This is a list of documents on various COAST projects, and some other security-related papers by COAST personnel. The list includes technical reports, conference papers, theses, and working papers. Most are in PostScript. The list is ordered by author and date. Not all paper are available to non-sponsors. Note: These papers can be found in our Bookshelf. |
- Secure Outsourcing of Scientific Computations
- Mikhail Atallah, and John Rice; Department of Computer Sciences, Purdue University; Coast TR 98-15; 1998
- Compact Recognizers of Episode Sequences
-
Alberto Apostolico, Mikhail J. Atallah;
Department of Computer Sciences;
Purdue University; Coast TR 97-20; 1997.
- Secure Outsourcing of Some Computations
-
Mikhail J. Atallah, Konstantinos Pantazopoulos, E. H. Spafford;
Department of Computer Sciences;
Purdue University; CSD-TR-96-074; Coast TR 97-19; 1997.
- An Algorithm for Estimating All Matches Between Two Strings
-
Mikhail J. Atallah, Frederic Chyzak,
Philippe Dumas; Department of Computer Sciences;
Purdue University; Coast TR 97-18; 1997
- Algorithms for Variable Length Subnet Address Assignment
-
Mikhail J. Atallah,
Douglas E. Comer;
Department of Computer Sciences;
Purdue University ; Coast TR 97-17; 1997
- A Taxonomy of Security Faults in the Unix Operating System
- Taimur Aslam; MS thesis; Department of Computer Sciences; Purdue University; Coast TR 95-09; 1995.
- A Taxonomy of Security Faults
- Taimur Aslam, Ivan Krsul, and Eugene
H. Spafford;
to appear in PROCEEDINGS OF THE
NATIONAL COMPUTER SECURITY CONFERENCE; Coast TR 96-05; 1996.
- A Randomized O(N Log N) Algorithm for Generalized Pattern Matching
-
Mikhail J. Atallah,
Frederic Chyzak, and Phillipe Dumas;
Department of Computer Sciences,
Purdue University;
CSD-TR-96-059; 1996.
- Applications of A Numbering Scheme For Polygonal Obstacles in the Plane
-
Mikhail J. Atallah,
and Danny Z. Chen;
Department of Computer Sciences,
Purdue University;
CSD-TR-96-055; 1996.
- Searching For Ephemeral Subsequences in Strings
-
Alberto Apostolico,
and Mikhail J. Atallah;
Department of Computer Sciences,
Purdue University;
CSD-TR-96-076; 1996.
- An Architecture for Intrusion Detection using Autonomous Agents; PDF Format
-
Jai Balasubramaniyan,
Jose Omar Garcia-Fernandez,
David Isacoff,
E. H. Spafford, and
Diego Zamboni,
Department of Computer Sciences,
Purdue University; Coast TR 98-05; 1998.
- Constructing Distributed Schedulers Using the Messiahs Interface Language
- S. J. Chapin and
E. H. Spafford; PROCEEDINGS OF THE 27TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS AND SOFTWARE
(HICSS); pp. 425--434, Vol. II; Wailea-Maui, Hawaii; Coast TR 94-09;
1994.
- Support for Security in Distributed Systems Using MESSIAHS
- S. J. Chapin and E. H. Spafford; PROCEEDINGS OF THE NATIONAL COMPUTER SECURITY CONFERENCE; pp. 339--447; Baltimore, MD; Coast TR 94-10; 1994. Active Defense of a Computer System Using Autonomous Agents
- Mark Crosbie and E. H. Spafford; Department of Computer Sciences, Purdue University; CSD-TR-95-008; 1995.
- Defending a Computer System Using Autonomous Agents
- Mark Crosbie and E. H. Spafford; Department of Computer Sciences, Purdue University; CSD-TR-95-022; Coast TR 95-02; 1995.
- IDIOT Users Guide
- Mark Crosbie, et. al. Department of Computer Sciences, Purdue University; CSD-TR-96-050; Coast TR 96-04; 1996. A Secure Message Broadcast System (SMBS) Mark Crosbie, Ivan Krsul, Steve Lodin, and E. H. Spafford; Department of Computer Sciences, Purdue University; CSD-TR-96-019; Coast TR 96-01; 1996.
- Identification of Host Audit Data to Detect Attacks on Low-Level IP Vulnerabilties
- Thomas E. Daniels, and E. H. Spafford; Department of Computer Sciences, Purdue University; Coast TR 98-10; 1998
- Misplaced trust: Kerberos 4 Session Keys
- Bryn Dole, Steve Lodin, and E. H. Spafford; from the proceedings of the 1997 ISOC Conference on Network Security; available in PostScript and Adobe Acrobat(PDF); Coast TR 97-01.
- Networked Agents for Scientific Computing
- T. Drashansky, Elias Houstis, and John Rice; Department of Computer Sciences, Purdue University; Coast TR 98-16; 1998
- Categorization of Software Errors that led to Security Breaches
- Wenliang Du and A. P. Mathur; 21ST NATIONAL INFORMATION SYSTEMS SECURITY CONFERENCE, CRYSTAL CITY, VA, 1998; Coast TR 97-09; 1997.
- Vulnerability Testing of Software System Using Fault Injection
- Wenliang Du and A. P. Mathur; Department of Computer Sciences, Purdue University; Coast TR 98-02; 1998
- The COPS Security Checker System
- D. Farmer and E. H. Spafford; PROCEEDINGS OF THE SUMMER 1990 USENIX CONFERENCE; pp. 165-170; Coast TR 94-01; Jun 1990.
- Data Quality in Security Outsourcing of Scientific Applications
- J. Chapman Flack; Mikhail Atallah; COAST Laboratory , Purdue University; Coast TR 98-20; 1998
- Monitoring File System Integrity on Unix Platforms
- Gene Kim and E. H. Spafford; INFOSECURITY NEWS; 4(4), pp. 21-22; Coast TR 93-02; July 1993.
- The Design of a System Integrity Monitor: Tripwire
- Gene Kim and E. H. Spafford; Department of Computer Sciences, Purdue University; CSD-TR-93-071; Coast TR 93-01; 1993.
- Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection
- Gene H. Kim and E. H. Spafford; PROCEEDINGS OF THE SYSTEMS ADMINISTRATION, NETWORKING AND SECURITY CONFERENCE III (SANS); Washington DC; Coast TR 94-03; 1994.
- Writing, Supporting, and Evaluating Tripwire: A Publically Available Security Tool
- Gene H. Kim and E. H. Spafford; PROCEEDINGS OF THE USENIX UNIX APPLICATIONS DEVELOPMENT SYMPOSIUM; pp. 89-107; Toronto, ON; Coast TR 94-04; 1994.
- Low Threat Security Patches and Tools
- Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, E. H. Spafford, S. S. Wagstaff, Jr; Department of Computer Sciences, Purdue University; CSD-TR-96-075; Coast TR 97-10; 1996.
- Authorship Analysis: Identifying the Author of a Program
- Ivan Krsul; Department of Computer Sciences, Purdue University; MS Thesis; CSD-TR-94-030; Coast TR 94-08; 1994.
- Authorship Analysis: Identifying the Author of a Program
- Ivan Krsul and Eugene H. Spafford; Department of Computer Sciences, Purdue University; CSD-TR-96-052; Coast TR 96-06; 1996.
- Computer Vulnerability Analysis - Thesis Proposal
- Ivan Krsul; Department of Computer Sciences, Purdue University; PHD Thesis Proposal; CSD-TR-97-026; Coast TR 97-05; 1997.
- An Economic Model for Enforcing Computer Policies or Detecting Computer Policy Violations
- Ivan Krsul; Department of Computer Sciences, Purdue University; Draft, 1997. for a copy, contact krsul@cs.purdue.edu.
- Computer Vulnerability Analysis
- Ivan Krsul , E. H. Spafford and Mahesh V. Tripunitara; Department of Computer Sciences, Purdue University; Coast TR 98-07; 1998 ; also available in PDF
- Coast Vulnerability Database User's Manual
- Ivan Krsul , Department of Computer Sciences, Purdue University; Coast TR 98-08; 1998 PDF
- Software Vulnerability Analysis
- Ivan Krsul; Department of Computer Sciences, Purdue University; PHD Thesis; Coast TR 98-09; 1998; also available in PDF
- Generation of Application Level Audit Data via Library Interposition
- Benjamin A. Kuperman, and E. H. Spafford; Department of Computer Sciences, Purdue University; Coast TR 98-17; 1998
- Tamper Resistance -- A Cautionary Note (PDF Version)
- Ross Anderson and Markus Kuhn; PROCEEDINGS OF THE 2ND WORKSHOP ON ELECTRONIC COMMERCE; Oakland, California; Coast TR 96-08; November 18-20, 1996.
- A Generic Virus Scanner in C++
- Sandeep Kumar and E. H. Spafford; PROCEEDINGS OF THE 8TH COMPUTER SECURITY APPLICATIONS CONFERENCE; pp. 210-219; Coast TR 92-01; 2-4 Dec 1992; Coast TR 92-01.
- An Application of Pattern Matching in Intrusion Detection
- Sandeep Kumar and E. H. Spafford; Department of Computer Sciences, Purdue University; CSD-TR-94-013; Coast TR 94-07; 1994.
- A Pattern-Matching Model for Instrusion Detection
- Sandeep Kumar and E. H. Spafford; PROCEEDINGS OF THE NATIONAL COMPUTER SECURITY CONFERENCE; pp. 11-21; Baltimore, MD; Coast TR 95-06; 1994.
- A Software Architecture to Support Misuse Instrusion Detection
- Sandeep Kumar and E. H. Spafford; Department of Computer Sciences, Purdue University; CSD-TR-95-009; Coast TR 95-04; 1995.
- Classification and Detection of Computer Intrusions
- Sandeep Kumar; Department of Computer Sciences, Purdue University; PhD Dissertation; Coast TR 95-08; 1995.
- Temporal Sequence Learning and Data Reduction for Anomaly Detection
- Terran Lane, Carla E. Brodley; ECE and the COAST Laboratory , Purdue University; Coast TR 98-18; 1998
- Filtering Techniques for Rapid User Classification
- Terran Lane, Carla E. Brodley; ECE and the COAST Laboratory , Purdue University; Coast TR 98-13; 1998
- Approaches to Online Learning and Conceptual Drift for User Identification in Computer Security
- Terran Lane, Carla E. Brodley; ECE and the COAST Laboratory , Purdue University; Coast TR 98-12; 1998
- Machine Learning Techniques for the Domain of Anomaly Detection for Computer Security
- Terran Lane; ECE and the COAST Laboratory , Purdue University; Coast TR 98-11; 1998
- Detecting the Abnormal: Machine Learning in Computer Security
- Terran Lane; ECE and the COAST Laboratory , Purdue University; technical report; Coast TR 97-02; 1997.
- Sequence Matching and Learning in Anomaly Detection for Computer Security
- Terran Lane; ECE and the COAST Laboratory , Purdue University; AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management; Coast TR 97-04; 1997.
- An Application of Machine Learning to Anomaly Detection
- Terran Lane; ECE and the COAST Laboratory , National Information Systems Security Conference; Coast TR 97-03; 1997.
- Firewalls Fend Off Invasions From the Net
- Steve Lodin and Christoph L. Schuba; Department of Computer Sciences, Purdue University; Coast TR 98-04; 1998.
- Final Report of the 2nd Workshop on Research with Security Vulnerability Databases, January 1999, PDF version;
- Pascal C. Meunier and Eugene H. Spafford; Department of Computer Sciences, Purdue University, CERIAS TR 99-06; 1999
- Host-Based Misuse Detection and Conventional Operating Systems' Audit Data Collection
- Kathrine Price ; Department of Computer Sciences also available in (PDF); Coast TR 97-15.
- Address Weaknesses in the Domain Name System Protocol
- Christoph L. Schuba; Department of Computer Sciences, Purdue University; MS Thesis; CSD-TR-94-028; Coast TR 94-05; 1994.
- Countering Abuse of Name-Based Authentication
- Christoph L. Schuba and E. H. Spafford; Department of Computer Sciences, Purdue University; CSD-TR-94-029; Coast TR 94-06; 1994.
- Classical IP and ARP over ATM
- Christoph L. Schuba, Berry Kercheval and E. H. Spafford; Department of Computer Sciences, Purdue University; CSD-TR-95-024; Coast TR 95-07; 1995.
- Report of the CMAD III - 3rd Annual Workshop on Computer Misuse and Anomaly Detection
- Sandeep Kumar, Steven W. Lodin, and
Christoph L. Schuba;
COAST Watch electronic newsletter, V1 (2);
Department of Computer Sciences,
Purdue University;
April 1995.
Reprinted in CIPHER electronic newsletter V4. IEEE Technical Committee on Security & Privacy; March 1995.
- Report of the NDSS 95 - 3rd Symposium on Network and Distributed System Security 1995
- Christoph L. Schuba; COAST Watch electronic newsletter, V1 (2); Department of Computer Sciences, Purdue University; April 1995.
- Report of the SNDSS 96 - 4th Symposium on Network and Distributed System Security 1996
- Christoph L. Schuba;
CIPHER electronic newsletter V13.
IEEE Technical Committee on Security & Privacy; March 1996.
Reprinted in COAST Watch electronic newsletter, V2 (2); Department of Computer Sciences, Purdue University; April 1996.
Reprinted in TIS security newsletter; Trusted Information Systems, Glenwood, MD; April 1996.
Reprinted in NSA in-house newletter; National Security Agency, Fort Mead, MD; April 1996.
