default search action
Virgil D. Gligor
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c132]Virgil D. Gligor, Adrian Perrig, David A. Basin:
Determining an Economic Value of High Assurance for Commodity Software Security. Security Protocols Workshop 2023: 228-242 - 2021
- [c131]Miao Yu, Virgil D. Gligor, Limin Jia:
An I/O Separation Model for Formal Verification of Kernel Implementations. SP 2021: 572-589
2010 – 2019
- 2019
- [c130]Virgil D. Gligor:
Establishing and Maintaining Root of Trust on Commodity Computer Systems. AsiaCCS 2019: 1-2 - [c129]Virgil D. Gligor:
Winning Against any Adversary on Commodity Computer Systems. CYSARM@CCS 2019: 1-2 - [c128]Virgil D. Gligor, Shan Leung Maverick Woo:
Establishing Software Root of Trust Unconditionally. NDSS 2019 - [c127]Virgil D. Gligor:
A Rest Stop on the Unending Road to Provable Security. Security Protocols Workshop 2019: 223-232 - [c126]Virgil D. Gligor:
A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion). Security Protocols Workshop 2019: 233-241 - [i13]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On Connectivity and Robustness in Random Intersection Graphs. CoRR abs/1911.01822 (2019) - 2018
- [j33]Saurabh Shintre, Virgil D. Gligor, João Barros:
Anonymity Leakage in Private VoIP Networks. IEEE Trans. Dependable Secur. Comput. 15(1): 14-26 (2018) - [c125]Virgil D. Gligor, Maverick Woo:
Requirements for Root of Trust Establishment. Security Protocols Workshop 2018: 192-202 - [c124]Virgil D. Gligor:
Requirements for Root of Trust Establishment (Transcript of Discussion). Security Protocols Workshop 2018: 203-208 - 2017
- [j32]Anh Pham, Italo Dacosta, Bastien Jacot-Guillarmod, Kévin Huguenin, Taha Hajar, Florian Tramèr, Virgil D. Gligor, Jean-Pierre Hubaux:
PrivateRide: A Privacy-Enhanced Ride-Hailing Service. Proc. Priv. Enhancing Technol. 2017(2): 38-56 (2017) - [j31]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On Connectivity and Robustness in Random Intersection Graphs. IEEE Trans. Autom. Control. 62(5): 2121-2136 (2017) - [j30]Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
k-Connectivity in Random K-Out Graphs Intersecting Erdős-Rényi Graphs. IEEE Trans. Inf. Theory 63(3): 1677-1692 (2017) - [c123]Taeho Lee, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu:
The Case for In-Network Replay Suppression. AsiaCCS 2017: 862-873 - [c122]Virgil D. Gligor, Frank Stajano:
Assuring the Safety of Asymmetric Social Protocols. Security Protocols Workshop 2017: 38-48 - 2016
- [c121]Min Suk Kang, Virgil D. Gligor, Vyas Sekar:
SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks. NDSS 2016 - [c120]Min Suk Kang, Virgil D. Gligor, Vyas Sekar:
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. Security Protocols Workshop 2016: 47-57 - [c119]Virgil D. Gligor:
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion). Security Protocols Workshop 2016: 58-66 - 2015
- [j29]Zongwei Zhou, Miao Yu, Virgil D. Gligor:
Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation. IEEE Secur. Priv. 13(2): 38-46 (2015) - [j28]Virgil D. Gligor, Bryan Parno, Ji Sun Shin:
Network Adversary Attacks against Secure Encryption Schemes. IEICE Trans. Commun. 98-B(2): 267-279 (2015) - [j27]Jun Zhao, Osman Yagan, Virgil D. Gligor:
k-Connectivity in Random Key Graphs With Unreliable Links. IEEE Trans. Inf. Theory 61(7): 3810-3836 (2015) - [j26]Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
Toward k-Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links. IEEE Trans. Inf. Theory 61(11): 6251-6271 (2015) - [c118]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On k-Connectivity and Minimum Vertex Degree in Random s-Intersection Graphs. ANALCO 2015: 1-15 - [c117]Miao Yu, Virgil D. Gligor, Zongwei Zhou:
Trusted Display on Untrusted Commodity Platforms. CCS 2015: 989-1003 - [c116]Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme. ICC 2015: 6277-6283 - [c115]Saurabh Shintre, Virgil D. Gligor, João Barros:
Optimal strategies for side-channel leakage in FCFS packet schedulers. ISIT 2015: 2515-2519 - [c114]Yanlin Li, Yueqiang Cheng, Virgil D. Gligor, Adrian Perrig:
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction. Security Protocols Workshop 2015: 50-68 - [c113]Virgil D. Gligor:
