Gene Spafford
#6,303
Most Influential Person Now
American computer scientist
Gene Spafford's AcademicInfluence.com Rankings
Gene Spaffordcomputer-science Degrees
Computer Science
#408
World Rank
#424
Historical Rank
#230
USA Rank
Database
#1452
World Rank
#1527
Historical Rank
#384
USA Rank
Download Badge
Computer Science
Gene Spafford's Degrees
- PhD Information and Computer Science Georgia Tech
- Masters Information and Computer Science Georgia Tech
- Bachelors Mathematics and Computer Science SUNY Brockport
Why Is Gene Spafford Influential?
(Suggest an Edit or Addition)According to Wikipedia, Eugene Howard Spafford , known as Spaf, is an American professor of computer science at Purdue University and a computer security expert. Spafford serves as an advisor to U.S. government agencies and corporations. In 1998, he founded and was the first director of the Center for Education and Research in Information Assurance and Security at Purdue University.
Gene Spafford's Published Works
Published Works
- An architecture for intrusion detection using autonomous agents (1998) (620)
- The design and implementation of tripwire: a file system integrity checker (1994) (568)
- Analysis of a denial of service attack on TCP (1997) (554)
- The internet worm program: an analysis (1989) (510)
- Getting Physical with the Digital Investigation Process (2003) (458)
- A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION (1994) (450)
- Intrusion detection using autonomous agents (2000) (386)
- Debugging with dynamic slicing and backtracking (1993) (338)
- Software vulnerability analysis (1998) (338)
- Security models for web-based applications (2001) (316)
- Secure outsourcing of scientific computations (2001) (291)
- Digital Government Security Infrastructure Design Challenges (2001) (290)
- An Event-Based Digital Forensic Investigation Framework (2004) (266)
- A Software Architecture to Support Misuse Intrusion Detection (1995) (259)
- Applying Genetic Programming to Intrusion Detection (1995) (253)
- DESIGN OF MUTANT OPERATORS FOR THE C PROGRAMMING LANGUAGE (2006) (249)
- An Application of Pattern Matching in Intrusion Detection (1994) (211)
- The COPS Security Checker System (1990) (192)
- Authorship analysis: identifying the author of a program (1997) (192)
- Defending a Computer System Using Autonomous Agents (1995) (188)
- Computing curricula 1991: Report of the ACM/IEEE-CS Joint Curriculum Task Force (1991) (183)
- The internet worm: crisis and aftermath (1989) (173)
- OPUS: Preventing weak password choices (1992) (164)
- ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment (2005) (155)
- Use of A Taxonomy of Security Faults (1996) (152)
- PFIRES: a policy framework for information security (2003) (143)
- Software forensics: Can we track code to its authors? (1993) (135)
- Crisis and aftermath (1989) (131)
- Network covert channels: design, analysis, detection, and elimination (2006) (122)
- Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection (1994) (120)
- Critical slicing for software fault localization (1996) (118)
- A study of several specific secure two-party computation problems (2001) (118)
- Active Defense of a Computer System using Autonomous Agents (1995) (113)
- A hypothesis-based approach to digital forensic investigations (2006) (110)
- Computer Viruses as Artificial Life (1994) (109)
- Dynamic slicing in the presence of unconstrained pointers (1991) (109)
- An execution-backtracking approach to debugging (1991) (108)
- Planning and Integrating Deception into Computer Security Defenses (2014) (98)
- The Internet Worm Incident (1989) (92)
- On the role of file system metadata in digital forensics (2004) (91)
- Defining event reconstruction of digital crime scenes. (2004) (82)
- Using internal sensors for computer intrusion detection (2001) (78)
- Efficient intrusion detection using automaton inlining (2005) (73)
- Understanding insiders: An analysis of risk-taking behavior (2013) (68)
- Cyber Security Deception (2016) (65)
