Follow
Michele Co
Michele Co
Research Scientist, University of Virginia
Verified email at virginia.edu
Title
Cited by
Cited by
Year
ILR: Where'd my gadgets go?
J Hiser, A Nguyen-Tuong, M Co, M Hall, JW Davidson
2012 IEEE Symposium on Security and Privacy, 571-585, 2012
3292012
Zipr: Efficient static binary rewriting for security
WH Hawkins, JD Hiser, M Co, A Nguyen-Tuong, JW Davidson
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
372017
Methods, systems and computer readable media for detecting command injection attacks
A Nguyen-Tuong, JW Davidson, JD Hiser, JC Knight
US Patent 9,635,033, 2017
342017
Method of instruction location randomization (ILR) and related system
JD Hiser, A Nguyen-Tuong, JW Davidson
US Patent 10,193,927, 2019
242019
Xandra: An autonomous cyber battle system for the Cyber Grand Challenge
A Nguyen-Tuong, D Melski, JW Davidson, M Co, W Hawkins, JD Hiser, ...
IEEE Security & Privacy 16 (2), 42-51, 2018
202018
Defense against stack-based attacks using speculative stack layout transformation
BD Rodes, A Nguyen-Tuong, JD Hiser, JC Knight, M Co, JW Davidson
Runtime Verification: Third International Conference, RV 2012, Istanbul …, 2013
192013
Zipr++ Exceptional Binary Rewriting
J Hiser, A Nguyen-Tuong, W Hawkins, M McGill, M Co, J Davidson
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
142017
Evaluating trace cache energy efficiency
M Co, DAB Weikle, K Skadron
ACM Transactions on Architecture and Code Optimization (TACO) 3 (4), 450-476, 2006
112006
Mixr: Flexible runtime rerandomization for binaries
W Hawkins, A Nguyen-Tuong, JD Hiser, M Co, JW Davidson
Proceedings of the 2017 Workshop on Moving Target Defense, 27-37, 2017
92017
A case study of security case development
BD Rodes, JC Knight, A Nguyen-Tuong, JD Hiser, M Co, JW Davidson
Engineering systems for safety, 187-204, 2015
92015
Double Helix and RAVEN: a system for cyber fault tolerance and recovery
M Co, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong, W Weimer, ...
Proceedings of the 11th Annual Cyber and Information Security Research …, 2016
82016
To B or not to B: blessing OS commands with software DNA shotgun sequencing
A Nguyen-Tuong, JD Hiser, M Co, N Kennedy, D Melski, W Ella, D Hyde, ...
2014 Tenth European Dependable Computing Conference, 238-249, 2014
82014
The effects of context switching on branch predictor performance
M Co, K Skadron
2001 IEEE International Symposium on Performance Analysis of Systems and …, 2001
62001
Securing binary code
W Hawkins, JD Hiser, A Nguyen-Tuong, JW Davidson
IEEE Security & Privacy 15 (06), 77-81, 2017
52017
PEASOUP: Preventing exploits against software of uncertain provenance (position paper)
M Co, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong, D Cok, ...
Proceedings of the 7th International Workshop on Software Engineering for …, 2011
42011
A framework for creating binary rewriting tools (short paper)
JD Hiser, A Nguyen-Tuong, M Co, B Rodes, M Hall, CL Coleman, ...
2014 Tenth European Dependable Computing Conference, 142-145, 2014
32014
A lightweight software control system for cyber awareness and security
M Co, CL Coleman, JW Davidson, S Ghosh, JD Hiser, JC Knight, ...
2009 2nd International Symposium on Resilient Control Systems, 19-24, 2009
32009
Online control adaptation for safe and secure autonomous vehicle operations
M Elnaggar, JD Hiser, TX Lin, A Nguyen-Tuong, M Co, JW Davidson, ...
2017 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), 101-108, 2017
22017
Kevlar: Transitioning helix for research to practice
JW Davison, JC Knight, JD Hiser, A Nguyen-Tuong
12016
Software Exploit Prevention and Remediation via Software Memory Protection
C Coleman, J Davidson, D Evans, J Knight, A Nguyen-Tuong, D Evans, ...
2009
The system can't perform the operation now. Try again later.
Articles 1–20