The SCEAS System
Navigation Menu

Search the dblp DataBase


R. Sekar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhenkai Liang, R. Sekar
    Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:215-224 [Conf]
  2. Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
    Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:182-191 [Conf]
  3. Zhenkai Liang, R. Sekar
    Fast and automated generation of attack signatures: a basis for building self-protecting servers. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:213-222 [Conf]
  4. R. Sekar, Ajay Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou
    Specification-based anomaly detection: a new approach for detecting network intrusions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:265-274 [Conf]
  5. R. Sekar, Y. Guang, S. Verma, T. Shanbhag
    A High-Performance Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:8-17 [Conf]
  6. V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar
    Provably Correct Runtime Enforcement of Non-interference Properties. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:332-351 [Conf]
  7. Wei Xu, V. N. Venkatakrishnan, R. Sekar, I. V. Ramakrishnan
    A Framework for Building Privacy-Conscious Composite Web Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:655-662 [Conf]
  8. R. Sekar, Thomas F. Bowen, Mark E. Segal
    On Preventing Intrusions by Process Behavior Monitoring. [Citation Graph (0, 0)][DBLP]
    Workshop on Intrusion Detection and Network Monitoring, 1999, pp:29-40 [Conf]
  9. V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang
    An Approach for Secure Software Installation. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:219-226 [Conf]
  10. K. Jain, R. Sekar
    User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  11. Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
    One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  12. R. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka
    Model-Carrying Code (MCC): a new paradigm for mobile-code security. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:23-30 [Conf]
  13. Ajay Gupta, R. Sekar
    An Approach for Detecting Self-propagating Email Using Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:55-72 [Conf]
  14. Prem Uppuluri, R. Sekar
    Experiences with Specification-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:172-189 [Conf]
  15. Wei Xu, Daniel C. DuVarney, R. Sekar
    An efficient and backwards-compatible transformation to ensure memory safety of C programs. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 2004, pp:117-126 [Conf]
  16. R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney
    Model-carrying code: a practical approach for safe execution of untrusted applications. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:15-28 [Conf]
  17. Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar
    Dataflow Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:48-62 [Conf]
  18. R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni
    A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:144-155 [Conf]
  19. Zhenkai Liang, R. Sekar, Daniel C. DuVarney
    Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:375-378 [Conf]
  20. Wei Xu, R. Sekar, I. V. Ramakrishnan, V. N. Venkatakrishnan
    An approach for realizing privacy-preserving web-based services. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:1014-1015 [Conf]
  21. Lixin Li, James E. Just, R. Sekar
    Address-Space Randomization for Windows Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:329-338 [Conf]

  22. Fast Packet Classification Using Condition Factorization. [Citation Graph (, )][DBLP]

  23. Online Signature Generation for Windows Systems. [Citation Graph (, )][DBLP]

  24. A practical mimicry attack against powerful system-call monitors. [Citation Graph (, )][DBLP]

  25. PAriCheck: an efficient pointer arithmetic checker for C programs. [Citation Graph (, )][DBLP]

  26. Efficient fine-grained binary instrumentationwith applications to taint-tracking. [Citation Graph (, )][DBLP]

  27. Data Space Randomization. [Citation Graph (, )][DBLP]

  28. On the Limits of Information Flow Techniques for Malware Analysis and Containment. [Citation Graph (, )][DBLP]

  29. Expanding Malware Defense by Securing Software Installations. [Citation Graph (, )][DBLP]

  30. Inferring Higher Level Policies from Firewall Rules. [Citation Graph (, )][DBLP]

  31. Fast Packet Classification for Snort by Native Compilation of Rules. [Citation Graph (, )][DBLP]

  32. An Efficient Black-box Technique for Defeating Web Application Attacks. [Citation Graph (, )][DBLP]

  33. Anomalous Taint Detection. [Citation Graph (, )][DBLP]

  34. The role of virtualization in computing education. [Citation Graph (, )][DBLP]

  35. Practical Proactive Integrity Preservation: A Basis for Malware Defense. [Citation Graph (, )][DBLP]

  36. V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002