Publications
- [J7]A. Bates, D. (J. Tian, G. Hernandez, T. Moyer, K. R. B. Butler, and T. Jaeger, “Taming the Costs of Trustworthy Provenance Through Policy Reduction,” ACM Transactions on Internet Technology, vol. 17, no. 4, pp. 34:1–34:21, Sep. 2017. | BibTeX
@article{bth+2017, acmid = {3062180}, address = {New York, NY, USA}, articleno = {34}, author = {Bates, Adam and Tian, Dave (Jing) and Hernandez, Grant and Moyer, Thomas and Butler, Kevin R. B. and Jaeger, Trent}, date-added = {2019-07-04 15:36:56 -0400}, date-modified = {2019-07-04 16:07:21 -0400}, doi = {10.1145/3062180}, issn = {1533-5399}, issue_date = {September 2017}, journal = {ACM Transactions on Internet Technology}, keywords = {Provenance, TCB, integrity, mandatory policy}, month = sep, number = {4}, numpages = {21}, pages = {34:1--34:21}, public = {yes}, publisher = {ACM}, title = {{Taming the Costs of Trustworthy Provenance Through Policy Reduction}}, url = {https://thomasmoyer.org/pubs/bth+2017.pdfw}, volume = {17}, year = {2017}, bdsk-url-1 = {http://doi.acm.org/10.1145/3062180}, bdsk-url-2 = {https://doi.org/10.1145/3062180} }
- [J6]U. Blumenthal, N. Crabtree, T. Moyer, and W. Streilein, “Mission-oriented Cyber Assessment and Recommendations Technique,” Journal of Sensitive Cyber Research and Engineering (JSCoRE), Dec. 2014. BibTeX
@article{bcm+2014, author = {Blumenthal, Uri and Crabtree, Nancy and Moyer, Thomas and Streilein, William}, date-added = {2015-07-16 12:56:25 +0000}, date-modified = {2015-07-16 13:02:38 +0000}, journal = {Journal of Sensitive Cyber Research and Engineering (JSCoRE)}, month = dec, public = {yes}, title = {{Mission-oriented Cyber Assessment and Recommendations Technique}}, year = {2014} }
- [J5]T. Moyer, A. Davis, J. Mitchell, and J. Wysocarski, “Security Architecture for Net-centric Radios,” Journal of Sensitive Cyber Research and Engineering (JSCoRE), Dec. 2014. BibTeX
@article{mdm+2014, author = {Moyer, Thomas and Davis, Ann and Mitchell, John and Wysocarski, Jeffrey}, date-added = {2015-07-16 13:02:05 +0000}, date-modified = {2015-07-16 13:02:12 +0000}, journal = {Journal of Sensitive Cyber Research and Engineering (JSCoRE)}, month = dec, public = {yes}, title = {{Security Architecture for Net-centric Radios}}, year = {2014} }
- [J4]T. Moyer, K. R. B. Butler, J. Schiffman, P. McDaniel, and T. Jaeger, “Scalable Web Content Attestation,” IEEE Transactions on Computers, vol. 61, no. 5, pp. 686–699, May 2012. | BibTeX
@article{mbs+2012, author = {Moyer, Thomas and Butler, Kevin R.B. and Schiffman, Joshua and McDaniel, Patrick and Jaeger, Trent}, date-added = {2019-07-04 15:53:17 -0400}, date-modified = {2019-07-04 16:07:35 -0400}, doi = {10.1109/TC.2011.60}, issn = {0018-9340}, journal = {IEEE Transactions on Computers}, keywords = {content management;data integrity;file servers;Internet;online front-ends;program verification;trusted computing;Web services;scalable Web content attestation;information sharing;Spork system;trusted platform module;Web server integrity state;Web browsers;browser-side Firefox validation extension;mixed static dynamic content;TPM hardware;Apache Web servers;dynamic integrity-measured Web objects per second;TPM-based content Web services;client loads;integrity-measured content;Web server;Browsers;Cryptography;Hardware;Web pages;Trusted computing;integrity measurement;web system;scalable attestation.}, month = may, number = {5}, pages = {686-699}, public = {yes}, title = {{Scalable Web Content Attestation}}, url = {https://thomasmoyer.org/pubs/mbs+2012.pdf}, volume = {61}, year = {2012}, bdsk-url-1 = {https://doi.org/10.1109/TC.2011.60} }
- [J3]J. Schiffman, T. Moyer, T. Jaeger, and P. McDaniel, “Network-Based Root of Trust for Installation,” IEEE Security Privacy, vol. 9, no. 1, pp. 40–48, Jan. 2011. | BibTeX
@article{smj+2011, author = {Schiffman, Joshua and Moyer, Thomas and Jaeger, Trent and McDaniel, Patrick}, date-added = {2019-07-04 16:03:39 -0400}, date-modified = {2019-07-04 16:07:50 -0400}, doi = {10.1109/MSP.2011.15}, issn = {1540-7993}, journal = {IEEE Security Privacy}, keywords = {computer network security;file organisation;network-based root of trust;network-based system installation method;file system;disk image thwarts;netROTI;File systems;Servers;Random access memory;Microprogramming;Phase measurement;Security;Current measurement;trusted computing;security;network-installation}, month = jan, number = {1}, pages = {40-48}, public = {yes}, title = {{Network-Based Root of Trust for Installation}}, url = {https://thomasmoyer.org/pubs/smj+2011.pdf}, volume = {9}, year = {2011}, bdsk-url-1 = {https://doi.org/10.1109/MSP.2011.15} }
- [J2]K. R. B. Butler, S. McLaughlin, T. Moyer, and P. McDaniel, “New Security Architectures Based on Emerging Disk Functionality,” IEEE Security Privacy, vol. 8, no. 5, pp. 34–41, Sep. 2010. | BibTeX
@article{bmm+2010, author = {Butler, Kevin R.B. and McLaughlin, Stephen and Moyer, Thomas and McDaniel, Patrick}, date-added = {2019-07-04 16:09:01 -0400}, date-modified = {2019-07-04 16:11:34 -0400}, doi = {10.1109/MSP.2010.90}, issn = {1540-7993}, journal = {IEEE Security Privacy}, keywords = {computational complexity;hard discs;operating systems (computers);security of data;security architectures;disk functionality;hard disk technologies;operating system security complexity;SwitchBlade architecture;multiple OS isolation;physical token;Nonvolatile memory;Data security;Operating systems;Secure storage;Cryptography;Access control;Computer architecture;Information security;Privacy;Random access memory;operating system;security;storage;disks;isolation;SwitchBlade}, month = sep, number = {5}, pages = {34-41}, public = {yes}, title = {{New Security Architectures Based on Emerging Disk Functionality}}, url = {https://thomasmoyer.org/pubs/bmm+2010.pdf}, volume = {8}, year = {2010}, bdsk-url-1 = {https://doi.org/10.1109/MSP.2010.90} }
- [J1]W. Enck, T. Moyer, P. McDaniel, S. Sen, P. Sebos, S. Spoerel, A. Greenberg, Y.-W. E. Sung, S. Rao, and W. Aiello, “Configuration Management at Massive Scale: System Design and Experience,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 3, pp. 323–335, Apr. 2009. | BibTeX
@article{emm+2009, author = {Enck, William and Moyer, Thomas and McDaniel, Patrick and Sen, Subhabrata and Sebos, Panagiotis and Spoerel, Sylke and Greenberg, Albert and Sung, Yu-Wei Eric and Rao, Sanjay and Aiello, William}, date-added = {2019-07-04 16:13:13 -0400}, date-modified = {2019-07-04 16:15:44 -0400}, doi = {10.1109/JSAC.2009.090408}, issn = {0733-8716}, journal = {IEEE Journal on Selected Areas in Communications}, keywords = {computer network management;computer network management;network provider;Presto configuration management system;ISP network;configlets;data manipulation;data extraction;template language;Data mining;Delay;Large-scale systems;Virtual private networks;Costs;Maintenance;Microprogramming;Time to market;Profitability;Databases;Computer network management}, month = apr, number = {3}, pages = {323-335}, public = {yes}, title = {{Configuration Management at Massive Scale: System Design and Experience}}, url = {https://thomasmoyer.org/pubs/emm+2009.pdf}, volume = {27}, year = {2009}, bdsk-url-1 = {https://doi.org/10.1109/JSAC.2009.090408} }
Journal Articles
- [C22]M. Kapoor, M. Napolitano, J. Quance, T. Moyer, and S. Krishnan, “Detecting VoIP Data Streams: Approaches Using Hidden Representation Learning,” in 35th Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-23), 2023. | BibTeX
@inproceedings{kmq+2023, author = {Kapoor, Maya and Napolitano, Michael and Quance, Jonathan and Moyer, Thomas and Krishnan, Siddharth}, booktitle = {35th Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-23)}, title = {Detecting VoIP Data Streams: Approaches Using Hidden Representation Learning}, year = {2023}, public = {yes} }
- [C21]M. Kapoor, T. Moyer, and S. Krishnan, “Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive Hashing,” in 21st IEEE International Symposium on Network Computing and Applications (NCA 2022), 2022. | BibTeX
@inproceedings{kkm2022, author = {Kapoor, Maya and Moyer, Thomas and Krishnan, Siddharth}, booktitle = {21st IEEE International Symposium on Network Computing and Applications (NCA 2022)}, title = {Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive Hashing}, year = {2022}, public = {yes} }
- [C20]M. Kapoor, J. Melton, M. Ridenhour, T. Moyer, and S. Krishnan, “Flurry: A Fast Framework for Provenance Graph Generation for Representation Learning,” in Proceedings of the 31st ACM International Conference on Information and Knowledge Management, New York, NY, USA, 2022, pp. 4887–4891. | BibTeX
@inproceedings{kmr+2022, author = {Kapoor, Maya and Melton, Joshua and Ridenhour, Michael and Moyer, Thomas and Krishnan, Siddharth}, booktitle = {Proceedings of the 31st ACM International Conference on Information and Knowledge Management}, title = {Flurry: A Fast Framework for Provenance Graph Generation for Representation Learning}, year = {2022}, address = {New York, NY, USA}, pages = {4887–4891}, publisher = {Association for Computing Machinery}, series = {CIKM '22}, doi = {10.1145/3511808.3557200}, isbn = {9781450392365}, keywords = {data provenance, datasets, cybersecurity, graph representation learning}, location = {Atlanta, GA, USA}, numpages = {5}, public = {yes}, url = {https://doi.org/10.1145/3511808.3557200} }
- [C19]M. Kapoor, J. Melton, M. Ridenhour, S. Krishnan, and T. Moyer, “Prov-GEm: Automated Provenance Analysis Framework using Graph Embeddings,” in Proceedings of the IEEE 2021 International Conference on Machine Learning and Applications, ICMLA 2021, Dec. 2021. | BibTeX
@inproceedings{kmr+2021, author = {Kapoor, Maya and Melton, Joshua and Ridenhour, Michael and Krishnan, Siddharth and Moyer, Thomas}, title = {{Prov-GEm: Automated Provenance Analysis Framework using Graph Embeddings}}, booktitle = {Proceedings of the IEEE 2021 International Conference on Machine Learning and Applications, ICMLA 2021}, year = {2021}, month = dec, public = {yes} }
- [C18]A. A. Farooq, J. Marquard, K. George, and T. Moyer, “Detecting Safety and Security Faults in PLC Systems with Data Provenance,” in IEEE International Symposium on Technologies for Homeland Security, Nov. 2019. | BibTeX
@inproceedings{fmgm2019, archiveprefix = {arXiv}, author = {Farooq, Abdullah Al and Marquard, Jessica and George, Kripa and Moyer, Thomas}, booktitle = {{IEEE International Symposium on Technologies for Homeland Security}}, date-added = {2020-02-05 14:43:50 -0500}, date-modified = {2020-03-13 15:20:22 -0400}, eprint = {1911.06304}, month = nov, primaryclass = {cs.CR}, public = {yes}, title = {Detecting Safety and Security Faults in PLC Systems with Data Provenance}, year = {2019} }
- [C17]A. A. Farooq, E. Al-Shaer, T. Moyer, and K. Kant, “IoTC^2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems,” in 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Apr. 2019, pp. 442–447. | BibTeX
@inproceedings{aamk2019, author = {Farooq, Abdullah Al and Al-Shaer, Ehab and Moyer, Thomas and Kant, Krishna}, booktitle = {2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)}, date-added = {2019-07-04 18:55:17 -0400}, date-modified = {2019-07-04 22:42:18 -0400}, issn = {1573-0077}, keywords = {formal specification;Internet of Things;open systems;formal method approach;common paradigm;health care;transportation infrastructure;smart homes;smart shopping;interoperable functionality;comprehensive services;trigger conflicting actions;actuator;environmental feature;actuators;policy violation results;safety policies;triggering events;detection policies;smart home environment;IoT devices;IoT confict checker;IoTC2;Actuators;Safety;Internet of Things;Thermostats;Temperature sensors;Smart homes;Internet of Things(IoT);Formal Method;Conflicts;Policies;Simulation;Safety;Security}, month = apr, pages = {442-447}, public = {yes}, title = {{IoTC$^2$: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems}}, url = {https://thomasmoyer.org/pubs/aamk2019.pdf}, year = {2019}, bdsk-url-1 = {https://thomasmoyer.org/pubs/aamk2019.pdf} }
