Matthew Stillerman
Ithaca College
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Matthew Stillerman.
annual computer security applications conference | 2002
Frank Adelstein; Matthew Stillerman; Dexter Kozen
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating system is loaded, it can easily circumvent any operating system-based security mechanism. Boot firmware programs are typically written by third-party device manufacturers and may come from various suppliers of unknown origin. We describe an approach to this problem based on load-time verification of onboard device drivers against a standard security policy designed to limit access to system resources. We also describe our ongoing effort to construct a prototype of this technique for open firmware boot platforms.
Lecture Notes in Computer Science | 2002
Dexter Kozen; Matthew Stillerman
We describe a static analysis method on Java bytecode to determine class initialization dependencies. This method can be used for eager class loading and initialization. It catches many initialization circularities that are missed by the standard lazy implementation. Except for contrived examples, the computed initialization order gives the same results as standard lazy initialization.
darpa information survivability conference and exposition | 2003
Matthew Stillerman; Dexter Kozen
BootSafe is a system for verifying the safety of boot firmware at load time. It employs inexpensive static checks of compiled code, based on the efficient code certification (ECC) technique. We demonstrate a prototype of the BootSafe system that verifies safety of fcode programs for use with open firmware compliant boot platforms.
international conference on information and communication security | 2006
Carla Marceau; Matthew Stillerman
Modern computing environments depend on extensive shared libraries. In this paper, we propose monitoring the calls between those libraries as a new source of data for host-based anomaly detection. That is, we characterize an application by its use of shared library functions and characterize each shared library function by its use of (lower-level) shared libraries. This approach to intrusion detection offers significant benefits, especially in systems such as Windows, much of which is implemented above the kernel as dynamically linked libraries (DLLs). It localizes anomalies to particular code modules, facilitating anomaly analysis and assessment and discouraging mimicry attacks. It reduces retraining after system updates and enables training concurrent with detection. The proposed approach can be used with various techniques for modeling call sequences, including N-grams, automata, and techniques that consider parameter values. To demonstrate its potential, we have studied how a DLL-level profiling IDS would detect two recent attacks on Windows systems.
Archive | 2003
Frank Adelstein; Matthew Stillerman; Robert A. Joyce
Archive | 2004
Carla Marceau; Matthew Stillerman
Communications of The ACM | 1999
Matthew Stillerman; Carla Marceau; Maureen Stillman
Archive | 2008
Matthew Stillerman; Dexter Kozen; Thomas J. Merritt
Archive | 2007
Carla Marceau; Matthew Stillerman; David I. Rosenthal; Marisa M. Gioioso
Archive | 2012
Matthew Stillerman; Robert A. Joyce