Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Matthew Stillerman is active.

Publication


Featured researches published by Matthew Stillerman.


annual computer security applications conference | 2002

Malicious code detection for open firmware

Frank Adelstein; Matthew Stillerman; Dexter Kozen

Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating system is loaded, it can easily circumvent any operating system-based security mechanism. Boot firmware programs are typically written by third-party device manufacturers and may come from various suppliers of unknown origin. We describe an approach to this problem based on load-time verification of onboard device drivers against a standard security policy designed to limit access to system resources. We also describe our ongoing effort to construct a prototype of this technique for open firmware boot platforms.


Lecture Notes in Computer Science | 2002

Eager Class Initialization for Java

Dexter Kozen; Matthew Stillerman

We describe a static analysis method on Java bytecode to determine class initialization dependencies. This method can be used for eager class loading and initialization. It catches many initialization circularities that are missed by the standard lazy implementation. Except for contrived examples, the computed initialization order gives the same results as standard lazy initialization.


darpa information survivability conference and exposition | 2003

Efficient code certification for open firmware

Matthew Stillerman; Dexter Kozen

BootSafe is a system for verifying the safety of boot firmware at load time. It employs inexpensive static checks of compiled code, based on the efficient code certification (ECC) technique. We demonstrate a prototype of the BootSafe system that verifies safety of fcode programs for use with open firmware compliant boot platforms.


international conference on information and communication security | 2006

Modular behavior profiles in systems with shared libraries (short paper)

Carla Marceau; Matthew Stillerman

Modern computing environments depend on extensive shared libraries. In this paper, we propose monitoring the calls between those libraries as a new source of data for host-based anomaly detection. That is, we characterize an application by its use of shared library functions and characterize each shared library function by its use of (lower-level) shared libraries. This approach to intrusion detection offers significant benefits, especially in systems such as Windows, much of which is implemented above the kernel as dynamically linked libraries (DLLs). It localizes anomalies to particular code modules, facilitating anomaly analysis and assessment and discouraging mimicry attacks. It reduces retraining after system updates and enables training concurrent with detection. The proposed approach can be used with various techniques for modeling call sequences, including N-grams, automata, and techniques that consider parameter values. To demonstrate its potential, we have studied how a DLL-level profiling IDS would detect two recent attacks on Windows systems.


Archive | 2003

Remote collection of computer forensic evidence

Frank Adelstein; Matthew Stillerman; Robert A. Joyce


Archive | 2004

Secure peer-to-peer object storage system

Carla Marceau; Matthew Stillerman


Communications of The ACM | 1999

Intrusion detection for distributed applications

Matthew Stillerman; Carla Marceau; Maureen Stillman


Archive | 2008

Active verification of boot firmware

Matthew Stillerman; Dexter Kozen; Thomas J. Merritt


Archive | 2007

Dynamic assembly of information pedigrees

Carla Marceau; Matthew Stillerman; David I. Rosenthal; Marisa M. Gioioso


Archive | 2012

Scalable distributed processing of rdf data

Matthew Stillerman; Robert A. Joyce

Collaboration


Dive into the Matthew Stillerman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David I. Rosenthal

University of Texas MD Anderson Cancer Center

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge