HOME
WSSRL
VITAE
RESEARCH
PUBLICATIONS
COURSES
CS4515
CS525F
| |
WPI
Secure Systems Research Laboratory
WSSRL
Resources
Books
|Research Papers
| Other Online Resources
SELECTED BOOKS
-
"Security
in Computing" , Third Edition, Charles P. Pfleeger, Prentice Hall, 2003
-
"Network
Security Essentials", Second Edition, by William Stallings,Prentice
Hall, 2002.
-
"Network
Security: Private Communication in a Public World", by Charlie
Kaufman, Radia
Perlman, Mike
Speciner, Charles
Kaufman, Mike
Spiciner
-
“Know
Your Enemy – Revealing The Security Tools, tactics, and Motives of the
BLACKHAT Community”, The Honeynet Project, Spitzner, Lance,
Addison-Wesley, 2001.
-
WSSRL-TR-0301(pdf)
: "Applying Byzantine Agreement Protocols to the Intrusion Detection
Problem in Distributed Systems", Colon Osorio, Fernando C. and Xiaoning
Wang, WSSRL Technical Report -0301, January 2003.
-
“The
National Strategy To Secure CyberSpace, Draft, September
2002, Clarke, Richard A, Chair.
-
“S.A.F.E.
– Secure Architecture & Fail-Safe Engine for Intrusion Detection”,
Colon Osorio, F.C.,
Technical
Report, ACG-TR017, Acumen Consulting Group, August 2002.
-
“The
1999 DARPA Off-Line Detection Evaluation”, Lippmann, Richard, Joshua W.
Haines, David J. Fried, Jonathan Korba, Kumar Das.
-
“Intrusion Detection
Using Autonomous agents”, Spafford, Eugene H., Diego Zamboni, Computer
Networks 34 (2000), pp. 547-570.
-
-
“NTRU - A Ring-Based Public Key Cryptosystem”, Hoffstein, Jeffrey et.
al., ANTS 1998, pp. 267-288.
-
"An efficient optimal normal basis type II multiplier", ] B. Sunar
and C. K. Koc. IEEE Transactions on Computers, 50(1): 83-87, January 2001.
-
“Bit Permutation Instructions for Accelerating Software Cryptography”.
Zhijie Shi and Ruby Lee.,Proceedings of the IEEE International Conference on
Application-specific Systems, Architectures and Processors, pp. 138-148.
July 2000.
-
“A New Approach to Security Processing (SSL and Ipsec)”, Jain, Anil, VP
of Engineering and Co-Founder of Cavium Networks, Technical Presentation at
WPI CS Research Colloquium, November 2002.
-
“State
of the Practice of Intrusion Detection Technologies,
Allen, Julia et.al., Technical Report CMU/SEI-99-TR-028 ESC-99-102.
-
“An
Intrusion Detection Model”, Denning, Dorothy E., IEEE Transactions On
Software Engineering, No.2, pp 222, February 1987.
-
Cautionary Tales: Stealth
Coordinated Attack HOWTO [online]. Ruiu, Dragos. Available at WWW:<URL:http://www.nswc.navy.mil/ISSEC/CID/Stealth_Coordinated_Attack.html>
(1999).
-
COAST
Laboratory Technical Report 98/05, Balasubramaniyan,
J.S., Jose Omar Garcia-Fernandez, David Isacoff, Eugene Spafford, and Diego
Zamboni,
-
“Bro: A System for
Detecting Network Intruders in real-Time, V. Paxson, Computer Networks,
31(23-24), pp. 2435-2463, 14 Dec. 1999.
-
“Meta-learning
in distributed data mining systems: Issues and Approaches”, "Advances
of Distributed Data Mining" book,
Prodromidis et.al.,editors
Hillol Kargupta and Philip Chan, AAAI press, August 2000.
-
“Extending
the DARPA Off-Line Intrusion Detection Evaluations”,
Haines, Joshua W., Lee M.
Rossey, Richard P. Lippmann, and Robert K. Cunningham, Proceedings of
the DARPA Information Survivability Conference and Exposition
(DISCEXP11’0’1)
-
“A
core calculus of de-pendency”. M. Abadi, A. Banerjee, N. Heintze, and
J. Riecke, In Proc.
ACM Symposium on Principles of Programming Languages,
pages 147–160,
January 1999.
-
“Secure
information or and pointer
confinement in a Java-like
language”, A.
Banerjee and D. A. Naumann. In Proc.
IEEE Computer Security Foundations Workshop,
pages 253–267, June 2002.
-
“Static
analysis
of processes for no read-up and no
write-down”. C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson.
In Proc. Foundations
of Software Science and Computation Structure,
number 1578 in LNCS, pages 120–134. Springer-Verlag, April 1999.
-
“Security
analysis
using
flow logics”, C.
