Control-flow integrity principles, implementations, and applications M Abadi, M Budiu, U Erlingsson, J Ligatti ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009 | 2363 | 2009 |
Control-flow integrity principles, implementations, and applications M Abadi, M Budiu, U Erlingsson, J Ligatti ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009 | 2351 | 2009 |
Control-flow integrity principles, implementations, and applications M Abadi, M Budiu, U Erlingsson, J Ligatti ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009 | 2351 | 2009 |
Edit automata: Enforcement mechanisms for run-time security policies J Ligatti, L Bauer, D Walker International Journal of Information Security 4 (1-2), 2-16, 2005 | 430 | 2005 |
Run-time enforcement of nonsafety policies J Ligatti, L Bauer, D Walker ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-41, 2009 | 240 | 2009 |
Composing security policies with polymer L Bauer, J Ligatti, D Walker Proceedings of the 2005 ACM SIGPLAN conference on Programming language …, 2005 | 235 | 2005 |
More enforceable security policies L Bauer, J Ligatti, D Walker Proceedings of the Workshop on Foundations of Computer Security (FCS’02 …, 2002 | 175 | 2002 |
A theory of aspects D Walker, S Zdancewic, J Ligatti ACM SIGPLAN Notices 38 (9), 127-139, 2003 | 172 | 2003 |
Enforcing non-safety security policies with program monitors J Ligatti, L Bauer, D Walker Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 122 | 2005 |
A theory of secure control flow M Abadi, M Budiu, U Erlingsson, J Ligatti Formal Methods and Software Engineering: 7th International Conference on …, 2005 | 104 | 2005 |
Defining code-injection attacks D Ray, J Ligatti Acm Sigplan Notices 47 (1), 179-190, 2012 | 93 | 2012 |
A Theory of Runtime Enforcement, with Results. J Ligatti, S Reddy ESORICS, 87-100, 2010 | 81 | 2010 |
System and methods for authentication using multiple devices JA Ligatti, D Goldgof, C Cetin, JB Subils US Patent 9,659,160, 2017 | 62 | 2017 |
Fault-tolerant typed assembly language F Perry, L Mackey, GA Reis, J Ligatti, DI August, D Walker Proceedings of the 28th ACM SIGPLAN conference on programming language …, 2007 | 60 | 2007 |
Composing expressive runtime security policies L Bauer, J Ligatti, D Walker ACM Transactions on Software Engineering and Methodology (TOSEM) 18 (3), 1-43, 2009 | 57 | 2009 |
Software security based on control flow integrity M Abadi, MD Budiu, U Erlingsson, JA Ligatti US Patent 7,577,992, 2009 | 55 | 2009 |
Policy enforcement via program monitoring JA Ligatti Princeton University, 2006 | 51 | 2006 |
Modeling runtime enforcement with mandatory results automata E Dolzhenko, J Ligatti, S Reddy International Journal of Information Security 14, 47-60, 2015 | 50 | 2015 |
Software memory access control M Abadi, U Erlingsson, JA Ligatti, MD Budiu US Patent 7,337,291, 2008 | 49 | 2008 |
Static typing for a faulty lambda calculus D Walker, L Mackey, J Ligatti, GA Reis, DI August Proceedings of the eleventh ACM SIGPLAN international conference on …, 2006 | 37 | 2006 |