Chapter Determining an Economic Value of High Assurance for Commodity Software Security 2023 • Lecture Notes in Computer Science • 14186:228-242 Gligor V, Perrig A, Basin D
Conference An I/O Separation Model for Formal Verification of Kernel Implementations 2021 • IEEE Symposium on Security and Privacy: Proceedings • 00:572-589 Yu M, Gligor V, Jia L
Chapter A Rest Stop on the Unending Road to Provable Security 2020 • Lecture Notes in Computer Science • 12287:223-232 Gligor VD
Chapter A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion) 2020 • Lecture Notes in Computer Science • 12287:233-241 Gligor VD
Conference Establishing and Maintaining Root of Trust on Commodity Computer Systems 2019 1-2 Gligor V
Conference Establishing Software Root of Trust Unconditionally 2019 • 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019) Gligor VD, Woo MSL
Conference Requirements for Root of Trust Establishment 2018 • Lecture Notes in Computer Science • 11286:192-202 Gligor V, Woo M
Conference Requirements for Root of Trust Establishment (Transcript of Discussion) 2018 • Lecture Notes in Computer Science • 11286:203-208 Gligor V
Conference <i>k</i>-Connectivity in Random <i>K</i>-Out Graphs Intersecting Erdos-Renyi Graphs 2017 • IEEE Transactions on Information Theory • 63(3):1677-1692 Yavuz F, Zhao J, Yagan O, Gligor V
Conference Assuring the Safety of Asymmetric Social Protocols 2017 • Lecture Notes in Computer Science • 10476:38-48 Gligor V, Stajano F
Conference Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents 2017 • Lecture Notes in Computer Science • 10368:47-57 Kang MS, Gligor VD, Sekar V
Conference Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion) 2017 • Lecture Notes in Computer Science • 10368:58-66 Gligor VD
Journal Article On Connectivity and Robustness in Random Intersection Graphs 2017 • IEEE Transactions on Automatic Control • 62(5):2121-2136 Zhao J, Yagan O, Gligor V
Journal Article PrivateRide: A Privacy-Enhanced Ride-Hailing Service 2017 • Proceedings on Privacy Enhancing Technologies • 2017(2):38-56 Pham A, Dacosta I, Jacot-Guillarmod B, Huguenin K, Hajar T, Tramèr F, Gligor V, Hubaux J-P
Conference The Case for In-Network Replay Suppression 2017 • PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17) • 862-873 Lee T, Pappas C, Perrig A, Gligor V, Hu Y-C
Journal Article Erratum: A New Privacy-Enhanced Matchmaking Protocol [IEICE Transactions on Communications Vol. E96.B (2013) , No.8 pp.2049-2059] 2016 • IEICE Transactions on Communications • E99.B(3):776-776 SHIN JS, GLIGOR VD
Conference SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks 2016 • 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016) Kang MS, Gligor VD, Sekar V
Journal Article $k$ -Connectivity in Random Key Graphs With Unreliable Links 2015 • IEEE Transactions on Information Theory • 61(7):3810-3836 Zhao J, Yağan O, Gligor V
Journal Article <i>k</i>-Connectivity in Random Key Graphs With Unreliable Links 2015 • IEEE Transactions on Information Theory • 61(7):3810-3836 Zhao J, Yagan O, Gligor V
Preprint A curious gap in one-dimensional geometric random graphs between connectivity and the absence of isolated node 2015 Zhao J, Yağan O, Gligor V
Preprint Connectivity in Secure Wireless Sensor Networks under Transmission Constraints 2015 Zhao J, Yağan O, Gligor V
Journal Article Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation 2015 • IEEE Security and Privacy • 13(2):38-46 Zhou Z, Yu M, Gligor VD
Conference Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme 2015 • 2013 National Conference on Communications, NCC 2013 • 6277-6283 Yavuz F, Zhao J, Yagan O, Gligor V