlingsson, JA Ligatti, M Budiu US Patent 7,337,291, 2008 | 44 | 2008 |
A type-theoretic interpretation of pointcuts and advice J Ligatti, D Walker, S Zdancewic Science of computer programming 63 (3), 240-266, 2006 | 37 | 2006 |
Static typing for a faulty lambda calculus D Walker, L Mackey, J Ligatti, GA Reis, DI August Proceedings of the eleventh ACM SIGPLAN international conference on …, 2006 | 37 | 2006 |