Возраст домена | 17 лет |
Дата окончания | Истек срок регистрации |
PR | 5 |
ИКС | 10 |
Страниц в Google | 66 |
Страниц в Яндексе | 2 |
Dmoz | Нет |
Яндекс Каталог | Нет |
Alexa Traffic Rank | 11765446 |
Alexa Country | Нет данных |
История изменения показателей | Авторизация |
Идет сбор информации... Обновить
Home Page of Professor Michael Franz, University of California, Irvine
Michael Franz, Full Professor, Computer Science, University of California, Irvine, UCI, language-based security, code compression, dynamic compilation, low-power compilation, programming languages, component-based software construction
Home Page of Professor Michael Franz, University of California, Irvine
ISO-8859-1
47.8 КБ
2 500
26 347 симв.
22 097 симв.
Данные предоставлены сервисом semrush
Сайт | Общие фразы | PR | тИЦ | Alexa Rank | Alexa Country | |
---|---|---|---|---|---|---|
![]() ![]() |
101 | 7 |
0 | 2395 | ![]() | |
![]() ![]() |
36 | 9 |
0 | 5 | ![]() | |
![]() |
30 | 7 |
0 | 717205 | ![]() | |
![]() ![]() |
29 | 6 |
0 | 630675 | ![]() | |
![]() ![]() |
28 | 9 |
0 | 11075 | ![]() | |
![]() ![]() |
24 | 6 |
0 | 240666 | ![]() | |
![]() ![]() |
24 | 9 |
0 | 3 | ![]() | |
![]() ![]() |
16 | 7 |
0 | 201 | ![]() | |
![]() ![]() |
15 | 10 |
0 | 11 | ![]() | |
![]() ![]() |
15 | 8 |
0 | 1574 | ![]() | |
![]() ![]() ![]() |
5 | 6 |
20 | 284 | ![]() | |
![]() |
1 | 8 |
0 | 17496 | ![]() | |
![]() ![]() |
1 | 8 |
0 | 3098 | ![]() | |
![]() |
1 | 5 |
0 | 3996 | ![]() | |
![]() |
1 | 4 |
0 | Нет данных | ![]() |
|
![]() |
1 | 4 |
0 | Нет данных | ![]() |
|
![]() ![]() |
1 | 8 |
0 | 44 | ![]() | |
![]() |
1 | 5 |
10 | 2804166 | ![]() | |
Еще 32 сайта после авторизации |
Данные предоставлены сервисом semrush
Внешние ссылки главной страницы ( 104 ) | |
google.com/search?q=franz&ie=UTF-8&oe=UTF-8 | <img> |
ssllab.org | Secure Systems and Software Laboratory |
ics.uci.edu/computerscience/ | Department of Computer Science |
eng.uci.edu/dept/eecs | Department of Electrical Engineering and Computer ... |
inf.ethz.ch/%7Ewirth | Niklaus Wirth |
ethz.ch/index_EN | Swiss Federal Institute of Technology, ETH Zurich |
acm.org/ | ACM |
ieee.org | IEEE |
ics.uci.edu/ | Donald Bren School of Information & Computer Sciences |
uci.edu/ | University of California, Irvine |
ics.uci.edu/~dean/aboutirvine.html | Irvine |
map125.ics.uci.edu/%7Emap125/CampusMap/main.php | CS Building, |
ics.uci.edu/about/visit/visit_icse.php | Suite 444 |
ieeexplore.ieee.org/document/8712444 | KALD: Detecting Direct Pointer Disclosure Vulnerabilities |
ieee-security.org/TC/SP2019/ | 2019 IEEE Symposium on Security and Privacy ("Oakland") |
ndss-symposium.org/ndss2019/attend/ | 2019 Network and Distributed Systems Security Symposium (NDSS 2019) |
doi.org/10.1145/3273045.3273050 | BinRec: Attack Surface Reduction Through Dynamic Binary Recovery |
dl.acm.org/citation.cfm?id=3273045 | 2018 Workshop on Forming an Ecosystem Around Software Transformation (FEAST '18), |
link.springer.com/chapter/10.1007/978-3-030-00470-5_16 | Hardware Assisted Randomization of Data |
raid2018.org/ | 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), |
link.springer.com/content/pdf/10.1007/978-3-030-00470-5_19.p... | PartiSan: Fast and Flexible Sanitization via Run-time Partitioning |
drops.dagstuhl.de/opus/volltexte/2018/9221/pdf/LIPIcs-ECOOP-... | Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization |
2016.ecoop.org/series/ecoop | ; |
link.springer.com/chapter/10.1007/978-3-319-93411-2_15 | Bytecode Corruption Attacks Are Real—And How To Defend Against Them |
dimva2018.org/ | , |
doi.ieeecomputersociety.org/10.1109/MSP.2018.2701161 | Making Multivariant Programming Practical and Inexpensive |
doi.org/10.1145/3129743.3129747 | Diversity and Information Leaks |
dl.acm.org/citation.cfm?id=3129743 | The Continuing Arms Race: Code-Reuse Attacks and Defenses |
usenix.org/system/files/conference/usenixsecurity17/sec17-bi... | Venerable Variadic Vulnerabilities Vanquished |
dl.acm.org/citation.cfm?id=3064178 | Taming Parallelism in a Multi-Variant Execution Environment |
eurosys2017.org/ | EuroSys 2017 |
dl.acm.org/citation.cfm?id=3054924 | Control-Flow Integrity P3: Protection, Precision, and Performance |
internetsociety.org/events/ndss-symposium/ndss-symposium-201... | 2017 Network and Distributed System Security Symposium (NDSS 2017), |
usenix.org/conference/atc16 | 2016 USENIX Annual Technical Conference (ATC 2016), |
dx.doi.org/10.1145/2866576 | Thinking Inside the Box: Compartmentalized Garbage Collection |
internetsociety.org/sites/default/files/blogs-media/leakage-... | Leakage-Resilient Layout Randomization for Mobile Devices |
internetsociety.org/events/ndss-symposium-2016 | 2016 Network and Distributed System Security Symposium (NDSS 2016), |
dx.doi.org/10.2200/S00686ED1V01Y201512SPT014 | Automated Software Diversity |
dx.doi.org/10.1145/2810103.2813682 | It's a TRAP: Table Randomization and Protection against Function Reuse Attacks |
dx.doi.org/10.1145/2810103.2813671 | Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks |
dx.doi.org/10.1145/2807426.2807435 | Efficient and Generic Event-based Profiler Framework for Dynamic Languages |
dx.doi.org/10.1145/2754169.2754185 | Safe and Efficient Hybrid Memory Management for Java |
doi.ieeecomputersociety.org/10.1109/TDSC.2015.2433252 | Large-scale Automated Software Diversity–Program Evolution Redux;" |
doi.ieeecomputersociety.org/10.1109/SP.2015.52 | Readactor: Practical Code Randomization Resilient to Memory Disclosure |
dx.doi.org/10.1109/MSP.2015.23 | Automatic Software Diversity |
dx.doi.org/10.14722/ndss.2015.23264 | Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity |
internetsociety.org/events/ndss-symposium-2015/ndss-2015-pro... | 2015 Network and Distributed System Security Symposium (NDSS 2015), |
dx.doi.org/10.14722/ndss.2015.23271 | Opaque Control Flow Integrity |
dx.doi.org/10.1145/2663474.2663485 | Software Profiling Options and Their Effects on Security Based Code Diversification |
csis.gmu.edu/MTD2014/ | First ACM Workshop on Moving Target Defense (MTD 2014) |
dx.doi.org/10.1145/2647508.2647524 | Comparing Points-to Static Analysis with Runtime Recorded Profiling Data |
2014.splashcon.org/track/oopsla2014 | , |
pppj2014.uck.pk.edu.pl/ | , |
dx.doi.org/10.1109/SP.2014.25 | SoK: Automated Software Diversity |
ieee-security.org/TC/SP2014/program.html | 35th IEEE Symposium on Security and Privacy |
dx.doi.org/10.1109/MSP.2013.129 | Security through Diversity: Are We There Yet? |
dx.doi.org/10.1145/2532642 | Efficient Hosted Interpreters on the JVM |
dl.acm.org/authorize?6963878 | Information Flow Tracking meets Just-In-Time Compilation |
