default search action
Barton P. Miller
Person information
- affiliation: University of Wisconsin-Madison, Madison, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c110]Raúl Reinosa Simón, Clara I. Valero, José A. Martínez Cadenas, Elisa R. Heymann, Ignacio Lacalle, Barton P. Miller, Carlos Enrique Palau:
Empirical Analysis and Practical Assessment of Ransomware Attacks to Data in Motion. CSR 2024: 216-221 - 2023
- [j46]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. IEEE Trans. Software Eng. 49(2): 485-497 (2023) - [c109]Sazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao:
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions. ACNS Workshops 2023: 515-529 - 2022
- [j45]Elisa R. Heymann, Barton P. Miller:
Software Security for the People: Free and Open Resources for Software Security Training. IEEE Secur. Priv. 20(2): 88-95 (2022) - [j44]Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - [j43]Barton P. Miller, Mengxiao Zhang, Elisa R. Heymann:
The Relevance of Classic Fuzz Testing: Have We Solved This One? IEEE Trans. Software Eng. 48(6): 2028-2039 (2022) - 2021
- [c108]Xiaozhu Meng, Jonathon M. Anderson, John M. Mellor-Crummey, Mark W. Krentel, Barton P. Miller, Srdan Milakovic:
Parallel binary code analysis. PPoPP 2021: 76-89 - [i15]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks. CoRR abs/2112.04037 (2021) - [i14]Michael Gerndt, Masaaki Kondo, Barton P. Miller, Tapasya Patki:
Adaptive Resource Management for HPC Systems (Dagstuhl Seminar 21441). Dagstuhl Reports 11(10): 1-19 (2021) - 2020
- [j42]Joseph O. Eichenhofer, Elisa Heymann, Barton P. Miller, Arnold Kang:
An In-Depth Security Assessment of Maritime Container Terminal Software Systems. IEEE Access 8: 128050-128067 (2020) - [c107]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Deployment-quality and Accessible Solutions for Cryptography Code Development. CODASPY 2020: 174-176 - [c106]Benjamin Welton, Barton P. Miller:
Identifying and (automatically) remedying performance problems in CPU/GPU applications. ICS 2020: 27:1-27:13 - [i13]Xiaozhu Meng, Jonathon M. Anderson, John M. Mellor-Crummey, Mark W. Krentel, Barton P. Miller, Srdan Milakovic:
Parallelizing Binary Code Analysis. CoRR abs/2001.10621 (2020) - [i12]Joseph O. Eichenhofer, Elisa Heymann, Barton P. Miller, Arnold Kang:
An In-Depth Security Assessment of Maritime Container Terminal Software Systems. CoRR abs/2006.12056 (2020) - [i11]Barton P. Miller, Mengxiao Zhang, Elisa R. Heymann:
The Relevance of Classic Fuzz Testing: Have We Solved This One? CoRR abs/2008.06537 (2020)
2010 – 2019
- 2019
- [c105]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. CCS 2019: 2545-2547 - [c104]Benjamin Welton, Barton P. Miller:
Diogenes: looking for an honest CPU/GPU performance measurement tool. SC 2019: 21:1-21:20 - [c103]Andrew K. Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence D. Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage:
Trusted CI Experiences in Cybersecurity and Service to Open Science. PEARC 2019: 60 - [i10]Andrew K. Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence D. Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage:
Trusted CI Experiences in Cybersecurity and Service to Open Science. CoRR abs/1904.05383 (2019) - 2018
- [c102]Benjamin Welton, Barton P. Miller:
Exposing Hidden Performance Opportunities in High Performance GPU Applications. CCGrid 2018: 301-310 - [c101]Elisa Heymann, Barton P. Miller:
Tutorial: Secure Coding Practices, Automated Assessment Tools and the SWAMP. SecDev 2018: 124-125 - [c100]Nathan Jay, Barton P. Miller:
Structured random differential testing of instruction decoders. SANER 2018: 84-94 - [i9]Xiaozhu Meng, Barton P. Miller, Somesh Jha:
