Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
David Evans - Publications
[go: Go Back, main page]

David Evans — Publications

[Refereed Research Papers | Education | Proposals | Tech Reports | Theses | Theses Advised | Other] [Talks]

Most Cited Papers (according to Google Scholar)
LCLint: A Tool for Using Specifications to Check Code (with John Guttag, Jim Horning and Yang Meng Tan). FSE 94. [PDF] [191 cites]
Secure Aggregation for Wireless Networks (with Lingxuan Hu). WSAAN 2003. [PDF] [104 cites]
Using Directional Antennas to Prevent Wormhole Attacks (with Lingxuan Hu). NDSS 2004. February 2004. [PDF] [102 cites]

Other Selected Papers
Reverse-Engineering a Cryptographic RFID Tag (with Karsten Nohl, Starbug, and Henryk Plötz). USENIX Security 2008, July 2008. [PDF]
N-Variant Systems: A Secretless Framework for Security through Diversity (with Benjamin Cox, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-Tuong, and Jason Hiser. USENIX Security 2006, August 2006. [22 cites]
Perracotta: Mining Temporal API Rules From Imperfect Traces (with Jinlin Yang, Deepali Bhardwaj, Thirumalesh Bhat, and Manuvir Das). ICSE 2006. May 2006. [54 cites]
Automatically Hardening Web Applications Using Precise Tainting (with Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene and Jeff Shirley). IFIP Security, June 2005. [PDF] [73 cites]

Refereed Research Papers

Reverse-Engineering a Cryptographic RFID Tag
Karsten Nohl, David Evans, Starbug, and Henryk Plötz. USENIX Security 2008. San Jose, CA. July 2008. (PDF, 9 pages; HTML)
Privacy Protection for Social Networking Platforms
Adrienne Felt and David Evans. Web 2.0 Security and Privacy 2008 (in conjunction with 2008 IEEE Symposium on Security and Privacy). Oakland, CA. 22 May 2008. (PDF, 8 pages) (Talk slides: PDF)
Hiding in Groups: On the Expressiveness of Privacy Distributions
Karsten Nohl and David Evans. 23rd International Information Security Conference (SEC 2008). Co-located with IFIP World Computer Congress 2008. Milan, Italy. 8-10 September 2008. (Paper: PDF, 15 pages; Extended technical report: PDF, 18 pages)
Security through Redundant Data Diversity
Anh Nguyen-Tuong, David Evans, John C. Knight, Benjamin Cox, Jack W. Davidson. 38th IEEE/IFPF International Conference on Dependable Systems and Networks, Anchorage, Alaska, June 2008. (PDF, 10 pages)
Talking to Strangers Without Taking Their Candy: Isolating Proxied Content
Adrienne Felt, Pieter Hooimeijer, David Evans, Westley Weimer. First International Workshop on Social Network Systems, Glasgow, Scotland, April 2008. (PDF, 6 pages)
Quantifying Information Leakage in Tree-Based Hash Protocols (short paper)
Karsten Nohl and David Evans. Eigth International Conference on Information and Communications Security (ICICS). Raleigh, North Carolina, December 2006. (Paper: PDF, 10 pages; Technical Report (UVA-CS-2006-20): PDF, 12 pages) [5 cites]
N-Variant Systems: A Secretless Framework for Security through Diversity
Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-Tuong, and Jason Hiser. 15th USENIX Security Symposium, Vancouver, BC, August 2006. (PDF, 16 pages; HTML)
Comparing Java and .NET security: Lessons Learned and Missed
Nathanael Paul and David Evans. Computers & Security, Volume 25, Issue 5, July 2006. (PDF, HTML, 13 pages)

Secure and Practical Defense Against Code-injection Attacks Using Software Dynamic Translation

Wei Hu, Jason Hiser, Dan Williams, Adrian Filipi, Jack W. Davidson, David Evans, John C. Knight, Anh Nguyen-Tuong, and Jonathan Rowanhill. Second International Conference on Virtual Execution Environments. Ottawa, Canada, June 14-16, 2006. (PDF, 11 pages) [7 cites]
Perracotta: Mining Temporal API Rules From Imperfect Traces
Jinlin Yang, David Evans, Deepali Bhardwaj, Thirumalesh Bhat, Manuvir Das. 28th International Conference in Software Engineering, Research Track, Shanghai, China, May 2006. (PDF, 10 pages; Perracotta web site)
Inculcating Invariants in Introductory Courses
David Evans and Michael Peck. 28th International Conference in Software Engineering, Education Track, Shanghai, China, May 2006. (PDF, 6 pages; Talk [PPT]) [2 cites]
Thermal Attacks on Storage Systems
Nathanael Paul, Sudhanva Gurumurthi, David Evans. 14th NASA Goddard, 23rd IEEE Conference on Mass Storage Systems and Technologies, College Park, Maryland, May 2006. (PDF, 9 pages)
Toasters, Seat Belts, and Inferring Program Properties
David Evans. IFIP Working Conference on Verified Software: Theories, Tools, Experiments. Zürich, Switzerland. 10-13 October 2005. (PDF, 8 pages)
Where's the FEEB?: The Effectiveness of Instruction Set Randomization
Ana Nora Sovarel, David Evans and Nathanael Paul. 14th USENIX Security Symposium. Baltimore, MD. August 2005. (PDF, HTML, 16 pages)
Automatically Hardening Web Applications Using Precise Tainting
Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, and David Evans. IFIP Security, June 2005. (PDF, 12 pages)
.NET Security: Lessons Learned and Missed from Java
Nathanael Paul and David Evans. Twentieth Annual Computer Security Applications Conference (ACSAC 2004). December 6-10, 2004, Tucson, Arizona. (PDF, 10 pages) (Extended version published in Computers & Security.) [10 cites]
Automatically Inferring Temporal Properties for Program Evolution
Jinlin Yang and David Evans. Fifteenth IEEE International Symposium on Software Reliability Engineering (ISSRE 2004). 2-5 November 2004, Saint-Malo, France. (PDF, 12 pages) [16 cites]
Localization for Mobile Sensor Networks
Lingxuan Hu and David Evans. Tenth Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2004). 26 September - 1 October 2004. (PDF, 13 pages)
Dynamically Inferring Temporal Properties
Jinlin Yang and David Evans. ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2004). Washington, DC 7-8 June 2004. (PDF, 6 pages) [ACM DL Page] [21 cites]
Election Security: Perception and Reality
David Evans and Nathanael Paul. IEEE Security and Privacy, January-February 2004. (PDF, 8 pages) [16 cites]
Using Directional Antennas to Prevent Wormhole Attacks
Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004. (PDF, 11 pages)
EnviroTrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks
T. Abdelzaher, B. Blum B, Q. Cao, Y. Chen, D. Evans, J. George, S. George, L. Gu, T. He, S. Krishnamurthy, L. Luo, S. Son, J. Stankovic, R. Stoleru and A. Wood. The 24th International Conference on Distributed Computing Systems. Tokyo, Japan. March 23-26, 2004. (PDF, 8 pages) [93 cites]
A Biological Programming Model for Self-Healing
Selvin George, David Evans and Steven Marchette. First ACM Workshop on Survivable and Self-Regenerative Systems, October 31, 2003. (PDF, 10 pages) [34 cites]
Power-Efficient Adaptable Wireless Sensor Networks
John Lach, David Evans, Jon McCune, Jason Brandon. Military and Aerospace Programmable Logic Devices (MAPLD) International Conference 2003. September 9-11, 2003. (PDF, 2 page abstract; PDF, full paper, 8 pages)
Towards Differential Program Analysis
Joel Winstead and David Evans. Workshop on Dynamic Analysis. 9 May 2003. (PDF, 4 pages)
Authentication for Remote Voting
Nathanael Paul, David Evans, Avi Rubin and Dan Wallach. Workshop on Human-Computer Interaction and Security Systems. 6 April 2003. (PDF, 4 pages)
Secure Aggregation for Wireless Networks.
Lingxuan Hu and David Evans. Workshop on Security and Assurance in Ad hoc Networks. January, 2003. (PDF, PS, 8 pages) (Citeseer Page) [98 cites]
A Biologically Inspired Programming Model for Self-Healing Systems.
Selvin George, David Evans and Lance Davidson. Workshop on Self-Healing Systems (WOSS'02). November, 2002. (PDF, PS, 3 pages) [ACM DL Page]
Improving Security Using Extensible Lightweight Static Analysis.
David Evans and David Larochelle. IEEE Software, Jan/Feb 2002. (PDF, 10 pages) (CiteSeer Page)
Security Issues and Requirements for Internet-Scale Publish-Subscribe Systems.
Chenxi Wang, Antonio Carzaniga, David Evans, Alexander L. Wolf. In Hawaii International Conference on System Sciences, January 7-10, 2002. (PDF, 8 pages) [83 cites]
Structured Exception Semantics for Concurrent Loops.
Joel Winstead and David Evans. In Fourth Workshop on Parallel/High-Performance Object-Oriented Scientific Computing 14-18 October 2001, Tampa Bay. (PS, 20 pages)
Statically Detecting Likely Buffer Overflow Vulnerabilities.
David Larochelle and David Evans. In Proceedings of the 2001 USENIX Security Symposium, Washington, D. C., August 13-17, 2001. (PDF, HTML, 13 pages) (CiteSeer Page)
Annotation-Assisted Lightweight Static Checking
David Evans. The First International Workshop on Automated Program Analysis, Testing and Verification (ICSE 2000). Feb 25, 2000.
Separation of Concerns for Security
John Viega and David Evans. Workshop on Multi-Dimensional Separation of Concerns in Software Engineering (ICSE 2000). Feb 25, 2000.
Policy-Directed Code Safety
David Evans and Andrew Twyman. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, California, May 9-12, 1999. (PDF, PS, 14 pages) (CiteSeer Page)
Static Detection of Dynamic Memory Errors
David Evans. In SIGPLAN Conference on Programming Language Design and Implementation (PLDI '96), Philadelphia, PA, May 1996. (PS, PDF, 10 pages) (CiteSeer Page)

