Retrofitting Legacy Code for Authorization Policy Enforcement Vinod Ganapathy [email protected] Trent Jaeger [email protected] Somesh Jha [email protected].
Automatic Discovery of API-Level Exploits Vinod Ganapathy, Sanjit Seshia, Somesh Jha, Thomas Reps & Randal Bryant {vg,jha,reps}@cs.wisc.edu {sanjit,bryant}@cs.cmu.edu.
October 30, 2003CCS 2003 - Vinod Ganapathy1 Buffer Overrun Detection using Linear Programming and Static Analysis Vinod Ganapathy, Somesh Jha {vg,jha}@cs.wisc.edu.
Efficient Filtering in Pub-Sub Systems using BDD
[Anoop Singhal] Data Warehousing and Data Mining T(BookFi.org)
Toward Automated Authorization Policy Enforcement Vinod Ganapathy [email protected] Trent Jaeger [email protected] Somesh Jha [email protected] March 1 st,
Security Policy Reconciliation in Distributed Environments Hao Wang, Somesh Jha, Miron Livny University of Wisconsin Patrick D. McDaniel AT&T Research.
Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John Mitchell RAID 2008 1.
Automatic Generation and Analysis of Attack Graphs
Secure Programming via Visibly Pushdown Safety Games