Thomas M. Moyer

Nabil Schear, Patrick T. Cable II, Thomas Moyer, Bryan Richard, and Robert Rudd, Bootstrapping and Maintaining Trust in the Cloud, 32nd Annual Computer Security Applications Conference, ACSAC 2016, New York, NY, USA, December 2016.
(Full Paper)

Thomas Moyer, Patrick Cable, Karishma Chada, Robert Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank Capobianco, and Trent Jaeger, Leveraging Data Provenance to Enhance Cyber Resilience, 1st IEEE Cybersecurity Development Conference (SecDev'16). Boston, MA, USA, November 2016.
(Full Paper)

Thomas Moyer and Vijay Gadepally, High-throughput Ingest of Data Provenance Records into Accumul, IEEE High Performance Extreme Computing Conference, HPEC, 2016.
(Full Paper)

Adam Bates, Dave Tian, Kevin R.B. Butler, and Thomas Moyer, Trustworthy whole-system provenance for the linux kernel, 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., August 2015.
(Full Paper)

Adam Bates, Kevin R.B. Butler, and Thomas Moyer, Take only what you need: Leveraging mandatory access control policy to reduce provenance storage costs, 7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15), Edinburgh, Scotland, July 2015.
(Full Paper)

Simpson, A., Schear, N., and Moyer, T., Runtime Integrity Measurement and Enforcement with Automated Whitelist Generation, ACSAC, 2014.
(Abstract)

Moyer T., Jaeger T., McDaniel P., Scalable Integrity-Guaranteed AJA, Proceedings of the 14th Asia-Pacific Web Conference, Kunming, China, 12 April 2012.
(Abstract)

Butler, K., McLaughlin, S., Moyer, T., McDaniel, P., OS Security Architectures Built on Smart Disks, IEEE Security & Privacy Magazine, 2010.

Enck, W., Moyer, T., McDaniel, P., Sen, S., Sebos, P., Spoerel, S., Greenberg, A., Sung, Y.-W., Rao, S., Aiello, W., Configuration management at massive scale: System design and experience, IEEE Journal on Selected Areas in Communications (JSAC), 2009.

Hicks, B., Rueda, S., King, D., Moyer, T., Schiffman, J., Sreenivasan, Y., McDaniel, P., Jaeger, T., An Architecture for Enforcing End-to-End Access Control Over Web Applications, Proceedings of the 2010 Symposium on Access Control Models and Technologies, SACMAT ’10, 2010.

Moyer, T., Butler, K., Schiffman, J., McDaniel, P., Jaeger, T., Scalable Web Content Attestation, In ACSAC ’09: Proceedings of the 2009 Annual Computer Security Applications Conference, 2009.

Moyer, T., Butler, K., Schiffman, J., McDaniel, P., Jaeger, T., Scalable Web Content Attestation, IEEE Transactions on Computers, 2011.

Schiffman, J., Moyer, T., Jaeger, T., McDaniel, P., Network-based Root of Trust for Installation, IEEE Security & Privacy Magazine, Jan/Feb 2011.

Schiffman, J., Moyer, T., Shal, C., Jaeger, T., McDaniel, P., Justifying Integrity Using a Virtual Machine Verifier, Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC ’09, December 2009.

Schiffman, J., Moyer, T., Vijayakumar, H., Jaeger, T., McDaniel, P., Seeding Clouds with Trust Anchors, in CCSW ’10: Proceedings of the 2010 ACM workshop on Cloud computing security, ACM, 2010.

 

top of page