MURI Review
February 14, 2005
Arlington, Virgina
Speaker
and Talk |
PPT |
PDF |
Somesh
Jha: Project Overview |
X |
X |
Gogul
Balakrishnan: Identifying Variables in x86 Executables |
X |
X |
Jonathon
T. Giffin: Environment-Sensitive Intrusion Detection |
X |
X |
Louis
Kruger: The BREW Project at Sandia |
X |
X |
Shai
Rubin and Mihai Christodorescu: Testing Defensive Systems |
X |
X |
Vinod
Ganapathy: Automatic Discovery of API-Level Exploits |
X |
X |
Hao Wang:
Distributed Certificate-Chain Discovery |
X |
X |
MURI Review
August 16, 2004
Annapolis, MD
Speaker
and Talk |
PPT |
PDF |
Somesh
Jha: Project Overview |
X |
X |
Thomas
Reps: Codesurfer for x86 |
|
|
Mihai
Christodorescu: A Threat Model Methodology for Generating Test Cases |
X |
X |
Jonathon
Giffin: Efficient Context-Sensitive Intrusion Detection |
X |
X |
IEEE Symposium on Security
and Privacy
May 9–12, 2004
Oakland, California
Speaker
and Talk |
PPT |
PDF |
Jonathon
T. Giffin: Work in Progress
Presenting work done by
Mihai Christodorescu, Shai Rubin, Somesh Jha, and Barton P. Miller.
|
X |
X |
MURI Review
November 13, 2003
Baltimore, MD
Speaker
and Talk |
PPT |
PDF |
Somesh
Jha: Vulnerability and Information Flow Analysis of COTS
|
X |
X |
Somesh
Jha: Overview of the WiSA Infrastructure and Applications
|
X |
X |
Tim
Teitelbaum, GrammaTech, Inc.: Support and Transition of Wisconsin
CIP/URI |
X |
|
Thomas
Reps: Analyzing Memory Accesses in x86 Executables |
X |
X |
Barton
Miller: Attacks and Defenses |
X |
X |
Somesh
Jha: Wrap-Up |
X |
|
MURI Workshop
July 22 - 23, 2003
Pittsburgh, PA
Speaker
and Talk |
PPT |
PDF |
Somesh
Jha: Project Overview |
X |
X |
WiSA
Integrated Project Demos
Hao Wang: Binary
Code Generation
Hong Lin: Dynamic Buffer Overflow Detection
Mihai Christodorescu: Malicious Code Obfuscation & Detection
Vinod Ganapathy: Static Buffer Overflow Detection
Gogul Balakrishnan: Value Set Analysis
|
X |
X |
Mihai
Christodorescu: Malware Detection Testing |
X |
X |
Gogul
Balakrishnan: Analyzing Memory Accesses in Object Code |
X |
X |
Vinod
Ganapathy: Static Analysis to Detect Buffer Overruns |
X |
X |
Jonathon
Giffin: Specification-Based Monitoring |
X |
X |
Hao Wang
and Louis Kruger: Combating Spyware |
X |
X |
MURI Workshop
January 27 - 28, 2003
Williamsburg, VA
Speaker
and Talk |
PPT |
PDF |
Mihai
Christodorescu: General Purpose Binary Rewriting |
X |
X |
Jonathon
Giffin: Specification-Based Monitoring: Improving Model Precision |
X |
X |
Vinod
Ganapathy: Buffer Overrun Detection via Static Analysis |
X |
X |
Gogul
Balakrishnan: Analyzing Memory Accesses in Object Code |
X |
X |
Tom Reps:
Pushdown Systems and Weighted Pushdown Systems |
X |
X |
MURI Workshop
July 11 - 12, 2002
Harpers Ferry, WV
Speaker
and Talk |
PPT |
PDF |
Somesh
Jha: Project Overview |
X |
X |
Jonathon
Giffin: Specification-Based Analysis and Enforcement |
X |
X |
Jonathon
Giffin: Intel x86 Analysis Infrastructure and Demo |
X |
X |
Gogul
Balakrishnan: Preparing Object Code for Static Analysis |
X |
X |
Vinod
Ganapathy: Static Analysis Techniques to Detect Buffer Overrun
Vulnerabilities |
X |
X |
Mihai
Christodorescu: Detecting Malicious Patterns in Executables via
Model Checking |
X |
X |
Alexey
Loginov: Towards Abstraction Refinement in TVLA |
X |
X |
A.
Mulhern: Verifying Behavioral Subtyping in TVLA |
X |
X |
MURI Workshop
January 14 - 15, 2002
Washington, DC
Speaker
and Talk |
PPT |
PDF |
Somesh
Jha: Project Overview |
X |
X |
Thomas
Reps: Static Analysis Techniques for Security |
X |
X |
Gogul
Balakrishnan: Infrastructure for Analysis of Object Code
|
X |
X |
Vinod
Ganapathy: Static Analysis Techniques to Detect Buffer Overrun
Vulnerabilities |
X |
X |
Mihai
Christodorescu: A Description of a Virus Scanner That Uses Model
Checking Ideas |
X |
X |
Bart
Miller: Playing Inside the Black Box: Using Dynamic Instrumentation
to Create Security Holes |
X |
X |
Jonathon
Giffin: Determining the Integrity of Remote System Call Streams |
X |
X |
Alexey
Loginov: Towards Abstraction Refinement in TVLA |
X |
X |
ONR Site Visit
November 8, 2001
Madison, WI
Speaker
and Talk |
PPT |
PDF |
Somesh
Jha: CodeSurfer Overview |
X |
X |
Mihai
Christodorescu: A Quick Look Into Model Checking of Binaries, With
an Interesting Application: Virus Scanning |
X |
X |
Somesh
Jha: Attack Graphs |
X |
X |
USENIX Security Symposium
Work-In-Progress Session
August 17, 2001
Washington, DC
Speaker |
PPT |
PDF |
Jonathon
Giffin (untitled talk) |
X
|
X
|