Follow
Meredith L. Patterson
Meredith L. Patterson
Special Circumstances
Verified email at special-circumstanc.es - Homepage
Title
Cited by
Cited by
Year
Exploit programming: From buffer overflows to “weird machines” and theory of computation
S Bratus, ME Locasto, ML Patterson
1032011
Security applications of formal language theory
L Sassaman, ML Patterson, S Bratus, ME Locasto
IEEE Systems Journal 7 (3), 489-500, 2013
882013
PKI layer cake: New collision attacks against the global X. 509 infrastructure
D Kaminsky, ML Patterson, L Sassaman
International Conference on Financial Cryptography and Data Security, 289-303, 2010
812010
The seven turrets of babel: A taxonomy of langsec errors and how to expunge them
F Momot, S Bratus, SM Hallberg, ML Patterson
2016 IEEE Cybersecurity Development (SecDev), 45-52, 2016
562016
The halting problems of network stack insecurity
L Sassaman, ML Patterson, S Bratus, A Shubina
USENIX; login 36 (6), 22-32, 2011
452011
Beyond planted bugs in" trusting trust": The input-processing frontier
S Bratus, T Darley, M Locasto, ML Patterson, R bx Shapiro, A Shubina
IEEE Security & Privacy 12 (1), 83-87, 2014
312014
Implementing a vertically hardened DNP3 control stack for power applications
S Bratus, AJ Crain, SM Hallberg, DP Hirsch, ML Patterson, M Koo, ...
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 45-53, 2016
232016
A patch for Postel's robustness principle
L Sassaman, ML Patterson, S Bratus
IEEE Security & Privacy 10 (2), 87-91, 2012
222012
Guns and butter: Towards formal axioms of input validation
RJ Hansen, ML Patterson
Black Hat USA, August, 2005
142005
The seven turrets of babel: A taxonomy of langsec errors and how to expunge them. In 2016 IEEE Cybersecurity Development (SecDev)
F Momot, S Bratus, SM Hallberg, ML Patterson
IEEE, 2016
132016
From shotgun parsers to more secure stacks
S Bratus, ML Patterson, D Hirsch
Shmoocon, Nov, 2013
132013
Parser combinators for binary formats
M Patterson
C; Yes, in C; What, 2015
82015
Hammer parser generator
M Patterson, D Hirsch
72014
Subliminal channels in the private information retrieval protocols
M Patterson, L Sassaman
ACM Transactions on Reconfigurable Technology and Systems, 2014
72014
The bugs we have to kill
S Bratus, ML Patterson, A Shubina
; login:: the magazine of USENIX & SAGE 40 (4), 4-10, 2015
62015
Stopping injection attacks with computational theory
R Hansen, M Patterson
Black Hat Briefings Conference, 2005
62005
Input handling done right: Building hardened parsers using language-theoretic security
P Anantharaman, MC Millian, S Bratus, ML Patterson
2017 IEEE Cybersecurity Development (SecDev), 4-5, 2017
52017
Hammer
ML Patterson
UpstandingHackers/hammer, 2016
52016
Hammer parser generator, March 2014
M Patterson, D Hirsch
5
More ties than we thought
D Hirsch, I Markström, ML Patterson, A Sandberg, M Vejdemo-Johansson
PeerJ Computer Science 1, e2, 2015
42015
The system can't perform the operation now. Try again later.
Articles 1–20