Adversarial Binaries for Authorship Identification. CoRR abs/1809.08316 (2018) - 2017
- [j41]James A. Kupsch, Elisa Heymann, Barton P. Miller, Vamshi Basupalli:
Bad and good news about using software assurance tools. Softw. Pract. Exp. 47(1): 143-156 (2017) - [c99]Xiaozhu Meng, Barton P. Miller, Kwang-Sung Jun:
Identifying Multiple Authors in a Binary Program. ESORICS (2) 2017: 286-304 - 2016
- [c98]Xiaozhu Meng, Barton P. Miller:
Binary code is not easy. ISSTA 2016: 24-35 - 2014
- [c97]Emily R. Jacobson, Andrew R. Bernat, William R. Williams, Barton P. Miller:
Detecting Code Reuse Attacks with a Model of Conformant Program Execution. ESSoS 2014: 1-18 - [c96]Benjamin Welton, Barton P. Miller:
The anatomy of Mr. Scan: a dissection of performance of an extreme scale GPU-based clustering algorithm. ScalA@SC 2014: 54-60 - [e6]Arndt Bode, Michael Gerndt, Per Stenström, Lawrence Rauchwerger, Barton P. Miller, Martin Schulz:
2014 International Conference on Supercomputing, ICS'14, Muenchen, Germany, June 10-13, 2014. ACM 2014, ISBN 978-1-4503-2642-1 [contents] - [i8]Barton P. Miller, Yoshio Tanaka, Elisa Heymann:
Grid and Cloud Security: A Confluence (NII Shonan Meeting 2014-3). NII Shonan Meet. Rep. 2014 (2014) - 2013
- [j40]Kevin A. Roundy, Barton P. Miller:
Binary-code obfuscations in prevalent packer tools. ACM Comput. Surv. 46(1): 4:1-4:32 (2013) - [j39]Joshua D. Goehner, Dorian C. Arnold, Dong H. Ahn, Gregory L. Lee, Bronis R. de Supinski, Matthew P. LeGendre, Barton P. Miller, Martin Schulz:
LIBI: A framework for bootstrapping extreme scale software systems. Parallel Comput. 39(3): 167-176 (2013) - [c95]Xiaozhu Meng, Barton P. Miller, William R. Williams, Andrew R. Bernat:
Mining Software Repositories for Accurate Authorship. ICSM 2013: 250-259 - [c94]Dong H. Ahn, Michael J. Brim, Bronis R. de Supinski, Todd Gamblin, Gregory L. Lee, Matthew P. LeGendre, Barton P. Miller, Adam Moody, Martin Schulz:
Efficient and Scalable Retrieval Techniques for Global File Properties. IPDPS 2013: 369-380 - [c93]Jairo Serrano, Eduardo César, Elisa Heymann, Barton P. Miller:
Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware. ISPEC 2013: 278-294 - [c92]Benjamin Welton, Evan Samanas, Barton P. Miller:
Mr. Scan: extreme scale density-based clustering using a tree-based network of GPGPU nodes. SC 2013: 84:1-84:11 - 2012
- [j38]Jairo Serrano, Elisa Heymann, Eduardo César, Barton P. Miller:
Computer Sciences Department. Comput. Informatics 31(1): 103-118 (2012) - [c91]Wenbin Fang, Barton P. Miller, James A. Kupsch:
Automated tracing and visualization of software security structure and properties. VizSEC 2012: 9-16 - [c90]Andrew R. Bernat, Barton P. Miller:
Structured Binary Editing with a CFG Transformation Algebra. WCRE 2012: 9-18 - [i7]Barton P. Miller, Yoshio Tanaka, Elisa Heymann:
Grid and Cloud Security: A Confluence (NII Shonan Meeting 2012-8). NII Shonan Meet. Rep. 2012 (2012) - 2011
- [c89]Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller:
Who Wrote This Code? Identifying the Authors of Program Binaries. ESORICS 2011: 172-189 - [c88]Andrew R. Bernat, Kevin A. Roundy, Barton P. Miller:
Efficient, sensitivity resistant binary instrumentation. ISSTA 2011: 89-99 - [c87]Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu:
Recovering the toolchain provenance of binary code. ISSTA 2011: 100-110 - [c86]Emily R. Jacobson, Nathan E. Rosenblum, Barton P. Miller:
Labeling library functions in stripped binaries. PASTE 2011: 1-8 - [c85]Andrew R. Bernat, Barton P. Miller:
Anywhere, any-time binary instrumentation. PASTE 2011: 9-16 - 2010