- A distributed requirements management framework for legal compliance and accountability (2009) (63)
- Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach (2006) (61)
- Are computer hacker break-ins ethical? (1992) (61)
- Categories of digital investigation analysis techniques based on the computer history model (2006) (61)
- Observing Reusable Password Choices (1992) (60)
- Automated adaptive intrusion containment in systems of interacting services (2007) (59)
- Classical IP and ARP over ATM (1995) (58)
- Heuristics for Automatic Localization of Software Faults (1992) (55)
- Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence (2005) (54)
- Computer Viruses--A Form of Artificial Life? (1990) (53)
- A pattern-matching model for intrusion detection (1994) (53)
- Virtual Playgrounds for Worm Behavior Investigation (2005) (52)
- Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities (1999) (47)
- Computer Vulnerability Analysis (1998) (45)
- Intrusion Response Systems: A Survey (2008) (43)
- An analysis of the internet worm (1989) (39)
- IDIOT - Users Guide (1996) (38)
- ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage (2015) (37)
- Improving Security using Deception (2013) (36)
- Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats (1989) (35)
- Failure and fault analysis for software debugging (1997) (35)
- Grand challenges in information security: process and output (2004) (35)
- Preventing Weak Password Choices (1991) (35)
- A reference model for firewall technology (1997) (34)
- Extending mutation testing to find environmental bugs (1990) (32)
- A categorization of computer security monitoring systems and the impact on the design of audit sources (2004) (31)
- Generation of Application Level Audit Data via Library Interposition (1998) (30)
- The Mothra tool set (software testing) (1989) (30)
- Security and Privacy Challenges of a Digital Government (2002) (29)
- Observations on reusable password choices (1992) (29)
- A generic virus scanner for C++ (1992) (28)
- An Execution Backtracking Approach to Program Debugging (2007) (28)
- Information Assurance : Dependability and Security in Networked Systems (2007) (27)
- On the modeling, design, and implementation of firewall technology (1997) (27)
- Using embedded sensors for detecting network attacks (2000) (26)
- Writing, supporting, and evaluating tripwire: a publically available security tool (1994) (25)
- A failure to learn from the past (2003) (23)
- A Trend Analysis of Vulnerabilities (2005) (22)
- Using Internal Sensors and Embedded Detectors for Intrusion Detection (2002) (22)
- Happy Birthday, Dear Viruses (2007) (21)
- Misplaced trust: Kerberos 4 session keys (1997) (20)
- Efficient Debugging with Slicing and Backtracking (1990) (19)
- Kernel structures for a distributed operating system (1986) (19)
- Pervasive binding of labels to system processes (2005) (18)
- Software forensics: Tracking code to its authors (1993) (18)
- Support for Implementing Scheduling Algorithms Using MESSIAHS (1994) (18)
- Improved kernel security through memory layout randomization (2013) (18)
- An examination of user behavior for user re-authentication (2007) (18)
- Testimony before the House Armed Services Committee Subcommittee on Terrorism , Unconventional Threats and Capabilities " Cyber Terrorism : The New Asymmetric Threat " 24 July 2003 Statement of (2006) (18)
- Reference models for the concealment and observation of origin identity in store-and-forward networks (2002) (17)
- A Taxonomy of Common Computer Security Vulnerabilities Based on their Method of Detection (1995) (17)
- Incentive Alignment and Risk Perception: An Information Security Application (2013) (17)
- Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach (2008) (16)
- Vulnerability likelihood: a probabilistic approach to software assurance (2005) (15)
- Poly2 Paradigm: A Secure Network Service Architecture∗ (2003) (15)
- Poly/sup 2/ paradigm: a secure network service architecture (2003) (15)
- Reverse-safe authentication protocol for secure USB memories (2012) (14)