hipeac.net/conference/vienna/paper_track_program | 9th International Conference on High-Performance and Embedded Architectures and Compilers (HiPEAC 2014), |
dl.acm.org/citation.cfm?id=2541228.2555295 | Information Flow Tracking meets Just-In-Time Compilation |
utdallas.edu/~Yvo.Desmedt/ISC/Accepted-Papers.html | 16th Information Security Conference (ISC 2013), |
dl.acm.org/authorize?6966467 | librando: Transparent Code Randomization for Just-in-Time Compilers |
dl.acm.org/authorize?6846737 | Efficient Interpreter Optimizations for the JVM |
dx.doi.org/10.1145/2535813.2535824 | Booby Trapping Software |
link.springer.com/chapter/10.1007/978-3-642-38908-5_12# | First-Class Labels: Using Information Flow to Debug Security Holes |
link.springer.com/chapter/10.1007/978-3-642-38908-5_14# | Towards Precise and Efficient Information Flow Control in Web Browsers;" |
dx.doi.org/10.1007/978-1-4614-5416-8_8 | Diversifying the Software Stack Using Randomized NOP Insertion |
springer.com/computer/security+and+cryptology/book/978-1-461... | Moving Target Defense II: Application of Game Theory and Adversarial Modeling |
dx.doi.org/10.1109/CGO.2013.6494997 | Profile-guided Automated Software Diversity |
usenix.org/conference/woot12/microgadgets-size-does-matter-t... | Microgadgets: Size Does Matter In Turing-complete Return-oriented Programming |
dl.acm.org/authorize?6612860 | Fine-Grained Modularity and Reuse of Virtual Machine Components |
dx.doi.org/10.1016/j.scico.2010.04.008 | Slimming a Java Virtual Machine by way of Cold Code Removal and Optimistic Partial Program Loading |
dl.acm.org/authorize?6594165 | The Impact of Optional Type Information on JIT Compilation Of Dynamically Typed Languages" |
dx.doi.org/10.1007/978-1-4614-0977-9_4 | Compiler-Generated Software Diversity |
springer.com/computer/security+and+cryptology/book/978-1-461... | Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats |
dl.acm.org/authorize?431947 | Compartmental Memory Management in a Modern Web Browser |
ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5714703 | Run-Time Defense against Code Injection Attacks using Replicated Execution |
ieee-security.org/TC/SP2020/ | 2020 IEEE Symposium on Security and Privacy ("Oakland") |
uni-goettingen.de/de/603140.html | German Computer Society Security Conference GI SICHERHEIT 2020 |
sigsac.org/ccs/CCS2019/ | 26th ACM Conference on Computer and Communications Security (ACM CCS 2019) |
conf.researchr.org/track/dls-2018/dls-2018 | 2018 Dynamic Languages Symposium (DLS18) |
sigsac.org/ccs/CCS2018/papers.html | 25th ACM Conference on Computer and Communications Security (ACM CCS 2018) |
secdev.ieee.org/2018/home | 2018 Secure Development Conference (SecDev 2018), |
wisa.or.kr/ | 19th World Conference on Information Security Applications (WISA 2018), |
conf.researchr.org/track/issta-2018/salad-2018-papers | First Workshop on Software Debloating and Delayering (SALAD '18) |
icdcs2018.ocg.at/ | 38th IEEE International Conference on Distributed Computing Systems (ICDCS 2018), |
sicherheit2018.in.htwg-konstanz.de/ | GI SICHERHEIT 2018 |
2017.middleware-conference.org/ | 2017 ACM/IFIP/USENIX International Middleware Conference (Middleware 2017), |
mtd-2017.mit.edu/ | 4rd ACM Workshop on Moving Target Defense (MTD-2017), |
secdev.ieee.org/2017/home/ | 2017 Secure Development Conference (SecDev), |
