Follow
Michael Zhivich
Michael Zhivich
Verified email at akamai.com
Title
Cited by
Cited by
Year
Virtuoso: Narrowing the semantic gap in virtual machine introspection
B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee
2011 IEEE Symposium on Security and Privacy, 297-312, 2011
3992011
The real cost of software errors
M Zhivich, RK Cunningham
IEEE Security & Privacy 7 (2), 2009
1542009
Experiences in cyber security education
J Werther, M Zhivich, T Leek, N Zeldovich
The MIT Lincoln Laboratory capture-the-flag exercise. In Proceedings of the …, 2011
86*2011
Dynamic buffer overflow detection
M Zhivich, T Leek, R Lippmann
Workshop on the evaluation of software defect detection tools 2005, 2005
462005
The Fun and Future of CTF
A Davis, T Leek, M Zhivich, K Gwinnup, W Leonard
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
442014
Coverage maximization using dynamic taint tracing
TR Leek, GZ Baker, RE Brown, MA Zhivich, RP Lippmann
MASSACHUSETTS INST OF TECH LEXINGTON LINCOLN LAB, 2007
422007
You Sank My Battleship!: A Case Study in Secure Programming
A Stoughton, A Johnson, S Beller, K Chadha, D Chen, K Foner, M Zhivich
Proceedings of the Ninth Workshop on Programming Languages and Analysis for …, 2014
9*2014
Detecting buffer overflows using testcase synthesis and code instrumentation
MA Zhivich
MIT Lincoln Laboratory, 2005
92005
Building low-power trustworthy systems: Cyber-security considerations for Real-Time Physiological Status Monitoring
J Holliman, M Zhivich, R Khazan, A Swiston, B Telfer
MILCOM 2016-2016 IEEE Military Communications Conference, 1083-1089, 2016
52016
AWE: Improving software analysis through modular integration of static and dynamic analyses
RE Brown, R Khazan, M Zhivich
Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 2007
52007
Securing current and future process control systems
R Cunningham, S Cheung, M Fong, U Lindqvist, D Nicol, R Pawlowski, ...
International Conference on Critical Infrastructure Protection, 99-115, 2007
52007
Webtorrent: a bittorrent extension for high availability servers
G Sivek, S Sivek, J Wolfe, M Zhivich
Webtorrent Mozilla meets BitTorrent as web pages are packaged into larger …, 2004
32004
House Rules: Designing the Scoring Algorithm for Cyber Grand Challenge
B Price, M Zhivich, M Thompson, C Eagle
IEEE Security & Privacy 16 (2), 23-31, 2018
22018
Simulation Driven Policy Recommendations for Code Diversity
B Tello, M Winterrose, G Baah, M Zhivich
Simulation and Modeling Methodologies, Technologies and Applications, 21-34, 2016
2*2016
Securing Process Control Systems of Today and Tomorrow
RK Cunningham, S Cheung, M Fong, U Lindqvist, DM Nicol, R Pawlowski, ...
First Annual IFIP WG 11.10 International Conference on Critical …, 2007
22007
BP: DECREE: A Platform for Repeatable and Reproducible Security Experiments
L Yan, B Price, M Zhivich, B Caswell, C Eagle, M Frantzen, H Sorenson, ...
2018 IEEE Cybersecurity Development (SecDev), 11-20, 2018
12018
Cyber in a World of Plenty: Secure High-Performance On-Orbit Processing
K Ingols, M Zhivich, J Brandon, E Koziel
12017
Improved Heuristics for Program Continuation in Failure-Oblivious Computing
A Hansen, MA Zhivich
2008
The system can't perform the operation now. Try again later.
Articles 1–18