- [C16]W. Smith, T. Moyer, and C. Munson, “Curator: Provenance Management for Modern Distributed Systems,” in 10th USENIX Workshop on the Theory and Practice of Provenance, TaPP 2018, London, UK, July 11-12, 2018., Jul. 2018. | BibTeX
@inproceedings{smm2018, author = {Smith, Warren and Moyer, Thomas and Munson, Charles}, bibsource = {dblp computer science bibliography, https://dblp.org}, biburl = {https://dblp.org/rec/bib/conf/tapp/SmithMM18}, booktitle = {10th {USENIX} Workshop on the Theory and Practice of Provenance, TaPP 2018, London, UK, July 11-12, 2018.}, crossref = {DBLP:conf/tapp/2018}, date-added = {2019-07-04 19:35:35 -0400}, date-modified = {2019-07-04 19:37:26 -0400}, month = jul, public = {yes}, timestamp = {Mon, 16 Jul 2018 15:45:41 +0200}, title = {{Curator: Provenance Management for Modern Distributed Systems}}, url = {https://thomasmoyer.org/pubs/smm2018.pdf}, year = {2018}, bdsk-url-1 = {https://www.usenix.org/conference/tapp2018/presentation/smith} }
- [C15]W. U. Hassan, M. Lemay, N. Aguse, A. Bates, and T. Moyer, “Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs,” in 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018, 2018. acceptance rate=21.0%. | BibTeX
@inproceedings{hbm2018, author = {Hassan, Wajih Ul and Lemay, Mark and Aguse, Nuraini and Bates, Adam and Moyer, Thomas}, bibsource = {dblp computer science bibliography, https://dblp.org}, biburl = {https://dblp.org/rec/bib/conf/ndss/HassanLABM18}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, crossref = {DBLP:conf/ndss/2018}, date-added = {2019-07-04 19:04:10 -0400}, date-modified = {2019-07-04 19:06:12 -0400}, note = {acceptance rate=21.0\%.}, public = {yes}, timestamp = {Tue, 19 Mar 2019 13:03:53 +0100}, title = {{Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs}}, url = {https://thomasmoyer.org/pubs/hbm2018.pdf}, year = {2018}, bdsk-url-1 = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018%5C_07B-1%5C_Hassan%5C_paper.pdf} }
- [C14]T. Pasquier, X. Han, T. Moyer, A. Bates, O. Hermant, D. Eyers, J. Bacon, and M. Seltzer, “Runtime Analysis of Whole-System Provenance,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2018, pp. 1601–1616. acceptance rate=16.6%. | BibTeX
@inproceedings{phm+2018, acmid = {3243776}, address = {New York, NY, USA}, author = {Pasquier, Thomas and Han, Xueyuan and Moyer, Thomas and Bates, Adam and Hermant, Olivier and Eyers, David and Bacon, Jean and Seltzer, Margo}, booktitle = {Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security}, date-added = {2019-07-04 18:58:27 -0400}, date-modified = {2019-07-04 18:59:17 -0400}, doi = {10.1145/3243734.3243776}, isbn = {978-1-4503-5693-0}, keywords = {Linux kernel, graph processing, information flow tracking, whole-system provenance}, location = {Toronto, Canada}, note = {acceptance rate=16.6\%.}, numpages = {16}, pages = {1601--1616}, public = {yes}, publisher = {ACM}, series = {CCS '18}, title = {Runtime Analysis of Whole-System Provenance}, url = {https://thomasmoyer.org/pubs/phm+2018.pdf}, year = {2018}, bdsk-url-1 = {http://doi.acm.org/10.1145/3243734.3243776}, bdsk-url-2 = {https://doi.org/10.1145/3243734.3243776} }
- [C13]A. Bates, K. Butler, A. Dobra, B. Reaves, P. Cable, T. Moyer, and N. Schear, “Transparent Web Service Auditing via Network Provenance Functions,” in Proceedings of the 26th International Conference on World Wide Web, Republic and Canton of Geneva, Switzerland, Apr. 2017, pp. 887–895. acceptance rate=17.0%. | BibTeX
@inproceedings{bbd+2017, acmid = {3052640}, address = {Republic and Canton of Geneva, Switzerland}, author = {Bates, Adam and Butler, Kevin and Dobra, Alin and Reaves, Brad and Cable, Patrick and Moyer, Thomas and Schear, Nabil}, booktitle = {Proceedings of the 26th International Conference on World Wide Web}, date-added = {2019-07-04 19:17:08 -0400}, date-modified = {2019-07-04 19:18:24 -0400}, doi = {10.1145/3038912.3052640}, isbn = {978-1-4503-4913-0}, keywords = {audit, data provenance, security}, location = {Perth, Australia}, month = apr, note = {acceptance rate=17.0\%.}, numpages = {9}, pages = {887--895}, public = {yes}, publisher = {International World Wide Web Conferences Steering Committee}, series = {WWW '17}, title = {{Transparent Web Service Auditing via Network Provenance Functions}}, url = {https://thomasmoyer.org/pubs/bbd+2017.pdf}, year = {2017}, bdsk-url-1 = {https://doi.org/10.1145/3038912.3052640} }
