עקוב אחר
Michael Zhivich
Michael Zhivich
כתובת אימייל מאומתת בדומיין akamai.com
כותרת
צוטט על ידי
צוטט על ידי
שנה
Virtuoso: Narrowing the semantic gap in virtual machine introspection
B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee
2011 IEEE Symposium on Security and Privacy, 297-312, 2011
4262011
The real cost of software errors
M Zhivich, RK Cunningham
IEEE Security & Privacy 7 (2), 2009
1962009
Experiences in cyber security education
J Werther, M Zhivich, T Leek, N Zeldovich
The MIT Lincoln Laboratory capture-the-flag exercise. In Proceedings of the …, 2011
109*2011
The Fun and Future of CTF
A Davis, T Leek, M Zhivich, K Gwinnup, W Leonard
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
672014
Dynamic buffer overflow detection
M Zhivich, T Leek, R Lippmann
Workshop on the evaluation of software defect detection tools 2005, 2005
472005
Coverage maximization using dynamic taint tracing
T Leek, G Baker, R Brown, M Zhivich, R Lippmann
Technical Report 112, MIT Lincoln Laboratory, 2007
452007
Detecting buffer overflows using testcase synthesis and code instrumentation
MA Zhivich
MIT Lincoln Laboratory, 2005
112005
You Sank My Battleship!: A Case Study in Secure Programming
A Stoughton, A Johnson, S Beller, K Chadha, D Chen, K Foner, M Zhivich
Proceedings of the Ninth Workshop on Programming Languages and Analysis for …, 2014
102014
House Rules: Designing the Scoring Algorithm for Cyber Grand Challenge
B Price, M Zhivich, M Thompson, C Eagle
IEEE Security & Privacy 16 (2), 23-31, 2018
62018
Building low-power trustworthy systems: Cyber-security considerations for Real-Time Physiological Status Monitoring
J Holliman, M Zhivich, R Khazan, A Swiston, B Telfer
MILCOM 2016-2016 IEEE Military Communications Conference, 1083-1089, 2016
52016
Securing current and future process control systems
R Cunningham, S Cheung, M Fong, U Lindqvist, D Nicol, R Pawlowski, ...
Critical Infrastructure Protection 1, 99-115, 2008
52008
AWE: Improving software analysis through modular integration of static and dynamic analyses
RE Brown, R Khazan, M Zhivich
Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 2007
52007
Webtorrent: a bittorrent extension for high availability servers
G Sivek, S Sivek, J Wolfe, M Zhivich
Webtorrent Mozilla meets BitTorrent as web pages are packaged into larger …, 2004
52004
BP: DECREE: A Platform for Repeatable and Reproducible Security Experiments
L Yan, B Price, M Zhivich, B Caswell, C Eagle, M Frantzen, H Sorenson, ...
2018 IEEE Cybersecurity Development (SecDev), 11-20, 2018
32018
Cyber in a World of Plenty: Secure High-Performance On-Orbit Processing
K Ingols, M Zhivich, J Brandon, E Koziel
22017
Simulation Driven Policy Recommendations for Code Diversity
B Tello, M Winterrose, G Baah, M Zhivich
Simulation and Modeling Methodologies, Technologies and Applications, 21-34, 2016
2*2016
Securing Process Control Systems of Today and Tomorrow
RK Cunningham, S Cheung, M Fong, U Lindqvist, DM Nicol, R Pawlowski, ...
First Annual IFIP WG 11.10 International Conference on Critical …, 2007
22007
Improved Heuristics for Program Continuation in Failure-Oblivious Computing
A Hansen, MA Zhivich
2008
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–18