default search action
Gary McGraw
Person information
- affiliation: Cigital Inc., Dulles, USA
- affiliation: George Mason University, Fairfax, Krasnow Institute for Advanced Study, USA
- affiliation: Indiana University Bloomington, Computer Science Department, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j117]Gary McGraw, Richie Bonett, Harold Figueroa, Katie McMahon:
23 Security Risks in Black-Box Large Language Model Foundation Models. Computer 57(4): 160-164 (2024) - 2020
- [j116]Gary McGraw, Richie Bonett, Victor Shepardson, Harold Figueroa:
The Top 10 Risks of Machine Learning Security. Computer 53(6): 57-61 (2020)
2010 – 2019
- 2019
- [j115]Gary McGraw, Richie Bonett, Harold Figueroa, Victor Shepardson:
Security Engineering for Machine Learning. Computer 52(8): 54-57 (2019) - 2018
- [j114]Gary McGraw:
The New Killer App for Security: Software Inventory. Computer 51(2): 60-62 (2018) - [j113]Gary McGraw:
Silver Bullet Talks with Wafaa Mamilli. IEEE Secur. Priv. 16(1): 6-9 (2018) - [j112]Gary McGraw:
Silver Bullet Talks with Craig Froelich. IEEE Secur. Priv. 16(2): 6-8 (2018) - [j111]Gary McGraw:
Silver Bullet Talks with Bruce Potter. IEEE Secur. Priv. 16(3): 12-14 (2018) - [j110]Gary McGraw:
Silver Bullet Talks with Nick Weaver. IEEE Secur. Priv. 16(4): 7-10 (2018) - [j109]Gary McGraw:
Silver Bullet Talks with Tanya Janca. IEEE Secur. Priv. 16(5): 7-11 (2018) - [j108]Gary McGraw:
Silver Bullet Talks With Kathleen Fisher [Interview]. IEEE Secur. Priv. 16(6): 4-9 (2018) - [j107]Laurie A. Williams, Gary McGraw, Sammy Migues:
Engineering Security Vulnerability Prevention, Detection, and Response. IEEE Softw. 35(5): 76-80 (2018) - [c16]Francesco Basile, Terry Moore, Chris Hill, Gary McGraw, Andrew Johnson:
Multi-frequency precise point positioning using GPS and Galileo data with smoothed ionospheric corrections. PLANS 2018: 1388-1398 - 2017
- [j106]Gary McGraw:
Six Tech Trends Impacting Software Security. Computer 50(5): 100-102 (2017) - [j105]Gary McGraw:
Silver Bullet Talks with Marie Moe. IEEE Secur. Priv. 15(1): 8-11 (2017) - [j104]Gary McGraw:
Silver Bullet Talks with Lesley Carhart. IEEE Secur. Priv. 15(2): 8-10 (2017) - [j103]Gary McGraw:
Silver Bullet Talks with Kate Pearce. IEEE Secur. Priv. 15(3): 6-9 (2017) - [j102]Gary McGraw:
Silver Bullet Talks with Kelly Lum. IEEE Secur. Priv. 15(4): 7-10 (2017) - [j101]Gary McGraw:
Silver Bullet Talks with Ksenia Dmitrieva-Peguero. IEEE Secur. Priv. 15(5): 7-9 (2017) - [j100]Gary McGraw:
Silver Bullet Talks with Nicole Perlroth. IEEE Secur. Priv. 15(6): 7-9 (2017) - 2016
- [j99]Gary McGraw:
Four Software Security Findings. Computer 49(1): 84-87 (2016) - [j98]Gary McGraw:
Silver Bullet Talks with Peiter (Mudge) Zatko. IEEE Secur. Priv. 14(1): 7-10 (2016) - [j97]Gary McGraw:
Silver Bullet Talks with Jamie Butler. IEEE Secur. Priv. 14(2): 8-10 (2016) - [j96]Gary McGraw:
Silver Bullet Talks with Jacob West. IEEE Secur. Priv. 14(3): 7-10 (2016) - [j95]Gary McGraw:
Silver Bullet Talks with Martin Hellman. IEEE Secur. Priv. 14(4): 7-11 (2016) - [j94]Gary McGraw:
Silver Bullet Talks with Jim Manico. IEEE Secur. Priv. 14(6): 3-5 (2016) - 2015