- CuPIDS: An exploration of highly focused, co-processor-based information system protection (2007) (14)
- Low-threat security patches and tools (1997) (13)
- Tripwire: a case study in integrity monitoring (1997) (13)
- Creating and Maintaining a Policy Framework for Information Security (12)
- Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense (2009) (12)
- Secure Outsourcing of Some Computations (1996) (12)
- Sequential Statistical Procedures for Approving Test Sets Using Mutation-Based Software Testing (1990) (12)
- Network traffic tracking systems: folly in the large? (2001) (11)
- Cupids: increasing information system security through the use of dedicated co-processing (2005) (11)
- Ghost Patches: Fake Patches for Fake Vulnerabilities (2017) (11)
- Optical Network Survivability (2008) (11)
- The Power of Standards (1993) (10)
- Firewalls: An Expert Roundtable (1997) (10)
- Bibliography on debugging and backtracking (1989) (10)
- A network audit system for host-based intrusion detection (NASHID) in Linux (2000) (10)
- The case of using negative (deceiving) information in data protection (2014) (9)
- New directions for the AAFID architecture (1999) (9)
- The case for disappearing cyber security (2018) (8)
- User Authentication and Related Topics: An Annotated Bibliography (1991) (8)
- Risks and uncertainties in virtual worlds: an educators’ perspective (2013) (8)
- Modeling deception in information security as a hypergame: a primer (2015) (8)
- James P. Anderson: An Information Security Pioneer (2008) (8)
- A New Approach to the Specification of General Computer Security Policies (1998) (7)
- What starisstar information security? (2004) (7)
- Testimony before the House Government Reform Committee Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census Exploring Common Criteria: Can it Ensure that the Federal Government Gets Needed Security in Software? (2003) (7)
- Web 2.0: a complex balancing act (2011) (7)
- Insider Behavior: An Analysis of Decision under Risk (2009) (7)
- Security Assessment of IP-based Networks: A Holistic Approach (1999) (7)
- Some Challenges in Digital Forensics (2006) (6)
- The Search for Efficiency in Automated Intrusion Response for Distributed Applications (2008) (6)
- One View of A Critical National Need: Support for Information Security Education and Research (2007) (6)
- Countering Abuse of Name-Based Authentication (1994) (6)
- Using Deceptive Information in Computer Security Defenses (2014) (6)
- An Analysis of Some Software Vulnerabilities (1998) (6)
- Implicit Buffer Overflow Protection Using Memory Segregation (2011) (6)
- Subliminal Traceroute in TCP/IP (2000) (5)
- Workshop on experiences with building distributed and multiprocessor systems (1990) (5)
- Evolving event-driven programs (1996) (5)
- Remembrances of things pest (2010) (5)
- Scheduling Support for an Internetwork of Heterogeneous, Autonomous Processors (1991) (5)
- An interview with Gene Spafford on balancing breadth and depth in cybersecurity education (2014) (5)
- Enhancing Passwords Security Using Deceptive Covert Communication (2015) (5)
- Constructing distributed schedulers using the MESSIAHS interface language (1994) (5)
- Computer Viruses (1989) (4)
- Run-time label propagation for forensic audit data (2007) (4)
- A sequential statistical procedure in mutation- based testing (1990) (4)
- Prototyping experiences with classical IP and ARP over signaled ATM connections (1998) (4)
- Monitoring File Sys-tem Integrity on UNIX Platforms (1993) (4)
- Intellectual Property: Moral, Legal, and International Dilemmas (1997) (4)
- Experiences with Tripwire: The Evaluation and Writing of a Security Tool (1994) (3)
- Papers from the symposium on Experiences with distributed and multiprocessor systems (1992) (3)
- Inspiration and trust (2008) (3)
- Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (2013) (3)
- Experimental Designs: Testing a Debugging Oracle Assistant (1992) (3)
- Understanding Risk and Risk-Taking Behavior in Virtual Worlds (2011) (3)
