Name Resolution Vulnerabilities

[1] Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger. Process firewalls: Protecting processes during resource access. In Proceedings of the 8th ACM European Conference on Computer Systems (EUROSYS 2013), April 2013. [acceptance rate: 17.9% (28/156)], To appear. [ bib | www: ]
[2] Hayawardh Vijayakumar and Trent Jaeger. The right files at the right time. In Proceedings of the 5th IEEE Symposium on Configuration Analytics and Automation (SAFECONFIG 2012), October 2012. [ bib | www: ]
[3] Hayawardh Vijayakumar and Joshua Schiffman and Trent Jaeger. STING: Finding Name Resolution Vulnerabilities in Programs. In Proceedings of the 21st USENIX Security Symposium (USENIX Security 2012), August 2012. [acceptance rate: 19.4% (43/222)]. [ bib | www: ]
[4] Hayawardh Vijayakumar and Guruprasad Jakka and Sandra Rueda and Joshua Schiffman and Trent Jaeger. Integrity Walls: Finding Attack Surfaces from Mandatory Access Control Policies. In Proceedings of the 7th ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2012), May 2012. [acceptance rate: 22% (35/159)]. [ bib | www: ]
[5] Hayawardh Vijayakumar and Joshua Schiffman and Trent Jaeger. A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution. In Proceedings of 7th European Conference on Computer Network Defense (EC2ND 2011), September 2011. [acceptance rate: 32% ]. [ bib | www: ]

This file was generated by bibtex2html 1.97.