Publications
Methods, apparatus, and program products for inferring service usage
Jessica N Staddon
,
Robert T Johnson
(2008).
Cite
Flow-Insensitive Type Qualifiers
Jeffrey S Foster
,
Robert Johnson
,
John Kodumal
,
Alex Aiken
Transactions on Programming Languages
. (2008).
Cite
A practical mimicry attack against powerful system-call monitors
Chetan Parampalli
,
R Sekar
,
Rob Johnson
Proceedings of the 2008 ACM symposium on Information, computer and communications security
. (2008).
Cite
Methods, apparatus, and program products for inferring service usage
Jessica N Staddon
,
Robert T Johnson
(2007).
Cite
RICH: Automatically protecting against integer-based vulnerabilities
David Brumley
,
Tzi-Cker Chiueh
,
Robert Johnson
,
Huijia Lin
,
Dawn Song
Network and Distributed Systems Security (NDSS)
. (2007).
Cite
More content-less control: Access control in the web 2.0
Michael Hart
,
Rob Johnson
,
Amanda Stent
IEEE Web 2.0 Security and Privacy Workshop
. (2007).
Cite
Efficient and accurate detection of integer-based attacks
David Brumley
,
Tzi-Cker Chiueh
,
Robert Johnson
,
Huijia Lin
,
Dawn Song
Proc. 14th Annual Network and Distributed System Security Symp.(NDSS’07)
. (2007).
Cite
Deflation-secure web metering
Rob Johnson
,
Jessica Staddon
International Journal of Information and Computer Security
. (2007).
Cite
Verifying security properties using type-qualifier inference
Robert Timothy Johnson
(2006).
Cite
Fixing races for fun and profit: how to abuse atime
Nikita Borisov
,
Rob Johnson
,
Naveen Sastry
,
David Wagner
USENIX Security
. (2005).
Cite
« Previous
Next »