LCLint: A Tool for Using Specifications to Check Code

David Evans, John Guttag, Jim Horning and Yang Meng Tan, SIGSOFT Symposium on the Foundations of Software Engineering, December 1994. (PDF, PS; 10 pages) (CiteSeer Page)

Education Papers

Creating a Computer Science Major for Arts & Sciences Students
David Evans and J. McGrath Cohoon. Computing Research News, Computing Research Association, January 2008. (PDF, 3 pages)
Inculcating Invariants in Introductory Courses
David Evans and Michael Peck. 28th International Conference in Software Engineering, Education Track, Shanghai, China, May 2006. (PDF, 6 pages; Talk [PPT])

Selected Proposals

NSF CAREER: Programming the Swarm
David Evans. Submitted July 2000. Grant awarded 1 March 2001 - 28 Feb 2006. (PDF, PS, NSF Page)

University of Virginia Teaching Fellowship: Teaching Introductory Computer Science as a Liberal Art

David Evans. Submitted February 2001. Awarded 2001-2002. (PDF, Course)

NSF CCLI: Teaching Software Engineering Using Lightweight Analysis

David Evans. Submitted June 2001. Grant awarded 1 January 2002 - 31 December 2003. (PDF, PS)
NSF ITR: A Framework for Environment-Aware, Massively Distributed Computing
David Evans (PI), Tarek Abdelzaher and David Brogan. Submitted 13 Nov 2001. Grant awarded September 2002 - August 2005. (PDF)

Technical Reports

Christopher Frost, Michael Peck, David Evans.
Pancakes, Puzzles, and Polynomials: Cracking the Cracker Barrel. University of Virginia Computer Science Technical Report, CS-2004-04. March 2004. [PDF]

David Evans and Michael Peck. Simulating Critical Software Engineering. University of Virginia Computer Science Technical Report, CS-2004-03. February 2004. [PDF]

Weilin Zhong and David Evans. When Ants Attack: Security Issues for Stigmergic Systems. University of Virginia Computer Science Technical Report, CS-2002-23. April 2002. [PDF]

Theses

Policy-Directed Code Safety
David Evans. MIT PhD Thesis. October 19, 1999. (abstract; PDF, PS, 137 pages).

Using Specifications to Check Source Code

David Evans. MIT SM Thesis. MIT/LCS/TR-628, June 1994. (PDF, PS, 96 pages)

Theses Advised

Nathanael Paul, Disk-Level Behavioral Malware Detection
University of Virginia PhD. May 2008. (Abstract; PDF, 155 pages)
Weilin Zhong, When Ants Attack: Security Issues for Stigmergic Systems
University of Virginia, Master of Computer Science. April 2002. (Abstract; PS, 9 pages)
Joel Winstead, Structured Exception Semantics for Parallel Loops
University of Virginia, Master of Science Thesis. January 2002. (abstract; PDF, PS, 56 pages)
Andrew Twyman, Flexible Code Safety for Win32
MIT MEng Thesis (co-supervised with John Guttag). May 21, 1999. (abstract; PDF, PS, 91 pages)
Senior Theses

Other Publications

Hostile Java Applets
David Evans. Article in The Handbook of Information Security. September 2005. [PDF, 10 pages]
Pancakes, Puzzles, and Polynomials: Cracking the Cracker Barrel
Christopher Frost, Michael Peck, David Evans. SIGACT News, March 2004. [PDF, 4 pages]
Finding Security Vulnerabilities Before Evildoers Do
David Evans. Invited paper for Conferencia Internacional de Software Libre, Malaga, Spain, 20 February 2004. [PDF, 6 pages]

On The Run

Marc Raibert, Jessica Hodgins, Robert Playter, Lance Borvansky, Lee Campbell, David Evans, Adam Crane and Marie Lamb, SIGGRAPH `91 Electronic Theater Las Vegas. Also shown at Los Angeles International Animation Celebration, October 1991; London Computer Animation Festival, October 1991; and Imagina, Monte Carlo, January 1992. (Video)

LCLint User's Guide

David Evans, February 1996 - 2001. (Obsoleted by Splint.)
Splint User's Guide
Secure Programming Group, 2002.

CS 655 David Evans - Publications
University of Virginia
Department of Computer Science
David Evans
evans@cs.virginia.edu