Control-flow integrity principles, implementations, and applications M Abadi, M Budiu, U Erlingsson, J Ligatti ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009 | 1932 | 2009 |
Control-flow integrity principles, implementations, and applications M Abadi, M Budiu, U Erlingsson, J Ligatti ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009 | 1916 | 2009 |
Control-flow integrity principles, implementations, and applications M Abadi, M Budiu, U Erlingsson, J Ligatti ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009 | 1916 | 2009 |
Edit automata: Enforcement mechanisms for run-time security policies J Ligatti, L Bauer, D Walker International Journal of Information Security 4 (1-2), 2-16, 2005 | 407 | 2005 |
Composing security policies with polymer L Bauer, J Ligatti, D Walker Proceedings of the 2005 ACM SIGPLAN conference on Programming language …, 2005 | 231 | 2005 |
Run-time enforcement of nonsafety policies J Ligatti, L Bauer, D Walker ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-41, 2009 | 214 | 2009 |
More enforceable security policies L Bauer, J Ligatti, D Walker Proceedings of the Workshop on Foundations of Computer Security (FCS’02 …, 2002 | 172 | 2002 |
A theory of aspects D Walker, S Zdancewic, J Ligatti ACM SIGPLAN Notices 38 (9), 127-139, 2003 | 170 | 2003 |
Enforcing non-safety security policies with program monitors J Ligatti, L Bauer, D Walker European Symposium on Research in Computer Security, 355-373, 2005 | 117 | 2005 |
A theory of secure control flow M Abadi, M Budiu, U Erlingsson, J Ligatti International Conference on Formal Engineering Methods, 111-124, 2005 | 92 | 2005 |
A theory of runtime enforcement, with results J Ligatti, S Reddy European Symposium on Research in Computer Security, 87-100, 2010 | 75 | 2010 |
Defining code-injection attacks D Ray, J Ligatti Acm Sigplan Notices 47 (1), 179-190, 2012 | 74 | 2012 |
Fault-tolerant typed assembly language F Perry, L Mackey, GA Reis, J Ligatti, DI August, D Walker Proceedings of the 28th ACM SIGPLAN Conference on Programming Language …, 2007 | 58 | 2007 |
Composing expressive runtime security policies L Bauer, J Ligatti, D Walker ACM Transactions on Software Engineering and Methodology (TOSEM) 18 (3), 1-43, 2009 | 53 | 2009 |
Policy enforcement via program monitoring JA Ligatti Princeton University, 2006 | 53 | 2006 |
System and methods for authentication using multiple devices JA Ligatti, D Goldgof, C Cetin, J Subils US Patent 9,659,160, 2017 | 50 | 2017 |
Software security based on control flow integrity M Abadi, M Budiu, U Erlingsson, JA Ligatti US Patent 7,577,992, 2009 | 48 | 2009 |
Software memory access control M Abadi, U Erlingsson, JA Ligatti, M Budiu US Patent 7,337,291, 2008 | 44 | 2008 |
Modeling runtime enforcement with mandatory results automata E Dolzhenko, J Ligatti, S Reddy International Journal of Information Security 14 (1), 47-60, 2015 | 38 | 2015 |
A type-theoretic interpretation of pointcuts and advice J Ligatti, D Walker, S Zdancewic Science of computer programming 63 (3), 240-266, 2006 | 37 | 2006 |