Survivable System Architecture

Diewald, J., Claypool, K., Alekseyev, J., Baah, G., Blumenthal, U., Cilcius, A., Pughe, W., Cooley, J., Cunningham, R., Glennie, J., Griffin, E., Pawlak, P., Securing the U.S. Transportation Command, Lincoln Laboratory Journal, Vol 22, Number 1, 2016.
(Journal Article)

Nabil Schear, Patrick T. Cable II, Thomas Moyer, Bryan Richard, and Robert Rudd, Bootstrapping and Maintaining Trust in the Cloud, 32nd Annual Computer Security Applications Conference, ACSAC 2016, New York, NY, USA, December 2016.
(Full Paper)

Thomas Moyer, Patrick Cable, Karishma Chada, Robert Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank Capobianco, and Trent Jaeger, Leveraging Data Provenance to Enhance Cyber Resilience, 1st IEEE Cybersecurity Development Conference (SecDev'16). Boston, MA, USA, November 2016.
(Full Paper)

Itkis, G., Kaiser, B. H., Coll, J. E., Smith, W. W., Cunningham, R. K., Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage, Technical Report 1210, MIT Lincoln Laboratory, Lexington, MA, July 2016.
(Report)

Thomas Moyer and Vijay Gadepally, High-throughput Ingest of Data Provenance Records into Accumul, IEEE High Performance Extreme Computing Conference, HPEC, 2016.
(Full Paper)

Koziel, E., Thurmer, K., Milechin, L., Grossmann, P., Vai, M., Khazan, R., Bergevin, K., Comer, P., Side Channel Authenticity Discriminant Analysis for Device Class Identification, GOMACTech 2016, Orlando, FL, 16 March 2016.
(Full Paper)

Cable, P., Schear, N., Spyglass: Demand-Provisioned Linux Containers for Private Network Access, Proceedings of the 29th Large Installation System Administration conference (LISA15), Washington DC, 8-13 November 2015.
(Full Paper)

Bigelow, D., Hobson, T., Rudd, R., Streilein, W., and Okhravi, H., Timely Rerandomization for Mitigating Memory Disclosures, Proceedings of ACM Conference on Computer and Communications Security (CCS), Denver, CO, October 2015.
(Full Paper)

Adam Bates, Dave Tian, Kevin R.B. Butler, and Thomas Moyer, Trustworthy whole-system provenance for the linux kernel, 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., August 2015.
(Full Paper)

Adam Bates, Kevin R.B. Butler, and Thomas Moyer, Take only what you need: Leveraging mandatory access control policy to reduce provenance storage costs, 7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15), Edinburgh, Scotland, July 2015.
(Full Paper)

Cable, P., Demand-Provisioned Linux Containers for Private Network Access, Proceedings of the 28th Large Installation System Administration conference (LISA14), Seattle, WA, pp. 139, 9-14 November 2014.
(Abstract)

Okhravi H., Hobson T., Bigelow D., and Streilein W., Finding Focus in the Blur of Moving-Target Techniques, IEEE Security & Privacy, Vol. 12, Issue 2, April 2014.
(Full Paper)

Simpson, A., Schear, N., and Moyer, T., Runtime Integrity Measurement and Enforcement with Automated Whitelist Generation, ACSAC, 2014.
(Abstract)

Moyer T., Jaeger T., McDaniel P., Scalable Integrity-Guaranteed AJA, Proceedings of the 14th Asia-Pacific Web Conference, Kunming, China, 12 April 2012.
(Abstract)

Okhravi, H., Comella, A., Robinson, E., Haines, J., Creating a cyber moving target for critical infrastructure applications using platform diversity, Elsevier International Journal of Critical Infrastructure Protection (IJCIP), Vol. 5, Issue 1, March 2012.
(Journal Article)

Okhravi, H., Comella, A., Robinson, E., Yannalfo, S., Michaleas, P., Haines, J., Creating a Cyber Moving Target for Critical Infrastructure Applications, Critical Infrastructure Protection V, J. Butts and S. Shenoi (Eds.), IFIP International Federation for Information Processing, Springer, 2011.
(Book Chapter)

Okhravi, H., Haines, J., Ingols, K., Achieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target, High Frontier Journal: The Journal for Space and Cyberspace Professionals, Volume 7, Number 3, 2011.
(Journal Article)

Jahid, S. , Gunter, C., Hoque, I., Okhravi, H., MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control, Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY), February 2011.

Okhravi, H., Robinson, E., Comella, A., Yannalfo, S., Michaleas, P., Haines, J., TALENT: Dynamic Platform Heterogeneity for Cyber Survivability of Mission Critical Applications, Proceedings of Secure and Resilient Cyber Architecture Conference (SRCA'10), McLean, VA, October 29, 2010.
(Full Paper)

Gagnon, M. N., Truelove, J., Kapadia, A., Haines, J., Huang, O., Towards Net-Centric Cyber Survivability for Ballistic Missile Defense, International Symposium on Architecting Critical Systems 2010, Prague, Czech Republic, 25 June 2010.
(Full Paper)

Okhravi, H., Sheldon, F., Data diodes in support of trustworthy cyber infrastructure, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW'10), Oak Ridge, TN , April 21 -23, 2010
(Full Paper)

 

 

top of page