Automatically hardening web applications using precise tainting A Nguyen-Tuong, S Guarnieri, D Greene, J Shirley, D Evans IFIP International Information Security Conference, 295-307, 2005 | 550 | 2005 |
N-Variant Systems: A Secretless Framework for Security through Diversity. B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ... USENIX Security Symposium 114, 114, 2006 | 467 | 2006 |
ILR: Where'd my gadgets go? J Hiser, A Nguyen-Tuong, M Co, M Hall, JW Davidson 2012 IEEE Symposium on Security and Privacy, 571-585, 2012 | 323 | 2012 |
Effectiveness of moving target defenses D Evans, A Nguyen-Tuong, J Knight Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 29-48, 2011 | 176 | 2011 |
Secure and practical defense against code-injection attacks using software dynamic translation W Hu, J Hiser, D Williams, A Filipi, JW Davidson, D Evans, JC Knight, ... Proceedings of the 2nd international conference on Virtual execution …, 2006 | 173 | 2006 |
Security through diversity: Leveraging virtual machine technology D Williams, W Hu, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong IEEE Security & Privacy 7 (1), 26-33, 2009 | 119 | 2009 |
Security through redundant data diversity A Nguyen-Tuong, D Evans, JC Knight, B Cox, JW Davidson 2008 IEEE International Conference on Dependable Systems and Networks With …, 2008 | 117 | 2008 |
The legion grid portal A Natrajan, A Nguyen‐Tuong, MA Humphrey, M Herrick, BP Clarke, ... Concurrency and Computation: Practice and Experience 14 (13‐15), 1365-1394, 2002 | 109 | 2002 |
Campus-wide computing: Early results using Legion at the university of Virginia AS Grimshaw, A Nguyen-Tuong, MJ Lewis, M Hyett The International Journal of Supercomputer Applications and High Performance …, 1997 | 82 | 1997 |
Grid-based file access: The legion I/O model BS White, AS Grimshaw, A Nguyen-Tuong Proceedings the Ninth International Symposium on High-Performance …, 2000 | 78 | 2000 |
Integrating fault-tolerance techniques in grid applications A Nguyen-Tuong University of Virginia, 2000 | 66 | 2000 |
ILR: Where'd My Gadgets Go? JW Davidson, M Hall, A Nguyen-Tuong, J Hiser 2012 IEEE Symposium on Security and Privacy, 571-585, 2012 | 61 | 2012 |
Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing S Nagy, A Nguyen-Tuong, JD Hiser, JW Davidson, M Hicks 30th USENIX Security Symposium (USENIX Security 21), 1683-1700, 2021 | 57 | 2021 |
Support for extensibility and site autonomy in the Legion grid system object model MJ Lewis, AJ Ferrari, MA Humphrey, JF Karpovich, MM Morgan, ... Journal of Parallel and Distributed Computing 63 (5), 525-538, 2003 | 53 | 2003 |
Method and System for Software Protection Using Binary Encoding JW Davidson, A Nguyen-Tuong, JC Rowanhill, DE Evans, JC Knight, ... US Patent App. 11/995,272, 2009 | 41 | 2009 |
Zipr: Efficient static binary rewriting for security WH Hawkins, JD Hiser, M Co, A Nguyen-Tuong, JW Davidson 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 37 | 2017 |
Methods, systems and computer readable media for detecting command injection attacks A Nguyen-Tuong, JW Davidson, JD Hiser, JC Knight US Patent 9,635,033, 2017 | 34 | 2017 |
Exploiting data-flow for fault-tolerance in a wide-area parallel system A Nguyen-Tuong, AS Grimshaw, M Hyett Proceedings 15th Symposium on Reliable Distributed Systems, 2-11, 1996 | 34 | 1996 |
From Legion to Avaki: The persistence of vision AS Grimshaw, A Natrajan, MA Humphrey, MJ Lewis, A Nguyen‐Tuong, ... Grid Computing: making the global infrastructure a reality, 265-298, 2003 | 33 | 2003 |
Enabling Flexibility in the Legion Run-Time Library. CL Viles, MJ Lewis, A Ferrari, A Nguyen-Tuong, AS Grimshaw PDPTA, 265-274, 1997 | 33 | 1997 |