MURI Review
February 14, 2005
Arlington, Virgina
| Speaker
and Talk |
PPT |
PDF |
| Somesh
Jha: Project Overview |
X |
X |
| Gogul
Balakrishnan: Identifying Variables in x86 Executables |
X |
X |
| Jonathon
T. Giffin: Environment-Sensitive Intrusion Detection |
X |
X |
| Louis
Kruger: The BREW Project at Sandia |
X |
X |
| Shai
Rubin and Mihai Christodorescu: Testing Defensive Systems |
X |
X |
| Vinod
Ganapathy: Automatic Discovery of API-Level Exploits |
X |
X |
| Hao Wang:
Distributed Certificate-Chain Discovery |
X |
X |
MURI Review
August 16, 2004
Annapolis, MD
| Speaker
and Talk |
PPT |
PDF |
| Somesh
Jha: Project Overview |
X |
X |
| Thomas
Reps: Codesurfer for x86 |
|
|
| Mihai
Christodorescu: A Threat Model Methodology for Generating Test Cases |
X |
X |
| Jonathon
Giffin: Efficient Context-Sensitive Intrusion Detection |
X |
X |
IEEE Symposium on Security
and Privacy
May 9–12, 2004
Oakland, California
| Speaker
and Talk |
PPT |
PDF |
| Jonathon
T. Giffin: Work in Progress
Presenting work done by
Mihai Christodorescu, Shai Rubin, Somesh Jha, and Barton P. Miller.
|
X |
X |
MURI Review
November 13, 2003
Baltimore, MD
| Speaker
and Talk |
PPT |
PDF |
| Somesh
Jha: Vulnerability and Information Flow Analysis of COTS
|
X |
X |
| Somesh
Jha: Overview of the WiSA Infrastructure and Applications
|
X |
X |
| Tim
Teitelbaum, GrammaTech, Inc.: Support and Transition of Wisconsin
CIP/URI |
X |
|
| Thomas
Reps: Analyzing Memory Accesses in x86 Executables |
X |
X |
| Barton
Miller: Attacks and Defenses |
X |
X |
| Somesh
Jha: Wrap-Up |
X |
|
MURI Workshop
July 22 - 23, 2003
Pittsburgh, PA
| Speaker
and Talk |
PPT |
PDF |
| Somesh
Jha: Project Overview |
X |
X |
| WiSA
Integrated Project Demos
Hao Wang: Binary
Code Generation
Hong Lin: Dynamic Buffer Overflow Detection
Mihai Christodorescu: Malicious Code Obfuscation & Detection
Vinod Ganapathy: Static Buffer Overflow Detection
Gogul Balakrishnan: Value Set Analysis
|
X |
X |
| Mihai
Christodorescu: Malware Detection Testing |
X |
X |
| Gogul
Balakrishnan: Analyzing Memory Accesses in Object Code |
X |
X |
| Vinod
Ganapathy: Static Analysis to Detect Buffer Overruns |
X |
X |
| Jonathon
Giffin: Specification-Based Monitoring |
X |
X |
| Hao Wang
and Louis Kruger: Combating Spyware |
X |
X |
MURI Workshop
January 27 - 28, 2003
Williamsburg, VA
| Speaker
and Talk |
PPT |
PDF |
| Mihai
Christodorescu: General Purpose Binary Rewriting |
X |
X |
| Jonathon
Giffin: Specification-Based Monitoring: Improving Model Precision |
X |
X |
| Vinod
Ganapathy: Buffer Overrun Detection via Static Analysis |
X |
X |
| Gogul
Balakrishnan: Analyzing Memory Accesses in Object Code |
X |
X |
| Tom Reps:
Pushdown Systems and Weighted Pushdown Systems |
X |
X |
MURI Workshop
July 11 - 12, 2002
Harpers Ferry, WV
| Speaker
and Talk |
PPT |
PDF |
| Somesh
Jha: Project Overview |
X |
X |
| Jonathon
Giffin: Specification-Based Analysis and Enforcement |
X |
X |
| Jonathon
Giffin: Intel x86 Analysis Infrastructure and Demo |
X |
X |
| Gogul
Balakrishnan: Preparing Object Code for Static Analysis |
X |
X |
| Vinod
Ganapathy: Static Analysis Techniques to Detect Buffer Overrun
Vulnerabilities |
X |
X |
| Mihai
Christodorescu: Detecting Malicious Patterns in Executables via
Model Checking |
X |
X |
| Alexey
Loginov: Towards Abstraction Refinement in TVLA |
X |
X |
| A.
Mulhern: Verifying Behavioral Subtyping in TVLA |
X |
X |
MURI Workshop
January 14 - 15, 2002
Washington, DC
| Speaker
and Talk |
PPT |
PDF |
| Somesh
Jha: Project Overview |
X |
X |
| Thomas
Reps: Static Analysis Techniques for Security |
X |
X |
| Gogul
Balakrishnan: Infrastructure for Analysis of Object Code
|
X |
X |
| Vinod
Ganapathy: Static Analysis Techniques to Detect Buffer Overrun
Vulnerabilities |
X |
X |
| Mihai
Christodorescu: A Description of a Virus Scanner That Uses Model
Checking Ideas |
X |
X |
| Bart
Miller: Playing Inside the Black Box: Using Dynamic Instrumentation
to Create Security Holes |
X |
X |
| Jonathon
Giffin: Determining the Integrity of Remote System Call Streams |
X |
X |
| Alexey
Loginov: Towards Abstraction Refinement in TVLA |
X |
X |
ONR Site Visit
November 8, 2001
Madison, WI
| Speaker
and Talk |
PPT |
PDF |
| Somesh
Jha: CodeSurfer Overview |
X |
X |
| Mihai
Christodorescu: A Quick Look Into Model Checking of Binaries, With
an Interesting Application: Virus Scanning |
X |
X |
| Somesh
Jha: Attack Graphs |
X |
X |
USENIX Security Symposium
Work-In-Progress Session
August 17, 2001
Washington, DC
| Speaker |
PPT |
PDF |
| Jonathon
Giffin (untitled talk) |
X
|
X
|