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion). Security Protocols Workshop 2015: 69-79 - [c112]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Exact analysis of k-connectivity in secure sensor networks with unreliable links. WiOpt 2015: 191-198 - [i12]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Threshold Functions in Random s-Intersection Graphs. CoRR abs/1502.00395 (2015) - [i11]Jun Zhao, Osman Yagan, Virgil D. Gligor:
k-Connectivity of Random Key Graphs. CoRR abs/1502.00400 (2015) - [i10]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs. CoRR abs/1502.00405 (2015) - [i9]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Random intersection graphs and their applications in security, wireless communication, and social networks. CoRR abs/1504.03161 (2015) - [i8]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Connectivity in Secure Wireless Sensor Networks under Transmission Constraints. CoRR abs/1508.00545 (2015) - 2014
- [c111]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Connectivity in secure wireless sensor networks under transmission constraints. Allerton 2014: 1294-1301 - [c110]Min Suk Kang, Virgil D. Gligor:
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures. CCS 2014: 321-333 - [c109]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On the strengths of connectivity and robustness in general random intersection graphs. CDC 2014: 3661-3668 - [c108]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on/off channels. ISIT 2014: 1131-1135 - [c107]Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme. ISIT 2014: 2381-2385 - [c106]Zongwei Zhou, Miao Yu, Virgil D. Gligor:
Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O. IEEE Symposium on Security and Privacy 2014: 308-323 - [c105]Virgil D. Gligor:
Dancing with the Adversary: A Tale of Wimps and Giants. Security Protocols Workshop 2014: 100-115 - [c104]Virgil D. Gligor:
Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion). Security Protocols Workshop 2014: 116-129 - [i7]Faruk Yavuz, Jun Zhao, Osman Yagan, Virgil D. Gligor:
Towards $k$-connectivity of the random graph induced by a pairwise key predistribution scheme with unreliable links. CoRR abs/1405.5193 (2014) - [i6]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On Topological Properties of Wireless Sensor Networks under the q-Composite Key Predistribution Scheme with On/Off Channels. CoRR abs/1408.5082 (2014) - [i5]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On the strengths of connectivity and robustness in general random intersection graphs. CoRR abs/1409.5995 (2014) - [i4]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On $k$-connectivity and minimum vertex degree in random $s$-intersection graphs. CoRR abs/1409.6021 (2014) - [i3]Jun Zhao, Osman Yagan, Virgil D. Gligor:
On asymptotically exact probability of $k$-connectivity in random key graphs intersecting Erdős-Rényi graphs. CoRR abs/1409.6022 (2014) - 2013
- [j25]Ji Sun Shin, Virgil D. Gligor:
A New Privacy-Enhanced Matchmaking Protocol. IEICE Trans. Commun. 96-B(8): 2049-2059 (2013) - [c103]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
STRIDE: sanctuary trail - refuge from internet DDoS entrapment. AsiaCCS 2013: 415-426 - [c102]Soo Bum Lee, Min Suk Kang, Virgil D. Gligor:
CoDef: collaborative defense against large-scale link-flooding attacks. CoNEXT 2013: 417-428 - [c101]Tiffany Hyun-Jin Kim, Akira Yamada, Virgil D. Gligor, Jason I. Hong, Adrian Perrig:
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. Financial Cryptography 2013: 69-77 - [c100]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Jorge Guajardo, Jason I. Hong, Adrian Perrig:
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference. Financial Cryptography Workshops 2013: 112-130 - [c99]Jun Zhao, Osman Yagan, Virgil D. Gligor:
Secure k-connectivity in wireless sensor networks under an on/off channel model. ISIT 2013: 2790-2794 - [c98]Min Suk Kang, Soo Bum Lee, Virgil D. Gligor:
The Crossfire Attack. IEEE Symposium on Security and Privacy 2013: 127-141 - [c97]Jun Zhao, Virgil D. Gligor, Adrian Perrig, James Newsome:
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets. Security Protocols Workshop 2013: 94-114 - [c96]Virgil D. Gligor:
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion). Security Protocols Workshop 2013: 115-122 - [c95]Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil D. Gligor:
KISS: "Key It Simple and Secure" Corporate Key Management. TRUST 2013: 1-18 - [c94]Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, Virgil D. Gligor:
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. WWW 2013: 679-690 - [e7]Ahmad-Reza Sadeghi, Virgil D. Gligor, Moti Yung:
2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013. ACM 2013, ISBN 978-1-4503-2477-9 [contents] - 2012
- [j24]Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor:
Two-server password-only authenticated key exchange. J. Comput. Syst. Sci. 78(2): 651-669 (2012) - [c93]Virgil D. Gligor:
On the foundations of trust in networks of humans and computers. CCS 2012: 1 - [c92]Chang-Han Jong, Virgil D. Gligor:
Discovering records of private VoIP calls without wiretapping. AsiaCCS 2012: 67-68 - [c91]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
GeoPKI: Converting Spatial Trust into Certificate Trust. EuroPKI 2012: 128-144 - [c90]Zongwei Zhou, Virgil D. Gligor, James Newsome, Jonathan M. McCune:
Building Verifiable Trusted Path on Commodity x86 Computers. IEEE Symposium on Security and Privacy 2012: 616-630 - [c89]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
Street-Level Trust Semantics for Attribute Authentication. Security Protocols Workshop 2012: 96-115 - [c88]Virgil D. Gligor:
Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion). Security Protocols Workshop 2012: 116-125 - [c87]Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig:
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms. TRUST 2012: 34-54 - [c86]Chang-Han Jong, Virgil D. Gligor:
Private communication detection: a stochastic approach. WISEC 2012: 75-86 - [e6]Ting Yu, George Danezis, Virgil D. Gligor:
the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. ACM 2012, ISBN 978-1-4503-1651-4 [contents] - [i2]Osman Yagan, Virgil D. Gligor:
Analysis of complex contagions in random multiplex networks. CoRR abs/1204.0491 (2012) - [i1]Jun Zhao, Osman Yagan, Virgil D. Gligor:
k-Connectivity in Secure Wireless Sensor Networks with Physical Link Constraints - The On/Off Channel Model. CoRR abs/1206.1531 (2012) - 2011
- [c85]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems. ICCCN 2011: 1-6 - [c84]Xin Zhang, Zongwei Zhou, Geoffrey Hasker, Adrian Perrig, Virgil D. Gligor:
Network fault localization with small TCB. ICNP 2011: 143-154 - [c83]Virgil D. Gligor, Jeannette M. Wing:
Towards a Theory of Trust in Networks of Humans and Computers. Security Protocols Workshop 2011: 223-242 - [c82]Virgil D. Gligor:
Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion). Security Protocols Workshop 2011: 243-257 - 2010
- [j23]Virgil D. Gligor:
Editorial. IEEE Trans. Dependable Secur. Comput. 7(1): 1-3 (2010) - [c81]Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
Dependable connection setup for network capabilities. DSN 2010: 301-310 - [c80]Soo Bum Lee, Virgil D. Gligor:
FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks. ICDCS 2010: 327-338 - [c79]Virgil D. Gligor:
Architectures for practical security. SACMAT 2010: 161-162 - [c78]Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig:
TrustVisor: Efficient TCB Reduction and Attestation. IEEE Symposium on Security and Privacy 2010: 143-158 - [c77]Virgil D. Gligor:
Security Limitations of Virtualization and How to Overcome Them. Security Protocols Workshop 2010: 233-251 - [c76]Virgil D. Gligor:
Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion). Security Protocols Workshop 2010: 252-265
2000 – 2009
- 2009
- [j22]Adrian Perrig, Wade Trappe, Virgil D. Gligor, Radha Poovendran, Heejo Lee:
Secure wireless networking. J. Commun. Networks 11(6): 323-327 (2009) - [c75]Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos:
Privacy-Preserving Relationship Path Discovery in Social Networks. CANS 2009: 189-208 - [c74]Gelareh Taban, Virgil D. Gligor:
Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. CSE (3) 2009: 168-175 - [c73]Virgil D. Gligor, Adrian Perrig, Jun Zhao:
Brief Encounters with a Random Key Graph. Security Protocols Workshop 2009: 157-161 - [c72]Virgil D. Gligor:
Brief Encounters with a Random Key Graph. Security Protocols Workshop 2009: 162-170 - 2008
- [c71]Virgil D. Gligor:
Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks. COMPSAC 2008: 10 - [c70]Gelareh Taban, Virgil D. Gligor:
