Standout Papers

Improving security using extensible lightweight static analysis 2002 2026 2010 2018 148
  1. Improving security using extensible lightweight static analysis (2002)
    David Evans, David Larochelle IEEE Software

Citation Impact

Citing Papers

A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention
2003
TIED, LibsafePlus: tools for runtime buffer overflow protection
2004
Detecting format string vulnerabilities with type qualifiers
2001 Standout
Cyclone: A Safe Dialect of C
2002
Address obfuscation: an efficient approach to combat a board range of memory error exploits
2003
Type-Assisted Dynamic Buffer Overflow Detection
2002
A practical dynamic buffer overflow detector
2004
Using CQUAL for Static Analysis of Authorization Hook Placement
2002
Finding security vulnerabilities in java applications with static analysis
2005 Standout
High coverage detection of input-related security facults
2003
Secure, privacy-preserving and federated machine learning in medical imaging
2020 Standout
Classification of gapped symmetric phases in one-dimensional spin systems
2011
Quantum control of bosonic modes with superconducting circuits
2021 StandoutNobel
Quantum machine learning
2017 StandoutNature
Remote Entanglement by Coherent Multiplication of Concurrent Quantum Signals
2015 StandoutNobel
Quantum Metropolis sampling
2011 Nature
A variational eigenvalue solver on a photonic quantum processor
2014 Standout
Holonomic Quantum Control with Continuous Variable Systems
2016 StandoutNobel
Visualisation of wormholes in underwater sensor networks: a distributed approach
2007
Blockchain Technology in Healthcare: A Comprehensive Review and Directions for Future Research
2019 Standout
Hyperbolic evolution semigroups on vector valued function spaces
1994
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
2006
Survey of network-based defense mechanisms countering the DoS and DDoS problems
2007
DART
2005 Standout
A survey on internet of vehicles: Applications, security issues & solutions
2019 Standout
Literature review of Industry 4.0 and related technologies
2018 Standout
IoT security: Review, blockchain solutions, and open challenges
2017 Standout
Polymorphism of DRD2 gene and ADHD.
2007
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
2005 Standout
A Survey of 5G Network: Architecture and Emerging Technologies
2015 Standout
Utilizing Transfer Learning and Homomorphic Encryption in a Privacy Preserving and Secure Biometric Recognition System
2018
Time-Orthogonal Unitary Dilations and Noncommutative Feynman-Kac Formulae, II
1984
Quantum Ito's formula and stochastic evolutions
1984 Standout
The spectral mapping theorem for evolution semigroups on spaces of vector-valued functions
1996
A Conceptual Secure Blockchain Based Electronic Voting System
2017
Hybrid privacy-preserving clinical decision support system in fog–cloud computing
2017
Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
2017
Perception layer security in Internet of Things
2019
Number of Response Options, Reliability, Validity, and Potential Bias in the Use of the Likert Scale Education and Social Science Research: A Literature Review
2022 Standout
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
2010 Standout
Securing wireless sensor networks: a survey
2008
Security and Privacy Approaches in Mixed Reality
2019
CCured
2012
Static analysis for security
2004
Coping with type casts in C
1999
A note on symmetry reductions of the Lindblad equation: transport in constrained open spin chains
2012
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions
2016
Quantum simulation
2014 Standout
An Introduction to Random Matrices
2009 Standout
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum
2018
Classification of topological quantum matter with symmetries
2016 Standout
Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain
2022 Standout
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
2016 Standout
The Itô-Clifford integral
1982
On the quantum Feynman-Kac formula
1978
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
2015 Standout
A person centered work psychology: changing paradigms by broadening horizons
1996 Standout
A Survey on Metaverse: Fundamentals, Security, and Privacy
2022 Standout
An overview on smart contracts: Challenges, advances and platforms
2019 Standout
Countering code-injection attacks with instruction-set randomization
2003 Standout
Secure Multi-Party Computation: Theory, practice and applications
2018
Addition of certain non-commuting random variables
1986
Real Time Intrusion and Wormhole Attack Detection in Internet of Things
2015
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
2014
Symmetries and conserved quantities in Lindblad master equations
2014
Time-orthogonal unitary dilations and noncommutative Feynman-Kac formulae
1982
Secure integration of IoT and Cloud Computing
2016 Standout
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
2013 Standout
Limit laws for Random matrices and free products
1991
A new example of ‘independence’ and ‘white noise’
1990
Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges
2019 Standout
A Survey on Internet of Things and Cloud Computing for Healthcare
2019 Standout
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon
2015
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain
2022
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
2014
A Wormhole Attack Resistant Neighbor Discovery Scheme With RDMA Protocol for 60 GHz Directional Network
2013
Federated learning enabled digital twins for smart cities: Concepts, recent advances, and future directions
2022 Standout
Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends
2019 Standout
CloudID: Trustworthy cloud-based and cross-enterprise biometric identification
2015
On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
2013
Finite-temperature transport in one-dimensional quantum lattice models
2021
One-parameter semigroups for linear evolution equations
2001 Standout
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
2015
A review of applications in federated learning
2020
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
2014
Pair-cat codes: autonomous error-correction with low-order nonlinearity
2019 StandoutNobel
Molecular Genetics of Attention-Deficit/Hyperactivity Disorder
2005 Standout

Works of David Evans being referenced

Statically detecting likely buffer overflow vulnerabilities
2001
Reverse-engineering a cryptographic RFID tag
2008
Using Directional Antennas to Prevent Wormhole Attacks.
2004
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
2012
Dilations of Irreversible Evolutions in Algebraic Quantum Theory
1977
Efficient Privacy-Preserving Biometric Identification
2011
Faster Secure Two-Party Computation Using Garbled Circuits
2011
Static detection of dynamic memory errors
1996
Efficient Dynamic Searchable Encryption with Forward Privacy
2018
Predictability of IP Address Allocations for Cloud Computing Platforms
2019
Irreducible quantum dynamical semigroups
1977
Improving security using extensible lightweight static analysis
2002 Standout
Completely positive quasi-free maps on the CAR algebra
1979
Time dependent perturbations and scattering of strongly continuous groups on Banach spaces
1976
Spectral Properties of Positive Maps on C*-Algebras
1978
Election security: perception and reality
2004
On $O_n$
1980
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
2017
Rankless by CCL
2026