Chapter Determining an Economic Value of High Assurance for Commodity Software Security 2023 • Lecture Notes in Computer Science • 14186 LNCS:228-242 Gligor V, Perrig A, Basin D
Conference An I/O separation model for formal verification of kernel implementations 2021 • IEEE Symposium on Security and Privacy: Proceedings • 2021-May:572-589 Yu M, Gligor V, Jia L
Chapter A rest stop on the unending road to provable security 2020 • Lecture Notes in Computer Science • 12287 LNCS:223-232 Gligor VD
Chapter A rest stop on the unending road to provable security (transcript of discussion) 2020 • Lecture Notes in Computer Science • 12287 LNCS:233-241 Gligor VD
Conference Establishing and Maintaining Root of Trust on Commodity Computer Systems 2019 1-2 Gligor V
Conference Establishing Software Root of Trust Unconditionally 2019 • 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019) Gligor VD, Woo MSL
Journal Article Anonymity Leakage in Private VoIP Networks 2018 • IEEE Transactions on Dependable and Secure Computing • 15(1):14-26 Shintre S, Gligor V, Barros JA
Conference Requirements for Root of Trust Establishment 2018 • Lecture Notes in Computer Science • 11286:192-202 Gligor V, Woo M
Conference Requirements for Root of Trust Establishment (Transcript of Discussion) 2018 • Lecture Notes in Computer Science • 11286 LNCS:203-208 Gligor V
Conference <i>k</i>-Connectivity in Random <i>K</i>-Out Graphs Intersecting Erdos-Renyi Graphs 2017 • IEEE Transactions on Information Theory • 63(3):1677-1692 Yavuz F, Zhao J, Yagan O, Gligor V
Conference Assuring the safety of asymmetric social protocols 2017 • Lecture Notes in Computer Science • 10476 LNCS:38-48 Gligor V, Stajano F
Conference Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents 2017 • Lecture Notes in Computer Science • 10368:47-57 Kang MS, Gligor VD, Sekar V
Conference Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion) 2017 • Lecture Notes in Computer Science • 10368:58-66 Gligor VD
Journal Article On Connectivity and Robustness in Random Intersection Graphs 2017 • IEEE Transactions on Automatic Control • 62(5):2121-2136 Zhao J, Yagan O, Gligor V
Journal Article PrivateRide: A Privacy-Enhanced Ride-Hailing Service 2017 • Proceedings on Privacy Enhancing Technologies • 2017(2):38-56 Pham A, Dacosta I, Jacot-Guillarmod B, Huguenin K, Hajar T, Tramèr F, Gligor V, Hubaux J-P
Conference The Case for In-Network Replay Suppression 2017 • PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17) • 862-873 Lee T, Pappas C, Perrig A, Gligor V, Hu Y-C
Journal Article Erratum: A New Privacy-Enhanced Matchmaking Protocol [IEICE Transactions on Communications Vol. E96.B (2013) , No.8 pp.2049-2059] 2016 • IEICE Transactions on Communications • E99.B(3):776-776 SHIN JS, GLIGOR VD
Conference SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks 2016 • 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016) Kang MS, Gligor VD, Sekar V
Journal Article $k$ -Connectivity in Random Key Graphs With Unreliable Links 2015 • IEEE Transactions on Information Theory • 61(7):3810-3836 Zhao J, Yağan O, Gligor V
Journal Article <i>k</i>-Connectivity in Random Key Graphs With Unreliable Links 2015 • IEEE Transactions on Information Theory • 61(7):3810-3836 Zhao J, Yagan O, Gligor V
Preprint A curious gap in one-dimensional geometric random graphs between connectivity and the absence of isolated node 2015 Zhao J, Yağan O, Gligor V
Preprint Connectivity in Secure Wireless Sensor Networks under Transmission Constraints 2015 Zhao J, Yağan O, Gligor V
Journal Article Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation 2015 • IEEE Security and Privacy • 13(2):38-46 Zhou Z, Yu M, Gligor VD