System Security Analysis

Lippmann, R., Riordan, J., Yu, T., Watson, K., Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics, Project Report IA-3, MIT Lincoln Laboratory, Lexington, MA, 22 May 2012.
(Project Report)

Okhravi, H., Johnson, A., Haines, J., Mayberry, T., Chan, A., Dedicated vs. Distributed: A Study of Mission Survivability Metrics, Proceedings of IEEE Military Communications Conference (MILCOM), Nov 2011.
(Full paper)

Dolan-Gavitt, B., Leek, T., Zhivich, M., Giffin, J., Wenke, L. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection, IEEE Symposium on Security & Privacy, Oakland, CA, May 22, 2011.
(Full Paper)

Okhravi, H., Bak, S., King, S., Design, Implementation and Evaluation of Covert Channel Attacks, Proceedings of the IEEE Conference on Homeland Security Technologies (IEEE HST '10), Waltham, MA , November 8-10, 2010.
(Full Paper)

Weaver, N., Paxson, V., Staniford, S., Cunningham, R. K., Large Scale Malicious Code: A Research Agenda, March 2003.
(Abstract)

 

top of page