- [j37]Michael Gerndt, Barton P. Miller:
Special Issue: Scalable Tools for High-end Computing. Concurr. Comput. Pract. Exp. 22(6): 683-684 (2010) - [j36]Aroon Nataraj, Allen D. Malony, Alan Morris, Dorian C. Arnold, Barton P. Miller:
A framework for scalable, parallel performance monitoring. Concurr. Comput. Pract. Exp. 22(6): 720-735 (2010) - [c84]James A. Kupsch, Barton P. Miller, Elisa Heymann, Eduardo César:
First principles vulnerability assessment. CCSW 2010: 87-92 - [c83]Dorian C. Arnold, Barton P. Miller:
Scalable failure recovery for high-performance data aggregation. IPDPS 2010: 1-11 - [c82]Emily R. Jacobson, Michael J. Brim, Barton P. Miller:
A Lightweight Library for Building Scalable Tools. PARA (2) 2010: 419-429 - [c81]Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu:
Extracting compiler provenance from program binaries. PASTE 2010: 21-28 - [c80]Kevin A. Roundy, Barton P. Miller:
Hybrid Analysis and Control of Malware. RAID 2010: 317-338 - [e5]Jesús Labarta, Barton P. Miller, Bernd Mohr, Martin Schulz:
Program Development for Extreme-Scale Computing, 02.05. - 07.05.2010. Dagstuhl Seminar Proceedings 10181, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [i6]Jesús Labarta, Barton P. Miller, Bernd Mohr, Martin Schulz:
10181 Abstracts Collection - Program Development for Extreme-Scale Computing. Program Development for Extreme-Scale Computing 2010 - [i5]Jesús Labarta, Barton P. Miller, Bernd Mohr, Martin Schulz:
10181 Executive Summary - Program Development for Extreme-Scale Computing. Program Development for Extreme-Scale Computing 2010
2000 – 2009
- 2009
- [c79]Michael J. Brim, Barton P. Miller:
Group file operations for scalable tools and middleware. HiPC 2009: 69-78 - [c78]Dong H. Ahn, Bronis R. de Supinski, Ignacio Laguna, Gregory L. Lee, Ben Liblit, Barton P. Miller, Martin Schulz:
Scalable temporal order analysis for large scale debugging. SC 2009 - 2008
- [c77]James A. Kupsch, Barton P. Miller:
How to Open a File and Not Get Hacked. ARES 2008: 1196-1203 - [c76]Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller, Karen Hunt:
Learning to Analyze Binary Computer Code. AAAI 2008: 798-804 - [c75]Aroon Nataraj, Allen D. Malony, Allen Morris, Dorian C. Arnold, Barton P. Miller:
In search of sweet-spots in parallel performance monitoring. CLUSTER 2008: 69-78 - [c74]Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supinski, Gregory L. Lee, Barton P. Miller, Martin Schulz:
Overcoming Scalability Challenges for Tool Daemon Launching. ICPP 2008: 578-585 - [c73]Alexander V. Mirgorodskiy, Barton P. Miller:
Diagnosing Distributed Systems with Self-propelled Instrumentation. Middleware 2008: 82-103 - [c72]Gregory L. Lee, Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supinski, Matthew P. LeGendre, Barton P. Miller, Martin Schulz, Ben Liblit:
Lessons learned at 208K: towards debugging millions of cores. SC 2008: 26 - [c71]Nathan E. Rosenblum, Gregory Cooksey, Barton P. Miller:
Virtual machine-provided context sensitive page mappings. VEE 2008: 81-90 - 2007
- [j35]Andrew R. Bernat, Barton P. Miller:
Incremental call-path profiling. Concurr. Comput. Pract. Exp. 19(11): 1533-1547 (2007) - [j34]Barton P. Miller, Gregory Cooksey, Fredrick Moore:
An empirical study of the robustness of MacOS applications using random testing. ACM SIGOPS Oper. Syst. Rev. 41(1): 78-86 (2007) - [j33]Lisa A. Torrey, Joyce Coleman, Barton P. Miller:
A comparison of interactivity in the Linux 2.6 scheduler and an MLFQ scheduler. Softw. Pract. Exp. 37(4): 347-364 (2007) - [c70]Dorian C. Arnold, Dong H. Ahn, Bronis R. de Supinski, Gregory L. Lee, Barton P. Miller, Martin Schulz:
Stack Trace Analysis for Large Scale Debugging. IPDPS 2007: 1-10 - [c69]Gregory L. Lee, Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supinski, Barton P. Miller, Martin Schulz:
Benchmarking the Stack Trace Analysis Tool for BlueGene/L. PARCO 2007: 621-628 - [c68]Swetha Krishnan, Giridhar Ravipati, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Barton P. Miller:
The effects of metadata corruption on nfs. StorageSS 2007: 37-41 - [e4]Adolfy Hoisie, Barton P. Miller, Bernd Mohr:
Code Instrumentation and Modeling for Parallel Performance Analysis, 19.08. - 24.08.2007. Dagstuhl Seminar Proceedings 07341, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - [i4]Adolfy Hoisie, Barton P. Miller, Bernd Mohr:
07341 Executive Summary - Code Instrumentation and Modeling for Parallel Performance Analysis. Code Instrumentation and Modeling for Parallel Performance Analysis 2007 - [i3]Adolfy Hoisie, Barton P. Miller, Bernd Mohr:
07341 Abstracts Collection - Code Instrumentation and Modeling for Parallel Performance Analysis. Code Instrumentation and Modeling for Parallel Performance Analysis 2007 - 2006
- [j32]Sean McIlwain, Barton P. Miller:
A tool for converting Linux device drivers into Solaris compatible binaries. Softw. Pract. Exp. 36(7): 689-710 (2006) - [c67]Shai Rubin, Somesh Jha, Barton P. Miller:
Protomatching network traffic for high throughputnetwork intrusion detection. CCS 2006: 47-58 - [c66]Shai Rubin, Somesh Jha, Barton P. Miller:
On the Completeness of Attack Mutation Algorithms. CSFW 2006: 43-56 - [c65]Dorian C. Arnold, Gary D. Pack, Barton P. Miller:
Tree-based overlay networks for scalable applications. IPDPS 2006 - [c64]Barton P. Miller, Gregory Cooksey, Fredrick Moore:
An empirical study of the robustness of MacOS applications using random testing. Random Testing 2006: 46-54 - [c63]Philip C. Roth, Barton P. Miller:
On-line automated performance diagnosis on thousands of processes. PPoPP 2006: 69-80 - [c62]Jonathon T. Giffin, Somesh Jha, Barton P. Miller:
Automated Discovery of Mimicry Attacks. RAID 2006: 41-60 - [c61]Alexander V. Mirgorodskiy, Naoya Maruyama, Barton P. Miller:
Scalable systems software - Problem diagnosis in large-scale computing environments. SC 2006: 88 - [e3]Michael Gerndt, Allen D. Malony, Barton P. Miller, Wolfgang E. Nagel:
Automatic Performance Analysis, 12.-16. December 2005. Dagstuhl Seminar Proceedings 05501, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany 2006 [contents] - 2005
- [j31]Laune C. Harris, Barton P. Miller:
Practical analysis of stripped binary code. SIGARCH Comput. Archit. News 33(5): 63-68 (2005) - [c60]Eli D. Collins, Barton P. Miller:
A Loop-Aware Search Strategy for Automated Performance Analysis. HPCC 2005: 573-584 - [c59]Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller:
Environment-Sensitive Intrusion Detection. RAID 2005: 185-206 - [c58]Shai Rubin, Somesh Jha, Barton P. Miller:
Language-Based Generation and Evaluation of NIDS Signatures. S&P 2005: 3-17 - [i2]Michael Gerndt, Allen D. Malony, Barton P. Miller, Wolfgang E. Nagel:
05501 Summary - Automatic Performance Analysis. Automatic Performance Analysis 2005 - [i1]Michael Gerndt, Allen D. Malony, Barton P. Miller, Wolfgang E. Nagel:
05501 Abstracts Collection - Automatic Performance Analysis. Automatic Performance Analysis 2005 - 2004
- [c57]Shai Rubin, Somesh Jha, Barton P. Miller:
Automatic Generation and Analysis of NIDS Attacks. ACSAC 2004: 28-38 - [c56]Philip C. Roth, Dorian C. Arnold, Barton P. Miller:
Benchmarking the MRNet Distributed Tool Infrastructure: Lessons Learned. IPDPS 2004 - [c55]Jonathon T. Giffin, Somesh Jha, Barton P. Miller:
Efficient Context-Sensitive Intrusion Detection. NDSS 2004 - [c54]Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller:
Formalizing Sensitivity in Static Analysis for Intrusion Detection. S&P 2004: 194- - 2003
- [j30]Philip C. Roth, Barton P. Miller:
Deep Start: a hybrid strategy for automated performance problem searches. Concurr. Comput. Pract. Exp. 15(11-12): 1027-1046 (2003) - [c53]Alexander V. Mirgorodskiy, Barton P. Miller:
CrossWalk: A Tool for Performance Profiling Across the User-Kernel Boundary. PARCO 2003: 745-752 - [c52]Barton P. Miller, Ana Cortés, Miquel A. Senar, Miron Livny:
The Tool Dæmon Protocol (TDP). SC 2003: 19 - [c51]Philip C. Roth, Dorian C. Arnold, Barton P. Miller:
MRNet: A Software-Based Multicast/Reduction Network for Scalable Tools. SC 2003: 21 - [c50]Victor C. Zandy, Barton P. Miller:
Checkpoints of GUI-based Applications. USENIX ATC, General Track 2003: 155-165 - 2002
- [j29]Harold W. Cain, Barton P. Miller, Brian J. N. Wylie:
A callgraph-based search strategy for automated performance diagnosis. Concurr. Comput. Pract. Exp. 14(3): 203-217 (2002) - [c49]Philip C. Roth, Barton P. Miller:
Deep Start: A Hybrid Strategy for Automated Performance Problem Searches. Euro-Par 2002: 86-96 - [c48]Barton P. Miller, Jesús Labarta, Florian Schintke, Jens Simon:
Performance Evaluation, Analysis and Optimization. Euro-Par 2002: 131 - [c47]Victor C. Zandy, Barton P. Miller:
Reliable network connections. MobiCom 2002: 95-106 - [c46]Barton P. Miller:
A Security Attack and Defense in the Grid Environment. PVM/MPI 2002: 10 - [c45]Jonathon T. Giffin, Somesh Jha, Barton P. Miller:
Detecting Manipulated Remote Call Streams. USENIX Security Symposium 2002: 61-79 - 2001
- [j28]Barton P. Miller, Mihai Christodorescu, Robert Iverson, Tevfik Kosar, Alexander Mirgorodskii, Florentina I. Popovici:
Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes. Parallel Process. Lett. 11(2/3): 267-280 (2001) - [j27]Thomas Ludwig, Barton P. Miller:
Monitoring Systems and Tool Interoperability. Parallel Distributed Comput. Pract. 4(3) (2001) - [j26]Karen L. Karavanic, Barton P. Miller:
A Framework for Multi-Execution Performance Tuning. Parallel Distributed Comput. Pract. 4(3) (2001) - [c44]Zhichen Xu, Thomas W. Reps, Barton P. Miller:
Typestate Checking of Machine Code. ESOP 2001: 335-351 - 2000
- [j25]Tia Newhall, Barton P. Miller:
Performance measurement of dynamically compiled Java executions. Concurr. Pract. Exp. 12(6): 343-362 (2000) - [c43]Barton P. Miller, Michael Gerndt:
Support Tools and Environments. Euro-Par 2000: 45-46 - [c42]Harold W. Cain, Barton P. Miller, Brian J. N. Wylie:
A Callgraph-Based Search Strategy for Automated Performance Diagnosis (Distinguished Paper). Euro-Par 2000: 108-122 - [c41]Zhichen Xu, Barton P. Miller, Thomas W. Reps:
Safety checking of machine code. PLDI 2000: 70-82
1990 – 1999
- 1999
- [j24]Ariel Tamches, Barton P. Miller:
Using Dynamic Kernel Instrumentation for Kernel and Application Tuning. Int. J. High Perform. Comput. Appl. 13(3): 263-276 (1999) - [j23]Jeffrey K. Hollingsworth, Barton P. Miller:
Summary of the Sigmetrics symposium on parallel and distributed processing. SIGMETRICS Perform. Evaluation Rev. 26(4): 2-12 (1999) - [c40]Victor C. Zandy, Barton P. Miller, Miron Livny:
Process Hijacking. HPDC 1999: 177-184 - [c39]Tia Newhall, Barton P. Miller:
Performance Measurement of Dynamically Compiled Java Executions. Java Grande 1999: 42-50 - [c38]Ariel Tamches, Barton P. Miller:
Fine-Grained Dynamic Instrumentation of Commodity Operating System Kernels. OSDI 1999: 117-130 - [c37]Zhichen Xu, Barton P. Miller, Oscar Naim:
Dynamic Instrumentation of Threaded Applications. PPoPP 1999: 49-59 - [c36]