Thomas Moyer
Thomas Moyer
Verified email at uncc.edu - Homepage
Title
Cited by
Cited by
Year
Trustworthy whole-system provenance for the linux kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th {USENIX} Security Symposium ({USENIX} Security 15), 319-334, 2015
1472015
Seeding clouds with trust anchors
J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010
1372010
Configuration management at massive scale: system design and experience
W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ...
IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009
1152009
Novel packet size-based covert channel attacks against anonymizer
Z Ling, X Fu, W Jia, W Yu, D Xuan, J Luo
IEEE Transactions on Computers 62 (12), 2411-2426, 2012
62*2012
Practical whole-system provenance capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
Proceedings of the 2017 Symposium on Cloud Computing, 405-418, 2017
532017
Towards scalable cluster auditing through grammatical inference over provenance graphs
WU Hassan, L Aguse, N Aguse, A Bates, T Moyer
Network and Distributed Systems Security Symposium, 2018
452018
Scalable web content attestation
T Moyer, K Butler, J Schiffman, P McDaniel, T Jaeger
IEEE Transactions on Computers 61 (5), 686-699, 2011
362011
Justifying integrity using a virtual machine verifier
J Schiffman, T Moyer, C Shal, T Jaeger, P McDaniel
2009 Annual Computer Security Applications Conference, 83-92, 2009
362009
Take only what you need: leveraging mandatory access control policy to reduce provenance storage costs
A Bates, KRB Butler, T Moyer
7th {USENIX} Workshop on the Theory and Practice of Provenance (TaPP 15), 2015
332015
An architecture for enforcing end-to-end access control over web applications
B Hicks, S Rueda, D King, T Moyer, J Schiffman, Y Sreenivasan, ...
Proceedings of the 15th ACM symposium on Access control models and …, 2010
332010
Runtime analysis of whole-system provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
272018
Network-based root of trust for installation
J Schiffman, T Moyer, T Jaeger, P McDaniel
IEEE Secur. Priv. 9 (1), 40-48, 2011
252011
Transparent web service auditing via network provenance functions
A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ...
Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017
242017
Bootstrapping and maintaining trust in the cloud
N Schear, PT Cable, TM Moyer, B Richard, R Rudd
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
162016
High-throughput ingest of data provenance records into Accumulo
T Moyer, V Gadepally
2016 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2016
102016
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems
A Al Farooq, E Al-Shaer, T Moyer, K Kant
2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019
92019
New security architectures based on emerging disk functionality
K Butler, S McLaughlin, T Moyer, P McDaniel
IEEE Security & Privacy 8 (5), 34-41, 2010
82010
Leveraging data provenance to enhance cyber resilience
T Moyer, K Chadha, R Cunningham, N Schear, W Smith, A Bates, K Butler, ...
2016 IEEE Cybersecurity Development (SecDev), 107-114, 2016
62016
Firma: Disk-Based Foundations for Trusted Operating Systems
K Butler, S McLaughlin, T Moyer, J Schiffman, P McDaniel, T Jaeger
Technical Report NAS-TR-0114-2009, Penn State Univ, 2009
62009
Taming the costs of trustworthy provenance through policy reduction
A Bates, D Tian, G Hernandez, T Moyer, KRB Butler, T Jaeger
ACM Transactions on Internet Technology (TOIT) 17 (4), 1-21, 2017
42017
The system can't perform the operation now. Try again later.
Articles 1–20