Anh Nguyen-Tuong
Anh Nguyen-Tuong
Senior Scientist, University of Virginia
Adresse e-mail validée de
Citée par
Citée par
Automatically hardening web applications using precise tainting
A Nguyen-Tuong, S Guarnieri, D Greene, J Shirley, D Evans
IFIP International Information Security Conference, 295-307, 2005
N-Variant Systems: A Secretless Framework for Security through Diversity.
B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ...
USENIX Security Symposium 114, 114, 2006
ILR: Where'd my gadgets go?
J Hiser, A Nguyen-Tuong, M Co, M Hall, JW Davidson
2012 IEEE Symposium on Security and Privacy, 571-585, 2012
Effectiveness of moving target defenses
D Evans, A Nguyen-Tuong, J Knight
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 29-48, 2011
Secure and practical defense against code-injection attacks using software dynamic translation
W Hu, J Hiser, D Williams, A Filipi, JW Davidson, D Evans, JC Knight, ...
Proceedings of the 2nd international conference on Virtual execution …, 2006
Security through diversity: Leveraging virtual machine technology
D Williams, W Hu, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong
IEEE Security & Privacy 7 (1), 26-33, 2009
Security through redundant data diversity
A Nguyen-Tuong, D Evans, JC Knight, B Cox, JW Davidson
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
The legion grid portal
A Natrajan, A Nguyen‐Tuong, MA Humphrey, M Herrick, BP Clarke, ...
Concurrency and Computation: Practice and Experience 14 (13‐15), 1365-1394, 2002
Campus-wide computing: Early results using Legion at the university of Virginia
AS Grimshaw, A Nguyen-Tuong, MJ Lewis, M Hyett
The International Journal of Supercomputer Applications and High Performance …, 1997
Grid-based file access: The legion I/O model
BS White, AS Grimshaw, A Nguyen-Tuong
Proceedings the Ninth International Symposium on High-Performance …, 2000
Integrating fault-tolerance techniques in grid applications
A Nguyen-Tuong
University of Virginia, 2000
ILR: Where'd My Gadgets Go?
JW Davidson, M Hall, A Nguyen-Tuong, J Hiser
2012 IEEE Symposium on Security and Privacy, 571-585, 2012
Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing
S Nagy, A Nguyen-Tuong, JD Hiser, JW Davidson, M Hicks
30th USENIX Security Symposium (USENIX Security 21), 1683-1700, 2021
Support for extensibility and site autonomy in the Legion grid system object model
MJ Lewis, AJ Ferrari, MA Humphrey, JF Karpovich, MM Morgan, ...
Journal of Parallel and Distributed Computing 63 (5), 525-538, 2003
Method and System for Software Protection Using Binary Encoding
JW Davidson, A Nguyen-Tuong, JC Rowanhill, DE Evans, JC Knight, ...
US Patent App. 11/995,272, 2009
Zipr: Efficient static binary rewriting for security
WH Hawkins, JD Hiser, M Co, A Nguyen-Tuong, JW Davidson
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Methods, systems and computer readable media for detecting command injection attacks
A Nguyen-Tuong, JW Davidson, JD Hiser, JC Knight
US Patent 9,635,033, 2017
Exploiting data-flow for fault-tolerance in a wide-area parallel system
A Nguyen-Tuong, AS Grimshaw, M Hyett
Proceedings 15th Symposium on Reliable Distributed Systems, 2-11, 1996
From Legion to Avaki: The persistence of vision
AS Grimshaw, A Natrajan, MA Humphrey, MJ Lewis, A Nguyen‐Tuong, ...
Grid Computing: making the global infrastructure a reality, 265-298, 2003
Enabling Flexibility in the Legion Run-Time Library.
CL Viles, MJ Lewis, A Ferrari, A Nguyen-Tuong, AS Grimshaw
PDPTA, 265-274, 1997
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20