- [C12]T. Pasquier, X. Han, M. Goldstein, T. Moyer, D. Eyers, M. Seltzer, and J. Bacon, “Practical Whole-system Provenance Capture,” in Proceedings of the 2017 Symposium on Cloud Computing, New York, NY, USA, 2017, pp. 405–418. | BibTeX
@inproceedings{phg+2017, acmid = {3129249}, address = {New York, NY, USA}, author = {Pasquier, Thomas and Han, Xueyuan and Goldstein, Mark and Moyer, Thomas and Eyers, David and Seltzer, Margo and Bacon, Jean}, booktitle = {Proceedings of the 2017 Symposium on Cloud Computing}, date-added = {2019-07-04 19:08:07 -0400}, date-modified = {2019-07-04 19:09:07 -0400}, doi = {10.1145/3127479.3129249}, isbn = {978-1-4503-5028-0}, keywords = {data provenance, linux kernel, whole-system provenance}, location = {Santa Clara, California}, numpages = {14}, pages = {405--418}, public = {yes}, publisher = {ACM}, series = {SoCC '17}, title = {{Practical Whole-system Provenance Capture}}, url = {https://thomasmoyer.org/pubs/phg+2017.pdf}, year = {2017}, bdsk-url-1 = {http://doi.acm.org/10.1145/3127479.3129249}, bdsk-url-2 = {https://doi.org/10.1145/3127479.3129249} }
- [C11]M. Lemay, W. U. Hassan, T. Moyer, N. Schear, and W. Smith, “Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security,” in 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), Seattle, WA, 2017. | BibTeX
@inproceedings{lhm+2017, address = {Seattle, WA}, author = {Lemay, Mark and Hassan, Wajih Ul and Moyer, Thomas and Schear, Nabil and Smith, Warren}, booktitle = {9th {USENIX} Workshop on the Theory and Practice of Provenance (TaPP 2017)}, date-added = {2018-01-23 14:43:34 +0000}, date-modified = {2019-07-04 19:38:37 -0400}, public = {yes}, publisher = {{USENIX} Association}, title = {Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security}, url = {https://thomasmoyer.org/pubs/lhm+2017.pdf}, year = {2017}, bdsk-url-1 = {https://www.usenix.org/conference/tapp17/workshop-program/presentation/lemay} }
- [C10]N. Schear, P. T. Cable II, T. Moyer, B. Richard, and R. Rudd, “Bootstrapping and Maintaining Trust in the Cloud,” in Proceedings of the 32Nd Annual Conference on Computer Security Applications, New York, NY, USA, Dec. 2016, pp. 65–77. acceptance rate=20.7% | BibTeX
@inproceedings{scm+2016, acmid = {2991104}, address = {New York, NY, USA}, author = {Schear, Nabil and Cable, II, Patrick T. and Moyer, Thomas and Richard, Bryan and Rudd, Robert}, booktitle = {Proceedings of the 32Nd Annual Conference on Computer Security Applications}, date-added = {2019-07-04 19:19:48 -0400}, date-modified = {2019-07-04 19:21:43 -0400}, doi = {10.1145/2991079.2991104}, isbn = {978-1-4503-4771-6}, location = {Los Angeles, California, USA}, month = dec, note = {acceptance rate=20.7\%}, numpages = {13}, pages = {65--77}, public = {yes}, publisher = {ACM}, series = {ACSAC '16}, title = {{Bootstrapping and Maintaining Trust in the Cloud}}, url = {https://thomasmoyer.org/pubs/scm+2016.pdf}, year = {2016}, bdsk-url-1 = {http://doi.acm.org/10.1145/2991079.2991104}, bdsk-url-2 = {https://doi.org/10.1145/2991079.2991104} }
- [C9]T. Moyer, P. T. Cable, K. Chadha, R. Cunningham, N. Schear, W. Smith, A. Bates, K. Butler, F. Capobianco, and T. Jaeger, “Leveraging Data Provenance to Enhance Cyber Resilience,” in 1st IEEE Cybersecurity Development (SecDev), Nov. 2016. | BibTeX
@inproceedings{mcc+2016, author = {Moyer, Thomas and Cable, Patrick T. and Chadha, Karishma and Cunningham, Robert and Schear, Nabil and Smith, Warren and Bates, Adam and Butler, Kevin and Capobianco, Frank and Jaeger, Trent}, booktitle = {1st IEEE Cybersecurity Development (SecDev)}, date-added = {2015-07-16 12:54:09 +0000}, date-modified = {2019-07-04 22:42:44 -0400}, month = nov, public = {yes}, title = {{Leveraging Data Provenance to Enhance Cyber Resilience}}, year = {2016}, bdsk-url-1 = {https://www.usenix.org/conference/tapp15/workshop-program/presentation/bates} }
