Refereed Conference Papers

Automated discovery of mimicry attacks.

Jonathon T. Giffin, Somesh Jha, and Barton P. Miller.
In 9th International Symposium on Recent Advances in Intrusion Detection (RAID).
Hamburg, Germany, September 2006.
Paper: [Abstract] [pdf] [ps]

Strengthening software self-checksumming via self-modifying code.

Jonathon T. Giffin, Mihai Christodorescu, and Louis Kruger.
In 21st Annual Computer Security Applications Conference (ACSAC).
Tucson, Arizona, December 2005.
Paper: [Abstract] [pdf] [ps]
Slides: [pdf]

An auctioning reputation system based on anomaly detection.

Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, and Nicholas Kidd.
In 12th ACM Conference on Computer and Communications Security (CCS).
Alexandria, Virginia, November 2005.
Paper: [Abstract] [pdf] [ps]
Slides: [pdf] (Presentation given by Shai Rubin)

Environment-sensitive intrusion detection.

Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, and Barton P. Miller.
In 8th International Symposium on Recent Advances in Intrusion Detection (RAID).
Seattle, Washington, September 2005.
Paper: [Abstract] [pdf] [ps]
Slides: [pdf]

An architecture for generating semantics-aware signatures.

Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, and Somesh Jha.
In 14th USENIX Security Symposium.
Baltimore, Maryland, August 2005.
Paper: [Abstract] [pdf]
Slides: [pdf]
In the news: [SearchSecurity.com]

Formalizing sensitivity in static analysis for intrusion detection.

Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, and Barton P. Miller.
In IEEE Symposium on Security and Privacy.
Oakland, California, May 2004.
Paper: [Abstract] [pdf] [ps]
Slides: [ppt]

Efficient context-sensitive intrusion detection.

Jonathon T. Giffin, Somesh Jha, and Barton P. Miller.
In 11th Network and Distributed System Security Symposium (NDSS).
San Diego, California, February 2004.
Paper: [Abstract] [pdf] [ps]
Slides: [pdf]

Detecting manipulated remote call streams.

Jonathon T. Giffin, Somesh Jha, and Barton P. Miller.
In 11th USENIX Security Symposium.
San Francisco, California, August 2002.
Paper: [Abstract] [pdf] [ps]
Slides: [pdf]

Technical Reports

On effective model-based intrusion detection.

Jonathon T. Giffin, Somesh Jha, and Barton P. Miller.
Technical report 1543, Computer Sciences Department, University of Wisconsin, Madison, November 2005.
Paper: [Abstract] [pdf] [ps]

Strengthening software self-checksumming via self-modifying code.

Jonathon T. Giffin, Mihai Christodorescu, and Louis Kruger.
Technical report 1531, Computer Sciences Department, University of Wisconsin, Madison, September 2005.
Paper: [Abstract] [pdf] [ps]

Internet sieve: An architecture for generating resilient signatures.

Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, and Somesh Jha.
Technical report 1507, Computer Sciences Department, University of Wisconsin, Madison, May 2004.
Paper: [Abstract] [pdf]

Exploiting trusted applet/server communication.

Jonathon T. Giffin and Hong Lin.
Unpublished manuscript, May 2001.
Paper: [ps]