distrinet.cs.kuleuven.be/events/essos/2017/ | 2017 International Symposium on Engineering Secure Software and Systems (ESSoS'17), |
icdcs2017.gatech.edu/ | 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), |
asiaccs2017.com/ | 2017 ACM Asia Conference on Computer and Communications Security (ASIACCS 2017), |
computer.org/web/tdsc/about | IEEE Transactions on Dependable and Secure Computing |
onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X/home... | Software–Practice and Experience (Wiley), |
springer.com/computer/journal/450/PS2?detailsPage=editorialB... | Computer Science–Research and Development (Springer). |
google.com/patents/US9250937 | US9250937 |
google.com/patents/US8769511 | recently received a U.S. patent |
cnet.com/news/firefox-os-in-flux-as-mozilla-loses-technology... | Andreas Gal who was until recently CTO of Mozilla |
google.com/patents/US8392897 | US8392897 |
google.com/patents/US8239836 | US08239836 |
economist.com/news/science-and-technology/21602664-organisms... | Divided We Stand |
blog.mozilla.org/press/bios/andreas-gal/ | Andreas Gal |
recruit.ap.uci.edu/apply/JPF04111 | https://recruit.ap.uci.edu/apply/JPF04111 |
Внутренние ссылки главной страницы ( 5 ) | |
michaelfranz.com/prospectivestudents.html | specific information page |
w19cs241.html | CS241 |
michaelfranz.com/cv.pdf | (link to full CV) |
michaelfranz.com/Images/AwardH1.pdf | <img> |
michaelfranz.com/Images/AwardH2.pdf | <img> |
Domain Name: michaelfranz.com
Registry Domain ID:
Registrar WHOIS Server: whois.1und1.info
Registrar URL: http://1and1.com
Updated Date: 2013-09-19 00:00:00
Creation Date: 2006-09-19 00:00:00
Registrar Registration Expiration Date: 2014-09-19 00:00:00
Registrar: 1&1 Internet AG
Registrar IANA ID: 83
Registrar Abuse Contact Email: abuse@1and1.com
Registrar Abuse Contact Phone:
Reseller:
Domain Status: clientTransferProhibited
Registry Registrant ID:
Registrant Name: Michael Franz
Registrant Organization:
Registrant Street: 444 Computer Science
Registrant City: Irvine
Registrant State/Province: CA
Registrant Postal Code: 92697-3425
Registrant Country: US
Registrant Phone: +1.9498563013
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: franz@uci.edu
Registry Admin ID:
Admin Name: Michael Franz
Admin Organization:
Admin Street: 444 Computer Science
Admin City: Irvine
Admin State/Province: CA
Admin Postal Code: 92697-3425
Admin Country: US
Admin Phone: +1.9498563013
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: franz@uci.edu
Registry Tech ID:
Tech Name: Hostmaster ONEANDONE
Tech Organization: 1&1 Internet Inc.
Tech Street: 701 Lee Rd.
Tech City: Chesterbrook
Tech State/Province: PA
Tech Postal Code: 19087
Tech Country: US
Tech Phone: +1.8774612631
Tech Phone Ext:
Tech Fax: +1.6105601501
Tech Fax Ext:
Tech Email: hostmaster@1and1.com
Name Server: ns51.1and1.com
Name Server: ns52.1and1.com
>>> Last update of WHOIS database: 2014-04-28 12:20:35 <<<
США - 69.89.31.163
Unified Layer
Unified Layer
HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 48949
Connection: keep-alive
Keep-Alive: timeout=15
Date: Mon, 25 Nov 2019 21:26:12 GMT
Server: Apache
Last-Modified: Tue, 21 May 2019 00:51:36 GMT
ETag: "bf35-5895b40381600"
Accept-Ranges: bytes
Кнопка для анализа сайта в один клик, для установки перетащите ссылку на "Панель закладок"