Efficient Handling of Adversary Attacks in Aggregation Applications. ESORICS 2008: 66-81 - [c69]Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux:
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. INFOCOM 2008: 1238-1246 - [c68]Ji Sun Shin, Virgil D. Gligor:
A New Privacy-Enhanced Matchmaking Protocol. NDSS 2008 - [c67]S. Farshad Bahari, Virgil D. Gligor:
Handling New Adversaries in Wireless Ad-Hoc Networks. Security Protocols Workshop 2008: 118-119 - [c66]Virgil D. Gligor:
Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion). Security Protocols Workshop 2008: 120-125 - [p1]Virgil D. Gligor, C. Sekar Chandersekaran:
Surviving Insider Attacks: A Call for System Experiments. Insider Attack and Cyber Security 2008: 153-164 - [e5]Masayuki Abe, Virgil D. Gligor:
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008. ACM 2008, ISBN 978-1-59593-979-1 [contents] - [e4]Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran:
Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM 2008, ISBN 978-1-59593-814-5 [contents] - 2007
- [j21]Farooq Anjum, Sunghyun Choi, Virgil D. Gligor, Ralf Guido Herrtwich, Jean-Pierre Hubaux, P. R. Kumar, Rajeev Shorey, Chin-Tau Lea:
Guest Editorial Vehicular Networks. IEEE J. Sel. Areas Commun. 25(8): 1497-1500 (2007) - [c65]Virgil D. Gligor:
On the evolution of adversary models in security protocols: from the beginning to sensor networks. AsiaCCS 2007: 3 - [c64]Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor:
MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488 - [e3]Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel:
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-887-9 [contents] - 2006
- [j20]Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean:
Information Assurance Technology Forecast 2005. IEEE Secur. Priv. 4(1): 62-69 (2006) - [c63]Virgil D. Gligor:
Emergent properties in ad-hoc networks: a security perspective. AsiaCCS 2006: 1 - [c62]Gelareh Taban, Alvaro A. Cárdenas, Virgil D. Gligor:
Towards a secure and interoperable DRM architecture. Digital Rights Management Workshop 2006: 69-78 - [e2]Levente Buttyán, Virgil D. Gligor, Dirk Westhoff:
Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4357, Springer 2006, ISBN 978-3-540-69172-3 [contents] - 2005
- [j19]Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan:
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Trans. Dependable Secur. Comput. 2(3): 233-247 (2005) - [c61]Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor:
Two-Server Password-Only Authenticated Key Exchange. ACNS 2005: 1-16 - [c60]Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva:
Administering Access Control in Dynamic Coalitions. LISA 2005: 249-261 - [c59]Virgil D. Gligor:
Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks. MADNES 2005: 1 - [c58]Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng:
Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 - [c57]Virgil D. Gligor:
Advances in sensor and ad-hoc network security: perspective and status. SASN 2005: 68 - [c56]Bryan Parno, Adrian Perrig, Virgil D. Gligor:
Distributed Detection of Node Replication Attacks in Sensor Networks. S&P 2005: 49-63 - [c55]Virgil D. Gligor:
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). Security Protocols Workshop 2005: 276-283 - [c54]Virgil D. Gligor:
Emergent properties in ad-hoc networks: a security perspective. Workshop on Wireless Security 2005: 55 - 2004
- [c53]Virgil D. Gligor:
Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). Security Protocols Workshop 2004: 256-266 - [c52]Himanshu Khurana, Virgil D. Gligor:
A Model for Access Negotiations in Dynamic Coalitions. WETICE 2004: 205-210 - 2003
- [c51]Omer Horvitz, Virgil D. Gligor:
Weak Key Authenticity and the Computational Completeness of Formal Encryption. CRYPTO 2003: 530-547 - [c50]Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras:
Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40 - [c49]Rakeshbabu Bobba, Laurent Eschenauer, Virgil D. Gligor, William A. Arbaugh:
Bootstrapping security associations for routing in mobile ad-hoc networks. GLOBECOM 2003: 1511-1515 - [c48]Virgil D. Gligor:
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. Security Protocols Workshop 2003: 80-96 - [c47]