Bodei, P. Degano, H. Riis Nielson, and F. Nielson.
In G. Paun, G. Rozenberg, and A. Salomaa, editors, Current
Trends in Theoretical Computer Science,
pages 525–542. World Scientific, 2000.
-
“A
unified lattice model
for
static analysis of programs by construction or approximation of
fix-points”.
P. Cousot and R.
Cousot. Abstract interpretation. In
Proc. ACM Symposium on
Principles of Programming Languages,
pages 238–252, January 1977.
Practical Hints on Secure Programming
Memory Safety in an Imperfect World
- Safe
C
- Efficient
Detection of All Pointer and Array Access Errors, Todd M. Austin,
Scott E. Breach, and Gurindar S. Sohi, Proceedings of the ACM SIGPLAN
'94 Conference on Programming Language Design and Implementation, June
1994.
- Efficient Detection of All Pointer and Array Access
Errors (extended version), Todd M. Austin, Scott E. Breach, and Gurindar
S. Sohi, University of Wisconsin - Madison Technical Report #1197,
December 1993. (A longer version of the PLDI '94 paper).
- Fine
Grain Bounds Checking for GCC
- A
First Step Towards Automated Detection of Buffer Overrun Vulnerabilities David
Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken.
- StackGuard:
Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,
Cowan, et. al.
- Transparent
Run-Time Defense Against Stack Smashing Attacks. Libsafe and libverify.
- Smashing
the Stack for Fun and Profit. Aleph's must read on stack smashing
attacks.
Sandboxing
Mobile Code
Other Resources
- SecurityFocus.com
- Providing
Fine-Grained Access Control For Mobile Programs Through Binary EditingRaju
Pandey and Brant Hashii
- Securing
Systems Against External Programs," IEEE
Internet Computing,Brant Hashii, Manoj Lal, Steven Samorodin, and Raju
Pandey
- Providing
Fine-Grained Access Control For Java Programs In the 13th Conference on
Object-Oriented Programming. ECOOP'99,
Lecture Notes in Computer Science. Spring-Verlag, June 1999.Raju Pandey and
Brant Hashii
- Enforceable
Security Policies,Fred B. Schneider
- Dealing
With Disaster: Surviving Misbehaved Kernel Extensions., Seltzer
- Processes
in KaffeOS: Isolation, Resource Management, and Sharing in Java Godmar
Back, Wilson C. et. al.
- Design,
Implementation and Performance of Protection in the Mungi Single Address
Space Operating System. ,
- Protection,
Lampson
- A
note on the confinement problem, Lampson
- Access
Control for Collaborative Environments
- Capability
Theory
- Extensible
security architectures for Java, Wallach, Balfanz, Dean, Felten html,
pdf
Language Support for Secure Programming
Bibliographies
General AI
-
CMU
Artificial Intelligence Repository
-
AI Journals
-
Challenge
Problems for Artificial Intelligence
-
"Artificial Intelligence: A Modern Approach".
S. Russell, P. Norvig. Prentice Hall, 1995. ISBN 0-13-103805-2
-
"Artificial Intelligence: Theory and Practice". T.
Dean, J. Allen, Y. Aloimonos. The Benjamin/Cummings Publishing Company, Inc.
1995.
-
"Readings in Artificial Intelligence". B. L.
Webber, N. J. Nilsson, eds. Tioga Publishing Company, 1981.
-
"Artificial Intelligence". 3rd edition. Patrick H.
Winston. Addison Wesley.
-
"The Elements of Artificial Intelligence Using Common
Lisp". S. L. Tanimoto. Computer Science Press 1990.
-
"Artificial Intelligence" Second edition. E. Rich
and K. Knight. McGraw Hill 1991.
-
"Paradigms of Artificial Intelligence Programming: Case
Studies in Common Lisp". P. Norvig. Morgan Kaufmann Publishers, 1992.
-
"Essentials of Artificial Intelligence". M.
Ginsberg. Morgan Kaufmann Publishers, 1993.
-
"Artificial Intelligence Structures and Strategies for
Complex Problem Solving". Third edition. G. F. Luger and W. A.
Stubblefield. Addison-Wesley, 1998.
-
"Logical Foundations of Artificial Intelligence".
M.R. Genesereth and N. Nilsson. Morgan Kaufmann, 1987.
Machine Learning
Databases
Statistics
- CMU's StatLib
-
Universiteit van Amsterdam
- "Statistical Inference for Management and Economics".
P. Billingsley, D. Croft, D. Huntsberger, C. Watson.
Boston: Allyn and Bacon, Inc. 1986.
- "Probability and Statistics". 2nd edition.
M. DeGroot. Addison Wesley, 1986.
- "Statistical Inference".
G. Casella, R. Berger.
Wadsworth and Brooks/Cole, 1990.
fcco@cs.wpi.edu
|