Automatically hardening web applications using precise tainting A Nguyen-Tuong, S Guarnieri, D Greene, J Shirley, D Evans Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005 | 534 | 2005 |
N-Variant Systems: A Secretless Framework for Security through Diversity. B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ... USENIX Security Symposium, 105-120, 2006 | 441 | 2006 |
ILR: Where'd my gadgets go? J Hiser, A Nguyen-Tuong, M Co, M Hall, JW Davidson 2012 IEEE Symposium on Security and Privacy, 571-585, 2012 | 316 | 2012 |
Secure and practical defense against code-injection attacks using software dynamic translation W Hu, J Hiser, D Williams, A Filipi, JW Davidson, D Evans, JC Knight, ... Proceedings of the 2nd international conference on Virtual execution …, 2006 | 169 | 2006 |
Effectiveness of moving target defenses D Evans, A Nguyen-Tuong, J Knight Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 29-48, 2011 | 166 | 2011 |
Security through diversity: Leveraging virtual machine technology D Williams, W Hu, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong IEEE Security & Privacy 7 (1), 26-33, 2009 | 114 | 2009 |
Security through redundant data diversity A Nguyen-Tuong, D Evans, JC Knight, B Cox, JW Davidson 2008 IEEE International Conference on Dependable Systems and Networks With …, 2008 | 109 | 2008 |
The legion grid portal A Natrajan, A Nguyen‐Tuong, MA Humphrey, M Herrick, BP Clarke, ... Concurrency and Computation: Practice and Experience 14 (13‐15), 1365-1394, 2002 | 107 | 2002 |
Campus-wide computing: Early results using Legion at the university of Virginia AS Grimshaw, A Nguyen-Tuong, MJ Lewis, M Hyett The International Journal of Supercomputer Applications and High Performance …, 1997 | 83 | 1997 |
Grid-based file access: The legion I/O model BS White, AS Grimshaw, A Nguyen-Tuong Proceedings the Ninth International Symposium on High-Performance …, 2000 | 78 | 2000 |
Integrating fault-tolerance techniques in grid applications A Nguyen-Tuong University of Virginia, 2000 | 65 | 2000 |
Support for extensibility and site autonomy in the Legion grid system object model MJ Lewis, AJ Ferrari, MA Humphrey, JF Karpovich, MM Morgan, ... Journal of Parallel and Distributed Computing 63 (5), 525-538, 2003 | 55 | 2003 |
Method and System for Software Protection Using Binary Encoding JW Davidson, A Nguyen-Tuong, JC Rowanhill, DE Evans, JC Knight, ... US Patent App. 11/995,272, 2009 | 39 | 2009 |
Enabling Flexibility in the Legion Run-Time Library. CL Viles, MJ Lewis, A Ferrari, A Nguyen-Tuong, AS Grimshaw PDPTA, 265-274, 1997 | 34 | 1997 |
Exploiting data-flow for fault-tolerance in a wide-area parallel system A Nguyen-Tuong, AS Grimshaw, M Hyett Proceedings 15th Symposium on Reliable Distributed Systems, 2-11, 1996 | 34 | 1996 |
Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing S Nagy, A Nguyen-Tuong, JD Hiser, JW Davidson, M Hicks 30th USENIX Security Symposium, 2021 | 33 | 2021 |
Methods, systems and computer readable media for detecting command injection attacks A Nguyen-Tuong, JW Davidson, JD Hiser, JC Knight US Patent 9,635,033, 2017 | 31 | 2017 |
From Legion to Avaki: The persistence of vision AS Grimshaw, A Natrajan, MA Humphrey, MJ Lewis, A Nguyen‐Tuong, ... Grid Computing: making the global infrastructure a reality, 265-298, 2003 | 30 | 2003 |
Using reflection for incorporating fault-tolerance techniques into distributed applications A Nguyen-Tuong, AS Grimshaw Parallel Processing Letters 9 (02), 291-301, 1999 | 29 | 1999 |
Zipr: Efficient static binary rewriting for security WH Hawkins, JD Hiser, M Co, A Nguyen-Tuong, JW Davidson 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 28 | 2017 |