Automatically hardening web applications using precise tainting A Nguyen-Tuong, S Guarnieri, D Greene, J Shirley, D Evans IFIP International Information Security Conference, 295-307, 2005 | 564 | 2005 |
N-Variant Systems: A Secretless Framework for Security through Diversity. B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ... USENIX Security Symposium 114, 114, 2006 | 474 | 2006 |
ILR: Where'd my gadgets go? J Hiser, A Nguyen-Tuong, M Co, M Hall, JW Davidson 2012 IEEE Symposium on Security and Privacy, 571-585, 2012 | 360* | 2012 |
Effectiveness of moving target defenses D Evans, A Nguyen-Tuong, J Knight Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 29-48, 2011 | 180 | 2011 |
Secure and practical defense against code-injection attacks using software dynamic translation W Hu, J Hiser, D Williams, A Filipi, JW Davidson, D Evans, JC Knight, ... Proceedings of the 2nd international conference on Virtual execution …, 2006 | 169 | 2006 |
Security through diversity: Leveraging virtual machine technology D Williams, W Hu, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong IEEE Security & Privacy 7 (1), 26-33, 2009 | 119 | 2009 |
Security through redundant data diversity A Nguyen-Tuong, D Evans, JC Knight, B Cox, JW Davidson 2008 IEEE International Conference on Dependable Systems and Networks With …, 2008 | 115 | 2008 |
The legion grid portal A Natrajan, A Nguyen‐Tuong, MA Humphrey, M Herrick, BP Clarke, ... Concurrency and Computation: Practice and Experience 14 (13‐15), 1365-1394, 2002 | 109 | 2002 |
Campus-wide computing: Early results using Legion at the university of Virginia AS Grimshaw, A Nguyen-Tuong, MJ Lewis, M Hyett The International Journal of Supercomputer Applications and High Performance …, 1997 | 86 | 1997 |
Grid-based file access: The legion I/O model BS White, AS Grimshaw, A Nguyen-Tuong Proceedings the Ninth International Symposium on High-Performance …, 2000 | 78 | 2000 |
Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing S Nagy, A Nguyen-Tuong, JD Hiser, JW Davidson, M Hicks 30th USENIX Security Symposium (USENIX Security 21), 1683-1700, 2021 | 70 | 2021 |
Integrating fault-tolerance techniques in grid applications A Nguyen-Tuong University of Virginia, 2000 | 68 | 2000 |
Support for extensibility and site autonomy in the Legion grid system object model MJ Lewis, AJ Ferrari, MA Humphrey, JF Karpovich, MM Morgan, ... Journal of Parallel and Distributed Computing 63 (5), 525-538, 2003 | 53 | 2003 |
Method and System for Software Protection Using Binary Encoding JW Davidson, A Nguyen-Tuong, JC Rowanhill, DE Evans, JC Knight, ... US Patent App. 11/995,272, 2009 | 41 | 2009 |
Zipr: Efficient static binary rewriting for security WH Hawkins, JD Hiser, M Co, A Nguyen-Tuong, JW Davidson 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 39 | 2017 |
Methods, systems and computer readable media for detecting command injection attacks A Nguyen-Tuong, JW Davidson, JD Hiser, JC Knight US Patent 9,635,033, 2017 | 36 | 2017 |
Enabling Flexibility in the Legion Run-Time Library. CL Viles, MJ Lewis, A Ferrari, A Nguyen-Tuong, AS Grimshaw PDPTA, 265-274, 1997 | 34 | 1997 |
Exploiting data-flow for fault-tolerance in a wide-area parallel system A Nguyen-Tuong, AS Grimshaw, M Hyett Proceedings 15th Symposium on Reliable Distributed Systems, 2-11, 1996 | 34 | 1996 |
From Legion to Avaki: The persistence of vision AS Grimshaw, A Natrajan, MA Humphrey, MJ Lewis, A Nguyen‐Tuong, ... Grid Computing: making the global infrastructure a reality, 265-298, 2003 | 33 | 2003 |
Same coverage, less bloat: Accelerating binary-only fuzzing with coverage-preserving coverage-guided tracing S Nagy, A Nguyen-Tuong, JD Hiser, JW Davidson, M Hicks Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 32 | 2021 |