Control-flow integrity principles, implementations, and applications M Abadi, M Budiu, U Erlingsson, J Ligatti ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009 | 2636 | 2009 |
Edit automata: Enforcement mechanisms for run-time security policies J Ligatti, L Bauer, D Walker International Journal of Information Security 4, 2-16, 2005 | 455 | 2005 |
Run-time enforcement of nonsafety policies J Ligatti, L Bauer, D Walker ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-41, 2009 | 262 | 2009 |
Composing security policies with polymer L Bauer, J Ligatti, D Walker Proceedings of the 2005 ACM SIGPLAN conference on Programming language …, 2005 | 243 | 2005 |
More enforceable security policies L Bauer, J Ligatti, D Walker Proceedings of the Workshop on Foundations of Computer Security (FCS’02 …, 2002 | 188 | 2002 |
A theory of aspects D Walker, S Zdancewic, J Ligatti ACM SIGPLAN Notices 38 (9), 127-139, 2003 | 174 | 2003 |
Enforcing non-safety security policies with program monitors J Ligatti, L Bauer, D Walker Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 124 | 2005 |
Defining code-injection attacks D Ray, J Ligatti Acm Sigplan Notices 47 (1), 179-190, 2012 | 116 | 2012 |
A theory of secure control flow M Abadi, M Budiu, U Erlingsson, J Ligatti Formal Methods and Software Engineering: 7th International Conference on …, 2005 | 110 | 2005 |
A theory of runtime enforcement, with results J Ligatti, S Reddy Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 87 | 2010 |
System and methods for authentication using multiple devices JA Ligatti, D Goldgof, C Cetin, JB Subils US Patent 9,659,160, 2017 | 78 | 2017 |
Modeling runtime enforcement with mandatory results automata E Dolzhenko, J Ligatti, S Reddy International Journal of Information Security 14, 47-60, 2015 | 61 | 2015 |
Composing expressive runtime security policies L Bauer, J Ligatti, D Walker ACM Transactions on Software Engineering and Methodology (TOSEM) 18 (3), 1-43, 2009 | 61 | 2009 |
Fault-tolerant typed assembly language F Perry, L Mackey, GA Reis, J Ligatti, DI August, D Walker Proceedings of the 28th ACM SIGPLAN conference on programming language …, 2007 | 60 | 2007 |
Software security based on control flow integrity M Abadi, MD Budiu, U Erlingsson, JA Ligatti US Patent 7,577,992, 2009 | 59 | 2009 |
An Ethnographic Understanding of Software ({In) Security} and a {Co-Creation} Model to Improve Secure Software Development H Palombo, AZ Tabari, D Lende, J Ligatti, X Ou Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 205-220, 2020 | 56 | 2020 |
Policy enforcement via program monitoring JA Ligatti Princeton University, 2006 | 55 | 2006 |
Software memory access control M Abadi, U Erlingsson, JA Ligatti, MD Budiu US Patent 7,337,291, 2008 | 49 | 2008 |
Static typing for a faulty lambda calculus D Walker, L Mackey, J Ligatti, GA Reis, DI August Proceedings of the eleventh ACM SIGPLAN international conference on …, 2006 | 39 | 2006 |
Systems and methods for challengeless coauthentication JA Ligatti US Patent 10,367,817, 2019 | 38 | 2019 |