- [j93]Gary McGraw:
Silver Bullet Talks with Brian Krebs. IEEE Secur. Priv. 13(1): 7-11 (2015) - [j92]Gary McGraw:
Silver Bullet Talks with Whitfield Diffie. IEEE Secur. Priv. 13(2): 7-10 (2015) - [j91]Gary McGraw:
Silver Bullet Talks with L. Jean Camp. IEEE Secur. Priv. 13(3): 5-7 (2015) - [j90]Gary McGraw:
Silver Bullet Talks with Katie Moussouris. IEEE Secur. Priv. 13(4): 7-9 (2015) - [j89]Gary McGraw:
Silver Bullet Talks with Bart Preneel. IEEE Secur. Priv. 13(5): 8-10 (2015) - [j88]Gary McGraw:
Silver Bullet Talks with Steven M. Bellovin and Matthew Green. IEEE Secur. Priv. 13(6): 12-15 (2015) - 2014
- [j87]Gary McGraw:
Security Fatigue? Shift Your Paradigm. Computer 47(3): 81-83 (2014) - [j86]Gary McGraw:
Silver Bullet Talks with Jon Callas. IEEE Secur. Priv. 12(1): 6-8 (2014) - [j85]Gary McGraw:
Silver Bullet Talks with Matthew Green. IEEE Secur. Priv. 12(2): 7-10 (2014) - [j84]Gary McGraw:
Silver Bullet Talks with Yoshi Kohno. IEEE Secur. Priv. 12(3): 9-12 (2014) - [j83]Gary McGraw:
Silver Bullet Talks with Nate Fick. IEEE Secur. Priv. 12(4): 11-13 (2014) - [j82]Gary McGraw:
Silver Bullet Talks with Bart Miller. IEEE Secur. Priv. 12(5): 6-8 (2014) - [j81]Gary McGraw:
Silver Bullet Talks with the IEEE Center for Secure Design. IEEE Secur. Priv. 12(6): 9-12 (2014) - [c15]Gary McGraw:
Software security: a study in technology transfer. SPLASH (Companion Volume) 2014: 1 - [c14]Steven D. Fraser, Djenana Campara, Michael C. Fanning, Gary McGraw, Kevin J. Sullivan:
Privacy and security in a networked world. SPLASH (Companion Volume) 2014: 43-45 - 2013
- [j80]Gary McGraw:
Silver Bullet Talks with Per-Olof Persson. IEEE Secur. Priv. 11(1): 8-10 (2013) - [j79]Gary McGraw:
Silver Bullet Talks with Steve Bellovin. IEEE Secur. Priv. 11(2): 8-11 (2013) - [j78]Gary McGraw:
Silver Bullet Talks with Thomas Rid. IEEE Secur. Priv. 11(3): 8-10 (2013) - [j77]Gary McGraw:
Silver Bullet Talks with Gary Warzala. IEEE Secur. Priv. 11(4): 8-10 (2013) - [j76]Gary McGraw:
Silver Bullet Talks with Wenyuan Xu. IEEE Secur. Priv. 11(5): 8-10 (2013) - [j75]Gary McGraw:
Silver Bullet Talks with W. Hord Tipton. IEEE Secur. Priv. 11(6): 5-7 (2013) - 2012
- [j74]Gary McGraw:
Software Security - Building Security In. Datenschutz und Datensicherheit 36(9): 662-665 (2012) - [j73]Anup K. Ghosh, Gary McGraw:
Lost Decade or Golden Era: Computer Security since 9/11. IEEE Secur. Priv. 10(1): 6-10 (2012) - [j72]Gary McGraw:
Silver Bullet Talks with Neil Daswani. IEEE Secur. Priv. 10(2): 11-14 (2012) - [j71]Gary McGraw:
Silver Bullet Talks with Giovanni Vigna. IEEE Secur. Priv. 10(3): 9-11 (2012) - [j70]Gary McGraw:
Silver Bullet Talks with Randy Sabett. IEEE Secur. Priv. 10(4): 19-22 (2012) - [j69]Gary McGraw:
Silver Bullet Talks with Kay Connelly. IEEE Secur. Priv. 10(5): 5-7 (2012) - [j68]Gary McGraw:
Silver Bullet Talks with Howard Schmidt. IEEE Secur. Priv. 10(6): 9-12 (2012) - 2011
- [j67]Gary McGraw:
Silver Bullet Talks with Paul Kocher. IEEE Secur. Priv. 9(1): 8-11 (2011) - [j66]Gary McGraw:
Silver Bullet Talks with David Rice. IEEE Secur. Priv. 9(2): 8-11 (2011) - [j65]Gary McGraw:
Silver Bullet Talks with Ralph Langner. IEEE Secur. Priv. 9(3): 9-14 (2011) - [j64]Gary McGraw:
Silver Bullet Talks with John Savage. IEEE Secur. Priv. 9(4): 9-12 (2011) - [j63]Gary McGraw:
Silver Bullet Talks with Elinor Mills. IEEE Secur. Priv. 9(5): 9-12 (2011) - [j62]Gary McGraw:
Silver Bullet Talks with Halvar Flake. IEEE Secur. Priv. 9(6): 5-8 (2011) - [j61]Gary McGraw:
Technology Transfer: A Software Security Marketplace Case Study. IEEE Softw. 28(5): 9-11 (2011) - 2010
- [j60]Ann E. Kelley Sobel, Gary McGraw:
Interview: Software Security in the Real World. Computer 43(9): 47-53 (2010) - [j59]Gary McGraw:
Silver Bullet Talks with Christofer Hoff. IEEE Secur. Priv. 8(1): 8-10 (2010) - [j58]Gary McGraw:
Silver Bullet Talks with Gillian Hayes. IEEE Secur. Priv. 8(2): 5-7 (2010) - [j57]Gary McGraw:
Silver Bullet Talks with Steven Kent. IEEE Secur. Priv. 8(3): 5-9 (2010) - [j56]Gary McGraw:
Silver Bullet Talks with Richard Clarke. IEEE Secur. Priv. 8(4): 5-11 (2010) - [j55]Gary McGraw:
Silver Bullet Talks with Greg Morrisett. IEEE Secur. Priv. 8(5): 6-9 (2010) - [j54]Gary McGraw:
Silver Bullet Talks with Iván Arce. IEEE Secur. Priv. 8(6): 9-13 (2010) - [c13]Elizabeth Fong, Paul E. Black, Richard F. Leslie, Simson L. Garfinkel, Larry Wagoner, Gary McGraw, Jeff Williams:
Wouldn't it be nice to have software labels. SIGAda 2010: 31-32
2000 – 2009
- 2009
- [j53]Gary McGraw:
Silver Bullet Talks with Gunnar Peterson. IEEE Secur. Priv. 7(1): 7-11 (2009) - [j52]Gary McGraw:
Silver Bullet Talks with Jeremiah Grossman. IEEE Secur. Priv. 7(2): 10-14 (2009) - [j51]Gary McGraw, Ming Chow:
Guest Editors' Introduction: Securing Online Games: Safeguarding the Future of Software Security. IEEE Secur. Priv. 7(3): 11-12 (2009) - [j50]Gary McGraw:
Silver Bullet Talks with Virgil Gligor. IEEE Secur. Priv. 7(4): 11-14 (2009) - [j49]Gary McGraw:
Silver Bullet Talks with Bob Blakley. IEEE Secur. Priv. 7(5): 5-8 (2009) - [j48]Gary McGraw:
Silver Bullet Talks with Fred Schneider. IEEE Secur. Priv. 7(6): 5-7 (2009) - 2008
- [j47]Gary McGraw:
Automated Code Review Tools for Security. Computer 41(12): 108-111 (2008) - [j46]Gary McGraw:
Silver BulletTalks with Eugene Spafford. IEEE Secur. Priv. 6(1): 10-15 (2008) - [j45]Gary McGraw:
Silver Bullet Talks with Ed Amoroso. IEEE Secur. Priv. 6(2): 6-9 (2008) - [j44]Gary McGraw:
Silver Bullet Talks with Jon Swartz. IEEE Secur. Priv. 6(3): 9-11 (2008) - [j43]Gary McGraw:
Silver Bullet Talks with Adam Shostack. IEEE Secur. Priv. 6(4): 6-10 (2008) - [j42]Gary McGraw:
Silver Bullet Talks with Bill Cheswick [Interview]. IEEE Secur. Priv. 6(5): 7-11 (2008) - [j41]Gary McGraw:
Silver Bullet Talks with Matt Bishop. IEEE Secur. Priv. 6(6): 6-10 (2008) - 2007
- [j40]Gary McGraw:
Silver Bullet Speaks with John Stewart [Interview]. IEEE Secur. Priv. 5(1): 9-11 (2007) - [j39]Gary McGraw:
Silver Bullet Speaks with Dorothy Denning. IEEE Secur. Priv. 5(2): 11-14 (2007) - [j38]Gary McGraw:
Silver Bullet Talks with Becky Bace. IEEE Secur. Priv. 5(3): 6-9 (2007) - [j37]Gary McGraw, Ross J. Anderson:
Silver Bullet Talks with Ross Anderson. IEEE Secur. Priv. 5(4): 10-13 (2007) - [j36]Gary McGraw:
Silver Bullet Talks with Annie Antón. IEEE Secur. Priv. 5(5): 8-11 (2007) - [j35]Gary McGraw, Greg Hoglund:
Online Games and Security. IEEE Secur. Priv. 5(5): 76-79 (2007) - [j34]Gary McGraw:
Silver Bullet Talks with Mikko Hypponen [Interview]. IEEE Secur. Priv. 5(6): 8-11 (2007) - [j33]Gary McGraw, Rik Farrow:
Exploiting Online Games: An Interview. login Usenix Mag. 32(6) (2007) - [c12]Gary McGraw:
Exploiting Online Games. USENIX ATC 2007 - 2006
- [j32]Jeremy Epstein, Scott R. Matsumoto, Gary McGraw:
Software Security and SOA: Danger, Will Robinson! IEEE Secur. Priv. 4(1): 80-83 (2006) - [j31]Gary McGraw:
Silver Bullet Speaks to Avi Rubin. IEEE Secur. Priv. 4(3): 11-13 (2006) - [j30]Gary McGraw:
Silver Bullet Speaks with Dan Geer. IEEE Secur. Priv. 4(4): 10-13 (2006) - [j29]Gary McGraw:
Interview: Silver Bullet Speaks to Marcus Ranum. IEEE Secur. Priv. 4(5): 11-14 (2006) - [j28]Gary McGraw:
Silver Bullet Speaks with Ed Felten. IEEE Secur. Priv. 4(6): 10-13 (2006) - [c11]Gary McGraw:
Software Security: Building Security In. ISSRE 2006: 6 - 2005
- [j27]Brad Arkin, Scott Stender, Gary McGraw:
Software Penetration Testing. IEEE Secur. Priv. 3(1): 84-87 (2005) - [j26]Sean Barnum, Gary McGraw:
Knowledge for Software Security. IEEE Secur. Priv. 3(2): 74-78 (2005) - [j25]Dan Taylor, Gary McGraw:
Adopting a Software Security Improvement Program. IEEE Secur. Priv. 3(3): 88-91 (2005) - [j24]Nancy R. Mead, Gary McGraw:
A Portal for Software Security. IEEE Secur. Priv. 3(4): 75-79 (2005) - [j23]Kenneth R. van Wyk, Gary McGraw:
Bridging the Gap between Software Development and Information Security. IEEE Secur. Priv. 3(5): 75-79 (2005) - [j22]Katrina Tsipenyuk, Brian Chess, Gary McGraw:
Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors. IEEE Secur. Priv. 3(6): 81-84 (2005) - 2004
- [j21]Gary McGraw:
Software Security. IEEE Secur. Priv. 2(2): 80-83 (2004) - [j20]Noopur Davis, Watts S. Humphrey, Samuel T. Redwine Jr., Gerlinde Zibulski, Gary McGraw:
Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report. IEEE Secur. Priv. 2(3): 18-25 (2004) - [j19]Paco Hope, Gary McGraw, Annie I. Antón:
Misuse and Abuse Cases: Getting Past the Positive. IEEE Secur. Priv. 2(3): 90-92 (2004) - [j18]Iván Arce, Gary McGraw:
Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. IEEE Secur. Priv. 2(4): 17-19 (2004) - [j17]Denis Verdon, Gary McGraw:
Risk Analysis in Software Design. IEEE Secur. Priv. 2(4): 79-84 (2004) - [j16]Gary McGraw, Bruce Potter:
Software Security Testing. IEEE Secur. Priv. 2(5): 81-85 (2004) - [j15]Brian Chess, Gary McGraw:
Static Analysis for Security. IEEE Secur. Priv. 2(6): 76-79 (2004) - [c10]Gary McGraw:
Software Security Clue Distribution. CSEE&T 2004: 6-7 - [c9]Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan:
Security as a new dimension in embedded system design. DAC 2004: 753-760 - [c8]Gary McGraw:
Exploiting Software. USENIX Security Symposium 2004 - 2003
- [j14]Gary McGraw:
From the Ground Up: The DIMACS Software Security Workshop. IEEE Secur. Priv. 1(2): 59-66 (2003) - 2002
- [j13]Gary McGraw:
On Bricks and Walls: Why Building Secure Software is Hard. Comput. Secur. 21(3): 229-238 (2002) - [j12]Gary McGraw:
Managing Software Security Risks. Computer 35(4): 99-101 (2002) - [j11]Greg Hoglund, Gary McGraw:
Point/Counterpoint: Security Band-Aids: More Cost-Effective than "Secure" Coding / Building Secure Software: Better than Protecting Bad Software. IEEE Softw. 19(6): 56-59 (2002) - [j10]John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw:
Token-based scanning of source code for security problems. ACM Trans. Inf. Syst. Secur. 5(3): 238-261 (2002) - 2001
- [j9]Christoph C. Michael, Gary McGraw, Michael Schatz:
Generating Software Test Data by Evolution. IEEE Trans. Software Eng. 27(12): 1085-1110 (2001) - 2000
- [j8]Ross J. Anderson, Terry Bollinger, Doug Brown, Enrique Draier, Philip Machanick, Gary McGraw, Nancy R. Mead, Arthur B. Pyster, Howard Schmidt, Timothy J. Shimeall:
Roundtable on Information Security Policy. IEEE Softw. 17(5): 26-32 (2000) - [j7]Gary McGraw, J. Gregory Morrisett:
Attacking Malicious Code: A Report to the Infosec Research Council. IEEE Softw. 17(5): 33-41 (2000) - [j6]John Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten:
Statically Scanning Java Code: Finding Security Vulnerabilities. IEEE Softw. 17(5): 68-77 (2000) - [c7]John Viega, J. T. Bloch, Y. Kohno, Gary McGraw:
ITS4: A Static Vulnerability Scanner for C and C++ Code. ACSAC 2000: 257- - [c6]Gary McGraw:
Will Openish Source Really Improve Security. S&P 2000: 128-129
1990 – 1999
- 1999
- [j5]Gary McGraw:
Software Assurence for Security. Computer 32(4): 103-105 (1999) - 1998
- [j4]Gary McGraw, Edward W. Felten:
Mobile Code and Security - Guest Editors' Introduction. IEEE Internet Comput. 2(6): 26-29 (1998) - [c5]Christoph C. Michael, Gary McGraw:
Automated Software Test Data Generation for Complex Programs. ASE 1998: 136-146 - [c4]Gary McGraw:
Weak links in e-commerce security: examples from the field. NDSS 1998 - [c3]Anup K. Ghosh, Tom O'Connor, Gary McGraw:
An Automated Approach for Identifying Potential Vulnerabilities in Software. S&P 1998: 104-114 - 1997
- [b1]Gary McGraw, Edward W. Felten:
Java security - hostile applets, holes and antidotes: what every netscape and internet explorer user needs to know. Wiley 1997, ISBN 978-0-471-17842-2, pp. I-XIV, 1-192 - [j3]Jeffrey M. Voas, Gary McGraw, Lora Kassab, Larry Voas:
A 'Crystal Ball' for Software Liability. Computer 30(6): 29-36 (1997) - [j2]Jeffrey M. Voas, Frank Charron, Gary McGraw, Keith W. Miller, Michael Friedman:
Predicting How Badly "Good" Software Can Behave. IEEE Softw. 14(4): 73-83 (1997) - [c2]Christoph C. Michael, Gary E. McGraw Jr., Michael Schatz, C. C. Walton:
Genetic Algorithms for Dynamic Test Data Generation. ASE 1997: 307-308 - 1993
- [j1]Sushil J. Louis, Gary McGraw, Richard O. Wyckoff:
Case-based reasoning assisted explanation of genetic algorithm results. J. Exp. Theor. Artif. Intell. 5(1): 21-37 (1993) - [c1]Gary McGraw, Douglas Hofstadter:
Letter Spirit: An Architecture for Creativity in an Microdomain. AI*IA 1993: 65-70
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint