Refereed Conference Papers
Automated discovery of mimicry attacks.
Jonathon T. Giffin, Somesh Jha, and Barton P. Miller.
In 9th International
Symposium on Recent Advances in Intrusion Detection
(RAID).
Hamburg, Germany, September 2006.
Paper: [Abstract] [pdf] [ps]
Strengthening software self-checksumming via self-modifying code.
Jonathon T. Giffin, Mihai Christodorescu, and Louis Kruger.
In 21st Annual Computer Security
Applications Conference (ACSAC).
Tucson, Arizona, December 2005.
Paper: [Abstract] [pdf] [ps]
Slides: [pdf]
An auctioning reputation system based on anomaly detection.
Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin,
Louis Kruger, Hao Wang, and Nicholas Kidd.
In 12th ACM
Conference on Computer and Communications Security (CCS).
Alexandria, Virginia, November 2005.
Paper: [Abstract] [pdf] [ps]
Slides: [pdf]
(Presentation given by Shai Rubin)
Environment-sensitive intrusion detection.
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, and Barton
P. Miller.
In 8th
International Symposium on Recent Advances in Intrusion Detection
(RAID).
Seattle, Washington, September 2005.
Paper: [Abstract] [pdf] [ps]
Slides: [pdf]
An architecture for generating semantics-aware signatures.
Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, and Somesh
Jha.
In 14th USENIX
Security Symposium.
Baltimore, Maryland, August 2005.
Paper: [Abstract] [pdf]
Slides: [pdf]
In the news: [SearchSecurity.com]
Formalizing sensitivity in static analysis for intrusion detection.
Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke
Lee, and Barton P. Miller.
In IEEE
Symposium on Security and Privacy.
Oakland, California, May 2004.
Paper: [Abstract] [pdf] [ps]
Slides: [ppt]
Efficient context-sensitive intrusion detection.
Jonathon T. Giffin, Somesh Jha, and Barton P. Miller.
In 11th
Network and Distributed System Security Symposium (NDSS).
San Diego, California, February 2004.
Paper: [Abstract] [pdf] [ps]
Slides: [pdf]
Detecting manipulated remote call streams.
Jonathon T. Giffin, Somesh Jha, and Barton P. Miller.
In 11th USENIX
Security Symposium.
San Francisco, California, August 2002.
Paper: [Abstract]
[pdf]
[ps]
Slides: [pdf]
Technical Reports
On effective model-based intrusion detection.
Jonathon T. Giffin, Somesh Jha, and Barton P. Miller.
Technical report 1543, Computer Sciences Department, University of
Wisconsin, Madison, November 2005.
Paper: [Abstract] [pdf] [ps]
Strengthening software self-checksumming via self-modifying code.
Jonathon T. Giffin, Mihai Christodorescu, and Louis Kruger.
Technical report 1531, Computer Sciences Department, University of
Wisconsin, Madison, September 2005.
Paper: [Abstract] [pdf] [ps]
Internet sieve: An architecture for generating resilient signatures.
Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, and Somesh
Jha.
Technical report 1507, Computer Sciences Department, University of
Wisconsin, Madison, May 2004.
Paper: [Abstract] [pdf]
Exploiting trusted applet/server communication.
Jonathon T. Giffin and Hong Lin.
Unpublished manuscript, May 2001.
Paper: [ps]