{"id":"https://openalex.org/W1947347140","doi":"https://doi.org/10.1109/secpri.2004.1301324","title":"Formalizing sensitivity in static analysis for intrusion detection","display_name":"Formalizing sensitivity in static analysis for intrusion detection","publication_year":2004,"publication_date":"2004-06-10","ids":{"openalex":"https://openalex.org/W1947347140","doi":"https://doi.org/10.1109/secpri.2004.1301324","mag":"1947347140"},"language":"en","primary_location":{"id":"doi:10.1109/secpri.2004.1301324","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secpri.2004.1301324","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055626955","display_name":"H.H. Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I177605424","display_name":"Amherst College","ror":"https://ror.org/028vqfs63","country_code":"US","type":"education","lineage":["https://openalex.org/I177605424"]},{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Henry Hanping Feng","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA","Dept. of Electr. & Comput. Eng., Massachusetts-Amherst Univ., Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Massachusetts-Amherst Univ., Amherst, MA, USA","institution_ids":["https://openalex.org/I177605424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109182904","display_name":"Jon Giffin","orcid":null},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]},{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J.T. Giffin","raw_affiliation_strings":["Computer Sciences Department, University of Wisconsin, Madison, USA","University of Massachusetts: Amherst#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, University of Wisconsin, Madison, USA","institution_ids":["https://openalex.org/I135310074"]},{"raw_affiliation_string":"University of Massachusetts: Amherst#TAB#","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111611591","display_name":"Yong Yi Huang","orcid":"https://orcid.org/0009-0002-0781-4982"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]},{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yong Huang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA","University of Wisconsin, Madison"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"University of Wisconsin, Madison","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015261020","display_name":"Sanjay Jha","orcid":"https://orcid.org/0000-0002-1844-1520"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Jha","raw_affiliation_strings":["Computer Sciences Department, University of Wisconsin, Madison, USA","University of Wisconsin, Madison"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, University of Wisconsin, Madison, USA","institution_ids":["https://openalex.org/I135310074"]},{"raw_affiliation_string":"University of Wisconsin, Madison","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047140382","display_name":"Wenke Lee","orcid":"https://orcid.org/0000-0003-2761-1277"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]},{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenke Lee","raw_affiliation_strings":["College of Computing, Georgia Institute of Technology, USA","University of Wisconsin, Madison"],"affiliations":[{"raw_affiliation_string":"College of Computing, Georgia Institute of Technology, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"University of Wisconsin, Madison","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010187794","display_name":"Barton P. Miller","orcid":"https://orcid.org/0000-0002-9435-8315"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]},{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"B.P. Miller","raw_affiliation_strings":["Computer Sciences Department, University of Wisconsin, Madison, USA","[Georgia Institute of Technology.]"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, University of Wisconsin, Madison, USA","institution_ids":["https://openalex.org/I135310074"]},{"raw_affiliation_string":"[Georgia Institute of Technology.]","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5055626955"],"corresponding_institution_ids":["https://openalex.org/I177605424","https://openalex.org/I24603500"],"apc_list":null,"apc_paid":null,"fwci":14.9572,"has_fulltext":false,"cited_by_count":162,"citation_normalized_percentile":{"value":0.98988473,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"194","last_page":"208"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8263635635375977},{"id":"https://openalex.org/keywords/automaton","display_name":"Automaton","score":0.6224294900894165},{"id":"https://openalex.org/keywords/determinism","display_name":"Determinism","score":0.5951426029205322},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.5723696351051331},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5075725317001343},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.4901069104671478},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.461712121963501},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4580281376838684},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.43888407945632935},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43791693449020386},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4108266830444336},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3824869394302368},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36015206575393677},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.243668794631958},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20223358273506165}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8263635635375977},{"id":"https://openalex.org/C112505250","wikidata":"https://www.wikidata.org/wiki/Q787116","display_name":"Automaton","level":2,"score":0.6224294900894165},{"id":"https://openalex.org/C192183473","wikidata":"https://www.wikidata.org/wiki/Q131133","display_name":"Determinism","level":2,"score":0.5951426029205322},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.5723696351051331},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5075725317001343},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.4901069104671478},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.461712121963501},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4580281376838684},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.43888407945632935},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43791693449020386},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4108266830444336},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3824869394302368},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36015206575393677},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.243668794631958},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20223358273506165},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.1109/secpri.2004.1301324","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secpri.2004.1301324","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarworks.umass.edu:biology_faculty_pubs-1327","is_oa":false,"landing_page_url":"https://scholarworks.umass.edu/biology_faculty_pubs/328","pdf_url":null,"source":{"id":"https://openalex.org/S4306402057","display_name":"Scholarworks (University of Massachusetts Amherst)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I24603500","host_organization_name":"University of Massachusetts Amherst","host_organization_lineage":["https://openalex.org/I24603500"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Biology Department Faculty Publication Series","raw_type":"text"},{"id":"pmh:ADA449050","is_oa":false,"landing_page_url":"http://oai.dtic.mil/oai/oai?&amp;verb=getRecord&amp;metadataPrefix=html&amp;identifier=ADA449050","pdf_url":null,"source":{"id":"https://openalex.org/S4406923043","display_name":"Defense Technical Information Center (DTIC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"DTIC","raw_type":"Text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.138.7694","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.7694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.wisc.edu/~jha/jha-papers/security/oakland_2004.ps","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.4.930","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.930","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.wisc.edu/wisa/papers/oakland04/oakland.ps","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.78.201","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.201","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.wisc.edu/wisa/papers/oakland04/oakland.pdf","raw_type":"text"},{"id":"pmh:oai:scholarworks.umass.edu:20.500.14394/3996","is_oa":false,"landing_page_url":"https://hdl.handle.net/20.500.14394/3996","pdf_url":null,"source":{"id":"https://openalex.org/S4306402057","display_name":"Scholarworks (University of Massachusetts Amherst)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I24603500","host_organization_name":"University of Massachusetts Amherst","host_organization_lineage":["https://openalex.org/I24603500"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"published","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306084","display_name":"U.S. Department of Energy","ror":"https://ror.org/01bj3aw27"},{"id":"https://openalex.org/F4320309321","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W34732858","https://openalex.org/W123548525","https://openalex.org/W1490025813","https://openalex.org/W1516506771","https://openalex.org/W1590452455","https://openalex.org/W1592090113","https://openalex.org/W1600911019","https://openalex.org/W1603576379","https://openalex.org/W1884606608","https://openalex.org/W1941427975","https://openalex.org/W2002089154","https://openalex.org/W2003250112","https://openalex.org/W2040183246","https://openalex.org/W2082600559","https://openalex.org/W2101936540","https://openalex.org/W2106649514","https://openalex.org/W2107409339","https://openalex.org/W2123886726","https://openalex.org/W2129860818","https://openalex.org/W2135143063","https://openalex.org/W2141992351","https://openalex.org/W2143776233","https://openalex.org/W2167332015","https://openalex.org/W2170973665","https://openalex.org/W3136767761","https://openalex.org/W4302339081","https://openalex.org/W6601390447","https://openalex.org/W6604982192","https://openalex.org/W6629285517","https://openalex.org/W6635292869","https://openalex.org/W6635409250","https://openalex.org/W6635828606","https://openalex.org/W6639223989","https://openalex.org/W6681189232","https://openalex.org/W7075344471"],"related_works":["https://openalex.org/W2122524456","https://openalex.org/W2480576757","https://openalex.org/W2375512239","https://openalex.org/W2064696082","https://openalex.org/W2795587724","https://openalex.org/W2371594944","https://openalex.org/W1951127287","https://openalex.org/W2153545578","https://openalex.org/W2135849267","https://openalex.org/W2058305829"],"abstract_inverted_index":{"A":[0],"key":[1],"function":[2],"of":[3,86,93,112,144],"a":[4,41,82],"host-based":[5],"intrusion":[6],"detection":[7],"system":[8],"is":[9],"to":[10,61,64,129,150],"monitor":[11],"program":[12,125,131],"execution.":[13],"Models":[14],"constructed":[15],"using":[16],"static":[17],"analysis":[18,84],"have":[19],"the":[20,49,91,100,113,116,124,167],"highly":[21],"desirable":[22],"feature":[23],"that":[24,136,154,172],"they":[25,32],"do":[26],"not":[27,158],"produce":[28],"false":[29],"alarms;":[30],"however,":[31],"may":[33],"still":[34],"miss":[35],"attacks.":[36],"Prior":[37],"work":[38],"has":[39],"shown":[40],"trade-off":[42],"between":[43],"efficiency":[44,156],"and":[45,89,95,115,126,170],"precision.":[46,163],"In":[47,69],"particular,":[48],"more":[50,176],"accurate":[51],"models":[52,88,141,169],"based":[53],"upon":[54],"pushdown":[55],"automata":[56],"(PDA)":[57],"are":[58,175],"very":[59],"inefficient":[60],"operate":[62],"due":[63],"non-determinism":[65],"in":[66,137],"stack":[67,110],"activity.":[68],"this":[70],"paper,":[71],"we":[72],"present":[73,99],"techniques":[74],"for":[75,161],"determinizing":[76],"PDA":[77,87,174,180],"models.":[78],"We":[79,97,164],"first":[80],"provide":[81],"formal":[83],"framework":[85],"introduce":[90],"concepts":[92],"determinism":[94,105],"stack-determinism.":[96],"then":[98],"VP-Static":[101],"model,":[102,118],"which":[103,119],"achieves":[104,120],"by":[106,122,148],"extracting":[107],"information":[108],"about":[109],"activity":[111],"program,":[114],"Dyck":[117],"stack-determinism":[121],"transforming":[123],"inserting":[127],"code":[128],"expose":[130],"state.":[132],"Our":[133],"results":[134],"show":[135],"run-time":[138],"monitoring,":[139],"our":[140,145],"slow":[142],"execution":[143],"test":[146],"programs":[147],"1%":[149],"135%.":[151],"This":[152],"shows":[153],"reasonable":[155],"needs":[157],"be":[159],"sacrificed":[160],"model":[162],"also":[165],"compare":[166],"two":[168],"discover":[171],"deterministic":[173],"efficient,":[177],"although":[178],"stack-deterministic":[179],"require":[181],"less":[182],"memory.":[183]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":13},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":11},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