- Perceptions of information security and privacy risks (2008) (3)
- Privacy and securityAnswering the wrong questions is no answer (2009) (3)
- Computer Viruses and Ethics (1991) (3)
- The Morris Worm at 30 (2019) (3)
- Security, technology, publishing, and ethics (part II) (2011) (3)
- Security, technology, publishing, and ethics (Part I) (2010) (2)
- Monitoring File System Integrity with Tripwire (1993) (2)
- Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords (2016) (2)
- The strength of encryption (2016) (2)
- Computer science. Happy birthday, dear viruses. (2007) (2)
- The USENET11© Copyright 1989 by Eugene Spafford, Purdue University. All rights reserved. Used by permission. (1990) (2)
- Defending against Password Exposure using Deceptive Covert Communication (2015) (2)
- What is a computer virus (1990) (2)
- Privacy and security Remembrances of Things Pest (2010) (2)
- A Hypergame Analysis for ErsatzPasswords (2018) (2)
- Modeling Firewalls Using Hierarchical Colored Petri Nets (2)
- Architecture and Operation Invocation in the Clouds Kernel (1987) (2)
- FAULTMINER: DISCOVERING UNKNOWN SOFTWARE DEFECTS USING STATIC ANALYSIS AND DATA MINING (2006) (2)
- Reactive redundancy for data destruction protection (R2D2) (2018) (2)
- ErsatzPasswords: ending password cracking (2015) (2)
- USACM's policy role (2009) (1)
- The Internet Worm Incident Technical Report CSD-TR-933 * (2007) (1)
- A digital investigation process model (2004) (1)
- Penetration Analysis of a XEROX Docucenter DC 230ST: Assessing the Security of a Multi-purpose Office Machine (1999) (1)
- The hidden meta-requirements of security and privacy (2001) (1)
- Response to Fred Cohen''s "contest (1992) (1)
- The Search for Optimality in Online Intrusion Response for a Distributed E- Commerce System (2007) (1)
- Improving software assurance using lightweight static analysis (2006) (1)
- Analysis : Identifying The Author of a Program (1)
- Security in Wireless Systems (2008) (1)
- Behavioral feature extraction for network anomaly detection (2005) (1)
- Risks and uncertainties in virtual worlds: an educators’ perspective (2013) (1)
- Audlib: a configurable, high‐fidelity application audit mechanism (2010) (1)
- USACM and U.S. legislation (2012) (1)
- Risks of total surveillance (2003) (1)
- Methods of integrating the study of ethics into the computer science curriculum (panel session) (1990) (1)
- Concepts in IP Security (2008) (1)
- Pilot Studies on Debugging Oracle Assistants (1993) (1)
- Understanding insiders: An analysis of risk-taking behavior (2010) (1)
- Notes on a storage manager for the Clouds kernel (1986) (1)
- Observing Reusable Password Choices Purdue Technical Report CSD – TR 92 – 049 (1992) (1)
- Covert Channels Can Be Useful ! – Layering Authentication Channels to Provide Covert Communication ? (2013) (1)
- CERIAS Tech Report 2005-137 Report to the President on Cyber Security: A Crisis of Prioritization (2005) (1)
- Some Musings on Ethics and Computer Break-Ins (2007) (1)
- Security Patch Management: The Process (2006) (1)
- CuPIDS enhances StUPIDS: exploring a co-processing paradigm shift in information system security (2005) (1)
- A Generic Virus Scanner in C + + Technical Report CSD – TR – 92 – 062 (1992) (1)
- Desert Island Books (2006) (1)
- Layering authentication channels to provide covert communication (2013) (1)
- Chapter 1 – Network Security Overview (2008) (1)
- I NTRUSION D ETECTION : H OW TO U TILIZE A S TILL I MMATURE T ECHNOLOGY (1999) (0)
- Hardening network embedded devices (2011) (0)
- Quantifying the vulnerability likelihood of software artifacts (2004) (0)
- Process Coloring: An Information Flow-Preserving Approach to Malware Investigation (2009) (0)
- Reconsidering the Risk of COTS Computing (1997) (0)
- Chapter 1 SOME CHALLENGES IN DIGITAL FORENSICS (2010) (0)
- Response to Feedback from NSF Site Visit Addendum to the Purdue Multimedia Support Infrastructure ( MSI ) Proposal # 9972883 (1999) (0)
- A Network Audit System for Host-based Intrusion Detection ( NASHID ) CERIAS (1999) (0)
