The University of Arizona

Papers



  • Christian Collberg and Jasvir Nagra, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, Addison-Wesley Software Security Series.
  • Kevin Coogan, Saumya Debray, Tasneem Kaochar, and Gregg Townsend, Automatic Static Unpacking of Malware Binaries, Proc. 16th. IEEE Working Conference on Reverse Engineering, October 2009, pages 167—176.
  • Nithya Krishnamoorthy, Saumya Debray, and Keith Fligg, Static Detection of Disassembly Errors, Proc. 16th. IEEE Working Conference on Reverse Engineering, October 2009, pages 259—268.
  • Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, and Saumya Debray, A Semantics-Based Approach to Malware Detection, ACM Transactions on Programming Languages and Systems volume 30 issue 5, Aug. 2008, pages 1-55.
  • Doug McCreary, Kang Li, Scott A. Watterson, and David K. Lowenthal. TCP-RC: A Receiver-Centered TCP Protocol for Delay-Sensitive Applications. PDF 12th SPIE/ACM Multimedia Computing and Networking Conference (MMCN), January 2005.
  • Haijin Yan, Rupa Krishnan, Scott A. Watterson, David K. Lowenthal, Kang Li, and Larry L. Peterson. Client-Centered Energy and Delay Analysis for TCP Downloads. PDF 12th IEEE International Workshop on Quality of Service (IWQoS), June 2004.
  • William Kozma Jr., and Loukas Lazos, "Dealing with Liars: Misbehavior Identification via Renyi-Ulam Games," 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009)
  • Loukas Lazos, Sisi Liu, and Marwan Krunz, "Mitigating Control-Channel Jamming Attacks in Multi-channel Wireless Ad Hoc Networks," 2nd ACM Conference on Wireless Network Security, (WiSec 2009).
  • William Kozma Jr., and Loukas Lazos, "REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits," 2nd ACM Conference on Wireless Network Security (WiSec 2009).
  • S. Ahuja, S. Ramasubramanian, and M. Krunz, "Single link failure detection in all-optical networks using monitoring cycles and paths," IEEE/ACM Transactions on Networking, vol. 17, no. 4, August 2009, pp. 1080-1093.
  • S. Ahuja, S. Ramasubramanian, and M. Krunz, "SRLG failure localization in all-optical networks using monitoring cycles and paths," in Proceedings of IEEE INFOCOM 2008, Phoenix, AZ, May 2008, pp. 700-708.
  • G. Jayavelu, S. Ramasubramanian, and O. Younis, "Maintaining colored trees for disjoint multipath routing under node failures," IEEE/ACM Transactions on Networking, vol. 17, no. 1, February 2009, pp. 346-359.

Webmaster: Christian Collberg