Richard Enbody
Affiliations: | Michigan State University, East Lansing, MI |
Area:
Computer ScienceGoogle:
"Richard Enbody"Children
Sign in to add traineeMark W. Brehob | grad student | 2003 | Michigan State |
Krerk Piromsopa | grad student | 2006 | Michigan State |
Jared D. DeMott | grad student | 2012 | Michigan State |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Bajpai P, Enbody R. (2020) Attacking Key Management in Ransomware It Professional. 22: 21-27 |
DeMott JD, Enbody RJ, Punch WF. (2013) Systematic bug finding and fault localization enhanced with input data tracking Computers and Security. 32: 130-157 |
Piromsopa K, Enbody RJ. (2011) Survey of protections from buffer-overflow attacks Engineering Journal. 15: 31-52 |
Sood A, Enbody R. (2011) The state of HTTP declarative security in online banking websites Computer Fraud and Security. 2011: 11-16 |
DeMott JD, Enbody RJ, Punch WF. (2011) Towards an automatic exploit pipeline 2011 International Conference For Internet Technology and Secured Transactions, Icitst 2011. 323-329 |
Piromsopa K, Enbody RJ. (2007) Architecting security: A secure implementation of hardware buffer-overflow protection Proceedings of the 3rd Iasted International Conference On Advances in Computer Science and Technology, Acst 2007. 17-22 |
Piromsopa K, Enbody RJ. (2006) Secure bit: Transparent, hardware buffer-overflow protection Ieee Transactions On Dependable and Secure Computing. 3: 365-376 |
Piromsopa K, Enbody RJ. (2006) Arbitrary copy: Bypassing buffer-overflow protections 2006 Ieee International Conference On Electro Information Technology. 580-584 |
Piromsopa K, Enbody RJ. (2006) Buffer-overflow protection: The theory 2006 Ieee International Conference On Electro Information Technology. 454-458 |
Brehob M, Wagner S, Torng E, et al. (2004) Optimal Replacement is NP-Hard for Nonstandard Caches Ieee Transactions On Computers. 53: 73-76 |