- Report on the IEEE CS 1996 Symposium on Security and Privacy
- Christoph L. Schuba and Mary Ellen Zurko; CIPHER electronic newsletter V15. IEEE Technical Committee on Security & Privacy; June 1996.
- Reference Model for Firewall Technology and its Implications for Connection Signaling
- J. Bryan Lyles and
Christoph L. Schuba;
Proceedings Open Signaling Workshop, Columbia University,
New York, NY, October 1996; Coast TR 96-07.
Reprinted as Department of Computer Sciences, Purdue University; CSD-TR-94-061; 1996.
- Analysis of a Denial of Service Attack on TCP
- Christoph L. Schuba, Ivan Krsul, Markus Kuhn, E. H. Spafford, Aurobindo Sundaram, and Diego Zamboni, IEEE Symposium on Security and Privacy; Oakland, CA; Coast TR 97-06; May, 1997.
- On the Modeling, Design and Implementation of Firewall Technology (Thesis)
- Christoph L. Schuba, E. H. Spafford; Department of Computer Sciences, Purdue University; Coast TR 97-07. PDF
- Prototyping Experiences with Classical IP and ARP over Signaled ATM Connections (Prototyping Experiences with IP over ATM)
- Christoph L. Schuba, E. H. Spafford and Berry Kercheval; Journal of Systems and Software; Coast TR 97-16; III/1998.
- The Internet Worm Program: An Analysis
- E. H. Spafford; ACM COMPUTER COMMUNICATION REVIEW; 19(1), pp. 17-57, Jan 1989.
- An Analysis of the Internet Worm
- E. H. Spafford; PROCEEDINGS OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE 1989 (LECTURE NOTES IN COMPUTER SCIENCE #387); Springer-Verlag; pp. 446-468, Sep 1989.
- Preventing Weak Password Choices
- E. H. Spafford; 14th NATIONAL COMPUTER SECURITY CONFERENCE; National Institute of Standards and National Security Institute; pp. 446-455, 2-4 Oct 1991; Coast TR 91-02.
- Are Computer Break-Ins Ethical?
- E. H. Spafford; THE JOURNAL OF SYSTEMS AND SOFTWARE; 17(1), pp. 41-48; Coast TR 90-01; Jan 1992.
- OPUS: Preventing Weak Password Choices
- E. H. Spafford; COMPUTERS & SECURITY; 11(3), pp. 273-278; Coast TR 91-02; May 1992.
- Observing Reusable Password Choices
- E. H. Spafford; 3RD USENIX UNIX SECURITY SYMPOSIUM; pp. 299-312; Coast TR 91-03; 14-16 Sep 1992.
- Computer Viruses as Artificial Life
- E. H. Spafford; JOURNAL OF ARTIFICIAL LIFE; v. 1(3), pp. 249-265; Coast TR 94-02; 1994.
- Software Forensics: Can We Track Code to its Authors?
- E. H. Spafford and S. A. Weeber; 15TH NATIONAL COMPUTER SECURITY CONFERENCE; pp. 641-650; Coast TR 91-01; 13-16 Oct 1992.
- Software Forensics: Tracking Code to its Authors
- E. H. Spafford and S. A. Weeber; COMPUTERS & SECURITY; 12(6), pp. 585-595; Coast TR 91-01; Dec. 1993.
- One View of A Critical National Need: Support for Information Security Education and Research
- E. H. Spafford; Department of Computer Sciences, Purdue University; Coast TR 97-08; 1997.
- Data Quality in Security Outsourcing of Scientific Applications
- Chieh-Hsien Tiao, John R. Rice; COAST Laboratory , Purdue University; Coast T R 98-19; 1998
- The Compression Functions of SHA, MD2, MD4 and MD5 are not Affine
- Mahesh V. Tripunitara and Samuel Wagstaff Department of Computer Sciences, Purdue University; Coast TR 98-01; 1998
- Issues in the Incorporation of Security Services into a Protocol Reference Model
- Mahesh V. Tripunitara and E. H. Spafford Department of Computer Sciences, Purdue University; Coast TR 98-03; 1998
- Security Policy Communication in a Distributed Network Element
- Mahesh V. Tripunitara and Eugene H. Spafford; Department of Computer Sciences, Purdue University; CERIAS TR 99-01; 1999;
- Security Assessment of IP-based Networks: A Holistic Approach
- Mahesh V. Tripunitara and Eugene H. Spafford; Department of Computer Sciences, Purdue University; CERIAS TR 99-02; 1999; PDF
- A prototype for a distributed Intrusion Detection System
- Diego Zamboni and E. H. Spafford Department of Computer Sciences, Purdue University; Coast TR 98-06; 1998