Search the dblp DataBase
R. Sekar :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Zhenkai Liang , R. Sekar Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:215-224 [Conf ] Zhenkai Liang , V. N. Venkatakrishnan , R. Sekar Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:182-191 [Conf ] Zhenkai Liang , R. Sekar Fast and automated generation of attack signatures: a basis for building self-protecting servers. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:213-222 [Conf ] R. Sekar , Ajay Gupta , J. Frullo , T. Shanbhag , A. Tiwari , H. Yang , S. Zhou Specification-based anomaly detection: a new approach for detecting network intrusions. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:265-274 [Conf ] R. Sekar , Y. Guang , S. Verma , T. Shanbhag A High-Performance Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1999, pp:8-17 [Conf ] V. N. Venkatakrishnan , Wei Xu , Daniel C. DuVarney , R. Sekar Provably Correct Runtime Enforcement of Non-interference Properties. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:332-351 [Conf ] Wei Xu , V. N. Venkatakrishnan , R. Sekar , I. V. Ramakrishnan A Framework for Building Privacy-Conscious Composite Web Services. [Citation Graph (0, 0)][DBLP ] ICWS, 2006, pp:655-662 [Conf ] R. Sekar , Thomas F. Bowen , Mark E. Segal On Preventing Intrusions by Process Behavior Monitoring. [Citation Graph (0, 0)][DBLP ] Workshop on Intrusion Detection and Network Monitoring, 1999, pp:29-40 [Conf ] V. N. Venkatakrishnan , R. Sekar , T. Kamat , S. Tsipa , Zhenkai Liang An Approach for Secure Software Installation. [Citation Graph (0, 0)][DBLP ] LISA, 2002, pp:219-226 [Conf ] K. Jain , R. Sekar User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Weiqing Sun , Zhenkai Liang , V. N. Venkatakrishnan , R. Sekar One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] R. Sekar , C. R. Ramakrishnan , I. V. Ramakrishnan , Scott A. Smolka Model-Carrying Code (MCC): a new paradigm for mobile-code security. [Citation Graph (0, 0)][DBLP ] NSPW, 2001, pp:23-30 [Conf ] Ajay Gupta , R. Sekar An Approach for Detecting Self-propagating Email Using Anomaly Detection. [Citation Graph (0, 0)][DBLP ] RAID, 2003, pp:55-72 [Conf ] Prem Uppuluri , R. Sekar Experiences with Specification-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:172-189 [Conf ] Wei Xu , Daniel C. DuVarney , R. Sekar An efficient and backwards-compatible transformation to ensure memory safety of C programs. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 2004, pp:117-126 [Conf ] R. Sekar , V. N. Venkatakrishnan , Samik Basu , Sandeep Bhatkar , Daniel C. DuVarney Model-carrying code: a practical approach for safe execution of untrusted applications. [Citation Graph (0, 0)][DBLP ] SOSP, 2003, pp:15-28 [Conf ] Sandeep Bhatkar , Abhishek Chaturvedi , R. Sekar Dataflow Anomaly Detection. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:48-62 [Conf ] R. Sekar , M. Bendre , D. Dhurjati , P. Bollineni A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:144-155 [Conf ] Zhenkai Liang , R. Sekar , Daniel C. DuVarney Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2005, pp:375-378 [Conf ] Wei Xu , R. Sekar , I. V. Ramakrishnan , V. N. Venkatakrishnan An approach for realizing privacy-preserving web-based services. [Citation Graph (0, 0)][DBLP ] WWW (Special interest tracks and posters), 2005, pp:1014-1015 [Conf ] Lixin Li , James E. Just , R. Sekar Address-Space Randomization for Windows Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:329-338 [Conf ] Fast Packet Classification Using Condition Factorization. [Citation Graph (, )][DBLP ] Online Signature Generation for Windows Systems. [Citation Graph (, )][DBLP ] A practical mimicry attack against powerful system-call monitors. [Citation Graph (, )][DBLP ] PAriCheck: an efficient pointer arithmetic checker for C programs. [Citation Graph (, )][DBLP ] Efficient fine-grained binary instrumentationwith applications to taint-tracking. [Citation Graph (, )][DBLP ] Data Space Randomization. [Citation Graph (, )][DBLP ] On the Limits of Information Flow Techniques for Malware Analysis and Containment. [Citation Graph (, )][DBLP ] Expanding Malware Defense by Securing Software Installations. [Citation Graph (, )][DBLP ] Inferring Higher Level Policies from Firewall Rules. [Citation Graph (, )][DBLP ] Fast Packet Classification for Snort by Native Compilation of Rules. [Citation Graph (, )][DBLP ] An Efficient Black-box Technique for Defeating Web Application Attacks. [Citation Graph (, )][DBLP ] Anomalous Taint Detection. [Citation Graph (, )][DBLP ] The role of virtualization in computing education. [Citation Graph (, )][DBLP ] Practical Proactive Integrity Preservation: A Basis for Malware Defense. [Citation Graph (, )][DBLP ] V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments. [Citation Graph (, )][DBLP ] Search in 0.012secs, Finished in 0.015secs