- Editorial (2019) (0)
- In Memoriam (2022) (0)
- Trusted partnerships in an ethically-challenged world (2006) (0)
- A Report on a Joint Task Force of the Computer Society of the IEEE and the Association for Computing Machinery (1989) (0)
- Kernel structures for Clouds (1986) (0)
- From the Editor-in-Chief: Editorial (2010) (0)
- CLASSICAL IP AND ARP OVER ATM Christoph (2007) (0)
- In Memoriam: Edmund M. Clarke (1945–2020) (2021) (0)
- Blaming the victim (1997) (0)
- Chapter 8 – Mobile Security and Privacy (2008) (0)
- Further information on viruses (1990) (0)
- Balancing Privacy and Surveillance (2016) (0)
- The Cyber Security Crisis (2006) (0)
- Three Letters on Computer Security and Society (1991) (0)
- Chapter 3 – Security and Privacy Architecture (2008) (0)
- The password wall: a better defense against password exposure (2014) (0)
- Chapter 4 – Network Security Algorithms (2008) (0)
- Editorial (2011) (0)
- UNIX and Security: The Influences of History (1995) (0)
- Editorial (2012) (0)
- Editorial (2012) (0)
- Intrusion Detection: How to Utilize a Still Immature Technology (2000) (0)
- Chapter 2 – Network Attacks (2008) (0)
- Some observations on vulnerabilities (1997) (0)
- What star is star information security (2004) (0)
- A distributed requirements management framework for compliance (2006) (0)
- ACM Technical Standards Committee: a new advocacy power (1994) (0)
- Chapter 6 – IP Security in Practice (2008) (0)
- Keeping a Lock on Pandora's Box (1991) (0)
- Editorial (2011) (0)
- IC Online: Infosecurity Summit at the White House (2000) (0)
- Networking in the nineties (panel session) (1990) (0)
- Jack Minker (1927---2021) (2021) (0)
- Editorial for 30/8 (2011) (0)
- Editorial (2013) (0)
- CERIAS information security archive (2012) (0)
- Faster than Our Understanding (2016) (0)
- Audlib: a configurable, high-fidelity application audit mechanism (2010) (0)
- Editorial (2010) (0)
- An Integrated Architecture for Automatic Indication, Avoidance and Profiling of Kernel Rootkit Attacks (2014) (0)
- A mixed-strategy page replacement algorithm for a multiprogramming, virtual memory computer (1981) (0)
- Hacker Challenges in Security Product Testing (1996) (0)
- Editorial (2010) (0)
- Pr ecis: Research on Techniques and Tools for Computer Security: The COAST Project and Laboratory (1998) (0)
- Infosecurity Summit at the White House (2000) (0)
- Fran Allen (2020) (0)
- Connectivity provisioning with security attributes (2001) (0)
- Creating a Concept Map for ICS Security – A Delphi Study (2021) (0)
- Deception in computing: where and how it has been used (2015) (0)
- Tripwire: Pioneering Integrity Scanning for Cybersecurity (2022) (0)
- Experimental Designs : Testing a Debugging (1992) (0)
- Editorial (2014) (0)
- Vandalism or prank (1991) (0)
- Trust , Risk and Economic Benefits in Online Environments (2006) (0)
- Research on Techniques and Tools for Computer Security : The COAST Project and Laboratory Director : (1995) (0)
- A Secure Message Broadcast System ( SMBS ) (1997) (0)
- A Secure Message Broadcasting System (SMBS) (1996) (0)
- CERIAS Tech Report 2007-64 Happy Birthday, Dear Viruses (2007) (0)
- Embedded Sensors Project (ESP) (2003) (0)
- Information Superhighway or Road to Ruin? (1995) (0)
- Appendix A : Program Tested (2002) (0)
- Editorial (2012) (0)
- Computer Vandalism and the Law (1989) (0)
- Editorial (2011) (0)
- Dissemination of state information in distributed autonomous systems (1998) (0)
- Intrusion Detection Systems (IDSs): Implementation (2011) (0)
- Editorial (2012) (0)
- Oral history interview with Eugene H. Spafford (2013) (0)
- Monte Carlo Simulation on Software Mutation Test-Case Adequacy (1992) (0)
- In memoriam: Juris Hartmanis 1928--2022 (2022) (0)
- System Intrusions and Law Enforcement (1996) (0)
- Viruses-- A Form of Artificial Life ? (2013) (0)
This paper list is powered by the following services:
Other Resources About Gene Spafford
What Schools Are Affiliated With Gene Spafford?
Gene Spafford is affiliated with the following schools: