The DARPA Cyber Grand Challenge: A Competitor's Perspective J Song, J Alves-Foss IEEE Security & Privacy 13 (6), 72-76, 2015 | 52 | 2015 |
The DARPA Cyber Grand Challenge: A Competitor's Perspective, Part 2 J Song, J Alves-Foss IEEE Security & Privacy 14 (1), 76-81, 2016 | 31 | 2016 |
Function boundary detection in stripped binaries J Alves-Foss, J Song Proceedings of the 35th Annual Computer Security Applications Conference, 84-96, 2019 | 27 | 2019 |
Performance review of zero copy techniques J Song, J Alves-Foss International Journal of Computer Science and Security (IJCSS) 6 (4), 256, 2012 | 25 | 2012 |
Security tagging for a zero-kernel operating system J Song, J Alves-Foss System Sciences (HICSS), 2013 46th Hawaii International Conference on, 5049-5058, 2013 | 23 | 2013 |
A Review on Data Falsification-Based attacks In Cooperative Intelligent Transportation Systems SA Almalki, J Song International Journal of Computer Science and Security (IJCSS) 14 (2), 22, 2020 | 15 | 2020 |
Dynamic Taint Analysis Tools: A Review AM Alashjaee, S Duraibi, J Song International Journal of Computer Science and Security (IJCSS) 13 (6), 231, 2019 | 9 | 2019 |
A Review on Grammar-Based Fuzzing Techniques H Al Salem, J Song International Journal of Computer Science & Security (IJCSS) 13 (3), 114, 2019 | 9 | 2019 |
A new operating system for security tagged architecture hardware in support of multiple independent levels of security (mils) compliant system J Alves-Foss, J Song, S Steiner, S Zakeri IDAHO UNIV MOSCOW CENTER FOR SECURE AND DEPENDABLE SYSTEMS, 2014 | 7 | 2014 |
Development and evaluation of a security tagging scheme for a real-time zero operating system kernel J Song University of Idaho, 2012 | 7 | 2012 |
IoT-Taint: IoT Malware Detection Framework Using Dynamic Taint Analysis AM Alashjaee, S Duraibi, J Song 2019 International Conference on Computational Science and Computational …, 2019 | 6 | 2019 |
A Study on Using Code Coverage Information Extracted from Binary to Guide Fuzzing B Lou, J Song International Journal of Computer Science and Security (IJCSS) 14 (5), 200, 2020 | 5 | 2020 |
A Survey of Symbolic Execution Tools S Duraibi, AM Alashjaee, J Song Int. J. Comput. Sci. and Secur.(IJCSS) 13, 244, 2019 | 5 | 2019 |
Hardware security tags for enhanced operating system security J Song, J Alves-Foss Issues in Information Systems 14 (1), 61-71, 2013 | 5 | 2013 |
Security Tagging for a Real-time Zero-kernel Operating System: Implementation and Verification J Song University of Idaho, 2014 | 4 | 2014 |
Implications of Multi-Core Architectures on the Development of Multiple Independent Levels of Security (MILS) Compliant Systems J Alves-Foss, P Oman, R Bradetich, X He, J Song IDAHO UNIV MOSCOW CENTER FOR SECURE AND DEPENDABLE SYSTEMS, 2012 | 3 | 2012 |
Grammar-based Fuzzing Tool Using Markov Chain Model to Generate New Fuzzing Inputs H Al Salem, J Song 2021 International Conference on Computational Science and Computational …, 2021 | 2 | 2021 |
Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms J Alves-Foss, J Song, AS Amack, L Kerr, S Steiner System Sciences (HICSS), 2015 48th Hawaii International Conference on, 5201-5210, 2015 | 2 | 2015 |
Cyber Security K Haltinner, D Sarathchandra, J Alves-Foss, K Chang, DC de Leon, ... Springer,, 2016 | 1 | 2016 |
IoT Smart Home Devices’ Security, Privacy, and Firmware Labeling System NW Rajkhan, J Song 2021 International Conference on Computational Science and Computational …, 2021 | | 2021 |