- [C8]T. Moyer and V. Gadepally, “High-throughput Ingest of Data Provenance Records into Accumulo,” in 2016 IEEE High Performance Extreme Computing Conference, HPEC 2016, Waltham, MA, USA, September 13-15, 2016, Sep. 2016, pp. 1–6. | BibTeX
@inproceedings{mg2016, author = {Moyer, Thomas and Gadepally, Vijay}, bibsource = {dblp computer science bibliography, https://dblp.org}, biburl = {https://dblp.org/rec/bib/conf/hpec/MoyerG16}, booktitle = {2016 {IEEE} High Performance Extreme Computing Conference, {HPEC} 2016, Waltham, MA, USA, September 13-15, 2016}, crossref = {DBLP:conf/hpec/2016}, date-added = {2019-07-04 19:23:21 -0400}, date-modified = {2019-07-04 19:24:09 -0400}, doi = {10.1109/HPEC.2016.7761589}, month = sep, pages = {1--6}, public = {yes}, timestamp = {Wed, 24 May 2017 08:30:34 +0200}, title = {{High-throughput Ingest of Data Provenance Records into Accumulo}}, url = {https://thomasmoyer.org/pubs/mg2016.pdf}, year = {2016}, bdsk-url-1 = {https://doi.org/10.1109/HPEC.2016.7761589} }
- [C7]A. Bates, D. Tian, K. R. B. Butler, and T. Moyer, “Trustworthy Whole-System Provenance for the Linux Kernel,” in 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., Aug. 2015. acceptance rate=15.7% | BibTeX
@inproceedings{btb+2015, address = {Washington, D.C.}, author = {Bates, Adam and Tian, Dave and Butler, Kevin R.B. and Moyer, Thomas}, booktitle = {24th USENIX Security Symposium (USENIX Security 15)}, date-added = {2015-07-16 12:53:33 +0000}, date-modified = {2019-07-04 19:26:13 -0400}, month = aug, note = {acceptance rate=15.7\%}, public = {yes}, publisher = {USENIX Association}, title = {{Trustworthy Whole-System Provenance for the Linux Kernel}}, url = {https://thomasmoyer.org/pubs/btb+2015.pdf}, year = {2015}, bdsk-url-1 = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/bates} }
- [C6]A. Bates, K. R. B. Butler, and T. Moyer, “Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs,” in 7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15), Edinburgh, Scotland, Jul. 2015. | BibTeX
@inproceedings{bbm2015, address = {Edinburgh, Scotland}, author = {Bates, Adam and Butler, Kevin R.B. and Moyer, Thomas}, booktitle = {7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15)}, date-modified = {2019-07-04 19:39:39 -0400}, month = jul, public = {yes}, publisher = {USENIX Association}, title = {{Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs}}, url = {https://thomasmoyer.org/pubs/bbm2015.pdf}, year = {2015}, bdsk-url-1 = {https://www.usenix.org/conference/tapp15/workshop-program/presentation/bates} }
- [C5]T. Moyer, T. Jaeger, and P. McDaniel, “Scalable Integrity-Guaranteed AJAX,” in Web Technologies and Applications, Berlin, Heidelberg, Apr. 2012, pp. 1–19. | BibTeX
@inproceedings{mjm2012, address = {Berlin, Heidelberg}, author = {Moyer, Thomas and Jaeger, Trent and McDaniel, Patrick}, booktitle = {Web Technologies and Applications}, date-added = {2019-07-04 19:27:46 -0400}, date-modified = {2019-07-04 19:28:40 -0400}, editor = {Sheng, Quan Z. and Wang, Guoren and Jensen, Christian S. and Xu, Guandong}, isbn = {978-3-642-29253-8}, month = apr, pages = {1--19}, public = {yes}, publisher = {Springer Berlin Heidelberg}, title = {{Scalable Integrity-Guaranteed AJAX}}, url = {https://thomasmoyer.org/pubs/mjm2012.pdf}, year = {2012}, bdsk-url-1 = {https://thomasmoyer.org/pubs/mjm2012.pdf} }
- [C4]J. Schiffman, T. Moyer, H. Vijayakumar, T. Jaeger, and P. McDaniel, “Seeding Clouds with Trust Anchors,” in CCSW ’10: Proceedings of the 2010 ACM workshop on Cloud computing security, Oct. 2010. | BibTeX
@inproceedings{smv+2010, author = {Schiffman, Joshua and Moyer, Thomas and Vijayakumar, Hayawardh and Jaeger, Trent and McDaniel, Patrick}, booktitle = {CCSW '10: Proceedings of the 2010 ACM workshop on Cloud computing security}, date-added = {2010-09-20 14:42:47 -0400}, date-modified = {2019-07-04 19:40:48 -0400}, month = oct, public = {yes}, publisher = {ACM}, title = {{Seeding Clouds with Trust Anchors}}, url = {https://thomasmoyer.org/pubs/smv+2010.pdf}, year = {2010}, bdsk-url-1 = {http://doi.acm.org/10.1145/1655008.1655010} }
- [C3]B. Hicks, S. Rueda, D. King, T. Moyer, J. Schiffman, Y. Sreenivasan, P. McDaniel, and T. Jaeger, “An Architecture for Enforcing End-to-End Access Control Over Web Applications,” in Proceedings of the 2010 Symposium on Access Control Models and Technologies, SACMAT ’10, Jun. 2010. | BibTeX
@inproceedings{hrk+2010, author = {Hicks, Boniface and Rueda, Sandra and King, Dave and Moyer, Thomas and Schiffman, Joshua and Sreenivasan, Yogesh and McDaniel, Patrick and Jaeger, Trent}, booktitle = {Proceedings of the 2010 Symposium on Access Control Models and Technologies, SACMAT '10}, date-added = {2010-04-06 12:12:12 -0400}, date-modified = {2019-07-04 19:30:30 -0400}, month = jun, public = {yes}, title = {{An Architecture for Enforcing End-to-End Access Control Over Web Applications}}, url = {https://thomasmoyer.org/pubs/hrk+2010.pdf}, year = {2010}, bdsk-url-1 = {https://thomasmoyer.org/pubs/hrk+2010.pdf} }
- [C2]T. Moyer, K. Butler, J. Schiffman, P. McDaniel, and T. Jaeger, “Scalable Web Content Attestation,” in 2009 Annual Computer Security Applications Conference, Dec. 2009, pp. 95–104. acceptance rate=19.0% | BibTeX
@inproceedings{mbs+2009, author = {Moyer, Thomas and Butler, Kevin and Schiffman, Joshua and McDaniel, Patrick and Jaeger, Trent}, booktitle = {2009 Annual Computer Security Applications Conference}, date-added = {2019-07-04 19:31:24 -0400}, date-modified = {2019-07-04 19:32:23 -0400}, doi = {10.1109/ACSAC.2009.19}, issn = {1063-9527}, keywords = {content management;Internet;online front-ends;security of data;scalable Web content attestation;Spork system;trusted platform module;Web server integrity;Web browser;Spork service;Firefox validation extension;TPM hardware;Apache Web server;Web service;integrity-measured content;Web server;Computer security;Application software;Content management;Network servers;Internet;Information security;Laboratories;Computer science;Hardware;attestation;integrity measurement;scalability;web content}, month = dec, note = {acceptance rate=19.0\%}, pages = {95-104}, public = {yes}, title = {{Scalable Web Content Attestation}}, url = {https://thomasmoyer.org/pubs/mbs+2009.pdf}, year = {2009}, bdsk-url-1 = {https://doi.org/10.1109/ACSAC.2009.19} }
- [C1]J. Schiffman, T. Moyer, C. Shal, T. Jaeger, and P. McDaniel, “Justifying Integrity Using a Virtual Machine Verifier,” in 2009 Annual Computer Security Applications Conference, Dec. 2009, pp. 83–92. acceptance rate=19.0% | BibTeX
@inproceedings{sms+2009, author = {Schiffman, Joshua and Moyer, Thomas and Shal, Christopher and Jaeger, Trent and McDaniel, Patrick}, booktitle = {2009 Annual Computer Security Applications Conference}, date-added = {2010-01-08 12:55:18 -0500}, date-modified = {2019-07-04 19:34:06 -0400}, doi = {10.1109/ACSAC.2009.18}, issn = {1063-9527}, keywords = {distributed programming;Linux;virtual machines;virtual machine verifier;integrity measurement;distributed computing architectures;false integrity;Clark-Wilson integrity model;VM verifier;Xen virtual machine system;SELinux;grid computing;cloud computing;Virtual machining;Computer architecture;Distributed computing;Cloud computing;Current measurement;Buildings;Voice mail;Grid computing;Runtime environment;Virtual manufacturing;cloud computing;integrity measurement;virtual machines}, month = dec, note = {acceptance rate=19.0\%}, pages = {83-92}, public = {yes}, title = {{Justifying Integrity Using a Virtual Machine Verifier}}, url = {https://thomasmoyer.org/pubs/sms+2009.pdf}, year = {2009}, bdsk-url-1 = {https://thomasmoyer.org/pubs/sms+2009.pdf}, bdsk-url-2 = {https://doi.org/10.1109/ACSAC.2009.18} }
Conference and Workshop Papers
- [TR6]T. Moyer and P. McDaniel, “Scalable Integrity-Guaranteed AJAX,” Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, NAS-TR-0149-2011, Mar. 2011. BibTeX
@techreport{NAS-149, address = {Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA}, author = {Moyer, Thomas and McDaniel, Patrick}, date-added = {2011-04-01 07:31:41 -0400}, date-modified = {2011-04-01 07:31:41 -0400}, institution = {Network and Security Research Center}, month = mar, number = {NAS-TR-0149-2011}, public = {yes}, title = {{Scalable Integrity-Guaranteed AJAX}}, year = {2011} }
- [TR5]J. Schiffman, T. Moyer, H. Vijayakumar, T. Jaeger, and P. McDaniel, “Seeding Clouds with Trust Anchors,” Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, NAS-TR-0127-2010, Apr. 2010. BibTeX
@techreport{NAS-0127, address = {Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA}, author = {Schiffman, Joshua and Moyer, Thomas and Vijayakumar, Hayawardh and Jaeger, Trent and McDaniel, Patrick}, date-added = {2010-04-13 11:29:49 -0400}, date-modified = {2010-04-13 11:29:49 -0400}, institution = {Network and Security Research Center}, month = apr, number = {NAS-TR-0127-2010}, public = {yes}, title = {{Seeding Clouds with Trust Anchors}}, year = {2010} }
- [TR4]K. Butler, S. McLaughlin, T. Moyer, J. Schiffman, P. McDaniel, and T. Jaeger, “Firma: Disk-Based Foundations for Trusted Operating Systems,” Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, NAS-TR-0114-2009, Apr. 2009. BibTeX
@techreport{NAS-00114, address = {Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA}, author = {Butler, Kevin and McLaughlin, Stephen and Moyer, Thomas and Schiffman, Joshua and McDaniel, Patrick and Jaeger, Trent}, date-added = {2009-06-04 08:08:42 -0400}, date-modified = {2009-06-04 08:08:42 -0400}, institution = {Network and Security Research Center}, month = apr, number = {NAS-TR-0114-2009}, public = {yes}, title = {{Firma: Disk-Based Foundations for Trusted Operating Systems}}, year = {2009} }
- [TR3]J. Schiffman, T. Moyer, C. Shal, T. Jaeger, and P. McDaniel, “No Node Is an Island: Shamon Integrity Monitoring Approach,” Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, NAS-TR-0103-2009, Feb. 2009. BibTeX
@techreport{NAS-00103, address = {Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA}, author = {Schiffman, Joshua and Moyer, Thomas and Shal, Christopher and Jaeger, Trent and McDaniel, Patrick}, institution = {Network and Security Research Center}, month = feb, number = {NAS-TR-0103-2009}, public = {yes}, title = {{No Node Is an Island: Shamon Integrity Monitoring Approach}}, year = {2009} }
- [TR2]K. Butler, S. McLaughlin, T. Moyer, T. Jaeger, and P. McDaniel, “SwitchBlade: Policy-Driven Disk Segmentation,” Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, NAS-TR-0098-2008, Nov. 2008. BibTeX
@techreport{NAS-0098, address = {Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA}, author = {Butler, Kevin and McLaughlin, Stephen and Moyer, Thomas and Jaeger, Trent and McDaniel, Patrick}, date-added = {2008-11-17 08:49:54 -0500}, date-modified = {2008-11-17 08:49:54 -0500}, institution = {Network and Security Research Center}, month = nov, number = {NAS-TR-0098-2008}, public = {yes}, title = {{SwitchBlade: Policy-Driven Disk Segmentation}}, year = {2008} }
- [TR1]T. Moyer, K. Butler, J. Schiffman, P. McDaniel, and T. Jaeger, “Scalable Asynchronous Web Content Attestation,” Network and Security Research Center, Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA, NAS-TR-0095-2008, Sep. 2008. BibTeX
@techreport{NAS-0095, address = {Department of Computer Science and Engineering, Pennslyvania State University, University Park, PA, USA}, author = {Moyer, Thomas and Butler, Kevin and Schiffman, Joshua and McDaniel, Patrick and Jaeger, Trent}, date-added = {2008-11-17 08:49:08 -0500}, date-modified = {2008-11-17 08:49:08 -0500}, institution = {Network and Security Research Center}, month = sep, number = {NAS-TR-0095-2008}, public = {yes}, title = {{Scalable Asynchronous Web Content Attestation}}, year = {2008} }