Jay Ligatti
Title
Cited by
Cited by
Year
Control-flow integrity principles, implementations, and applications
M Abadi, M Budiu, Ś Erlingsson, J Ligatti
ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009
17792009
Control-flow integrity principles, implementations, and applications
M Abadi, M Budiu, Ś Erlingsson, J Ligatti
ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009
17692009
Control-flow integrity principles, implementations, and applications
M Abadi, M Budiu, Ś Erlingsson, J Ligatti
ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-40, 2009
17692009
Edit automata: Enforcement mechanisms for run-time security policies
J Ligatti, L Bauer, D Walker
International Journal of Information Security 4 (1-2), 2-16, 2005
3932005
Composing security policies with polymer
L Bauer, J Ligatti, D Walker
Proceedings of the 2005 ACM SIGPLAN conference on Programming language …, 2005
2242005
Run-time enforcement of nonsafety policies
J Ligatti, L Bauer, D Walker
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-41, 2009
2042009
A theory of aspects
D Walker, S Zdancewic, J Ligatti
ACM SIGPLAN Notices 38 (9), 127-139, 2003
1702003
More enforceable security policies
L Bauer, J Ligatti, D Walker
Proceedings of the Workshop on Foundations of Computer Security (FCS’02 …, 2002
1642002
Enforcing non-safety security policies with program monitors
J Ligatti, L Bauer, D Walker
European Symposium on Research in Computer Security, 355-373, 2005
1142005
A theory of secure control flow
M Abadi, M Budiu, U Erlingsson, J Ligatti
International Conference on Formal Engineering Methods, 111-124, 2005
882005
A theory of runtime enforcement, with results
J Ligatti, S Reddy
European Symposium on Research in Computer Security, 87-100, 2010
712010
Defining code-injection attacks
D Ray, J Ligatti
Acm Sigplan Notices 47 (1), 179-190, 2012
682012
Fault-tolerant typed assembly language
F Perry, L Mackey, GA Reis, J Ligatti, DI August, D Walker
Proceedings of the 28th ACM SIGPLAN Conference on Programming Language …, 2007
552007
Composing expressive runtime security policies
L Bauer, J Ligatti, D Walker
ACM Transactions on Software Engineering and Methodology (TOSEM) 18 (3), 1-43, 2009
522009
Policy enforcement via program monitoring
JA Ligatti, DP Walker
Princeton University, 2006
502006
System and methods for authentication using multiple devices
JA Ligatti, D Goldgof, C Cetin, JB Subils
US Patent 9,659,160, 2017
482017
Software security based on control flow integrity
M Abadi, MD Budiu, U Erlingsson, JA Ligatti
US Patent 7,577,992, 2009
462009
Software memory access control
M Abadi, U Erlingsson, JA Ligatti, MD Budiu
US Patent 7,337,291, 2008
432008
A type-theoretic interpretation of pointcuts and advice
J Ligatti, D Walker, S Zdancewic
Science of computer programming 63 (3), 240-266, 2006
372006
Static typing for a faulty lambda calculus
D Walker, L Mackey, J Ligatti, GA Reis, DI August
Proceedings of the eleventh ACM SIGPLAN international conference on …, 2006
372006
The system can't perform the operation now. Try again later.
Articles 1–20