Publication Control-Flow Integrity Martin Abadi, Mihai Budiu, Úlfar Erlingsson MSR-TR-2005-18 | November 2005 ACM Conference on Computer and Communication Security (CCS)
Publication Control-Flow Integrity – Principles, Implementations, and Applications Martin Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti November 2005
Publication Hash functions: Theory, attacks, and applications Ilya Mironov MSR-TR-2005-187 | November 2005
Publication Signatures for Network Coding Denis Charles, Kamal Jain, Kristin Lauter MSR-TR-2005-159 | November 2005 Project
Publication Vigilante: end-to-end containment of internet worms Manuel Costa, Jon Crowcroft, Miguel Castro, Ant Rowstron, Lintao Zhang, Lidong Zhou, Paul Barham ACM Symposium on Operating Systems Principles (SOSP) | October 2005
Publication A comparative evaluation of two algorithms for Windows Registry anomaly detection Salvatore Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, Krysta M. Svore, Krysta M. Svore Journal of Computer Security | October 2005, Vol 13(4): pp. 659-693
Publication Cassandra: Flexible Trust Management and its Application to Electronic Health Records Mo Becker October 2005 October 2005
Publication RaceTrack: Efficient Detection of Data Race Conditions via Adaptive Tracking Yuan Yu, Tom Rodeheffer, Wei Chen ACM Symposium on Operating Systems Principles (SOSP 2005) | October 2005 ACM Symposium on Operating Systems Principles (SOSP 2005) 2005
Publication Black Box Leases Jon Howell, John (JD) Douceur MSR-TR-2005-120 | September 2005 Readable version of patent application, filed 2004.12.17.
Publication Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus Andy Gordon, Alan Jeffrey 16th International Conference, CONCUR 2005, San Francisco, CA, USA | August 2005 ISBN: 978-3-540-28309-6 (Print) 978-3-540-31934-4 (Online)