A logical specification and analysis for SELinux MLS policy B Hicks, S Rueda, L St. Clair, T Jaeger, P McDaniel ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010 | 102 | 2010 |
From Trusted to Secure: Building and Executing Applications That Enforce System Security. B Hicks, SJ Rueda, T Jaeger, PD McDaniel USENIX Annual Technical Conference 7, 34, 2007 | 55 | 2007 |
Integrity walls: Finding attack surfaces from mandatory access control policies H Vijayakumar, G Jakka, S Rueda, J Schiffman, T Jaeger Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 52 | 2012 |
FlowFence: a denial of service defense system for software defined networking AFM Piedrahita, S Rueda, DMF Mattos, OCMB Duarte 2015 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2015 | 38 | 2015 |
An architecture for enforcing end-to-end access control over web applications B Hicks, S Rueda, D King, T Moyer, J Schiffman, Y Sreenivasan, ... Proceedings of the 15th ACM symposium on Access control models and …, 2010 | 33 | 2010 |
Extending the floodlight controller LV Morales, AF Murillo, SJ Rueda 2015 IEEE 14th International Symposium on Network Computing and Applications …, 2015 | 30 | 2015 |
Leveraging software-defined networking for incident response in industrial control systems AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda IEEE Software 35 (1), 44-50, 2017 | 25 | 2017 |
Verifying Compliance of Trusted Programs. SJ Rueda, D King, T Jaeger USENIX Security Symposium, 321-334, 2008 | 19 | 2008 |
Virtual incident response functions in control systems AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda Computer Networks 135, 147-159, 2018 | 18 | 2018 |
Flexible security configuration for virtual machines S Rueda, Y Sreenivasan, T Jaeger Proceedings of the 2nd ACM workshop on Computer security architectures, 35-44, 2008 | 16 | 2008 |
Sexual intimacy in the age of smart devices: Are we practicing safe IoT? M Wynn, K Tillotson, R Kao, A Calderon, A Murillo, J Camargo, R Mantilla, ... Proceedings of the 2017 Workshop on Internet of Things Security and Privacy …, 2017 | 15 | 2017 |
Analysis of virtual machine system policies S Rueda, H Vijayakumar, T Jaeger Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 15 | 2009 |
Transforming commodity security policies to enforce Clark-Wilson integrity D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 13 | 2012 |
Integrating SELinux with security-typed languages B Hicks, S Rueda, T Jaeger, P McDaniel Proceedings of the 3rd SELinux Symposium, 2007 | 13 | 2007 |
Protecting users from" themselves" W Enck, S Rueda, J Schiffman, Y Sreenivasan, L St. Clair, T Jaeger, ... Proceedings of the 2007 ACM workshop on Computer security architecture, 29-36, 2007 | 9 | 2007 |
Meaningful permission management in android LV Morales, SJ Rueda IEEE Latin America Transactions 13 (4), 1160-1166, 2015 | 7 | 2015 |
Cut me some security D Muthukumaran, S Rueda, H Vijayakumar, T Jaeger Proceedings of the 3rd ACM workshop on Assurable and Usable Security …, 2010 | 7 | 2010 |
Androidblp for confidentiality management in android environments JL Corchuelo, SJ Rueda IEEE Latin America Transactions 15 (3), 496-502, 2017 | 5 | 2017 |
Breaking Down the Walls of Mutual Distrust: Security-typed Email Using Labeled IPsec B Hicks, S Rueda, T Jaeger, P McDaniel Technical Report NAS-TR-0049-2006, Network and Security Research Center …, 2006 | 5 | 2006 |
The Android OS stack and its vulnerabilities: an empirical study A Mazuera-Rozo, J Bautista-Mora, M Linares-Vásquez, S Rueda, ... Empirical Software Engineering 24 (4), 2056-2101, 2019 | 4 | 2019 |