|
Search the dblp DataBase
Somesh Jha:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Somesh Jha, Prasad Chalasani, Onn Shehory, Katia P. Sycara
A Formal Treatment of Distributed Matchmaking. [Citation Graph (1, 0)][DBLP] Agents, 1998, pp:457-458 [Conf]
- Shai Rubin, Somesh Jha, Barton P. Miller
Automatic Generation and Analysis of NIDS Attacks. [Citation Graph (0, 0)][DBLP] ACSAC, 2004, pp:28-38 [Conf]
- Prasad Chalasani, Somesh Jha, Onn Shehory, Katia P. Sycara
Query Restart Strategies for Web Agent. [Citation Graph (0, 0)][DBLP] Agents, 1998, pp:124-131 [Conf]
- Onn Shehory, Katia P. Sycara, Prasad Chalasani, Somesh Jha
Increasing Resource Utilization and Task Performance by Agent Cloning. [Citation Graph (0, 0)][DBLP] ATAL, 1998, pp:413-426 [Conf]
- Onn Shehory, Katia P. Sycara, Somesh Jha
Multi-Agent Coordination through Coalition Formation. [Citation Graph (0, 0)][DBLP] ATAL, 1997, pp:143-154 [Conf]
- Edmund M. Clarke, E. Allen Emerson, Somesh Jha, A. Prasad Sistla
Symmetry Reductions inModel Checking. [Citation Graph (0, 0)][DBLP] CAV, 1998, pp:147-158 [Conf]
- Edmund M. Clarke, Thomas Filkorn, Somesh Jha
Exploiting Symmetry In Temporal Logic Model Checking. [Citation Graph (0, 0)][DBLP] CAV, 1993, pp:450-462 [Conf]
- Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith
Counterexample-Guided Abstraction Refinement. [Citation Graph (0, 0)][DBLP] CAV, 2000, pp:154-169 [Conf]
- David E. Long, Anca Browne, Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
An Improved Algorithm for the Evaluation of Fixpoint Expressions. [Citation Graph (0, 0)][DBLP] CAV, 1994, pp:338-350 [Conf]
- Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek
Buffer overrun detection using linear programming and static analysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:345-354 [Conf]
- Vinod Ganapathy, Trent Jaeger, Somesh Jha
Automatic placement of authorization hooks in the linux security modules framework. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:330-339 [Conf]
- Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
Secure function evaluation with ordered binary decision diagrams. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:410-420 [Conf]
- Shai Rubin, Somesh Jha, Barton P. Miller
Protomatching network traffic for high throughputnetwork intrusion detection. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:47-58 [Conf]
- Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Helmut Veith, Dong Wang
Using Combinatorial Optimization Methods for Quantification Scheduling. [Citation Graph (0, 0)][DBLP] CHARME, 2001, pp:293-309 [Conf]
- Edmund M. Clarke, Somesh Jha, Yuan Lu, Dong Wang
Abstract BDDs: A Technque for Using Abstraction in Model Checking. [Citation Graph (0, 0)][DBLP] CHARME, 1999, pp:172-186 [Conf]
- Edmund M. Clarke, Orna Grumberg, Hiromi Hiraishi, Somesh Jha, David E. Long, Kenneth L. McMillan, Linda A. Ness
Verification of the Futurebus+ Cache Coherence Protocol. [Citation Graph (0, 0)][DBLP] CHDL, 1993, pp:15-30 [Conf]
- Prasad Chalasani, Somesh Jha, Onn Shehory, Katia P. Sycara
Strategies for Querying Information Agents. [Citation Graph (0, 0)][DBLP] CIA, 1998, pp:94-107 [Conf]
- Edmund M. Clarke, Orna Grumberg, Somesh Jha
Veryfying Parameterized Networks using Abstraction and Regular Languages. [Citation Graph (0, 0)][DBLP] CONCUR, 1995, pp:395-407 [Conf]
- Somesh Jha, Thomas W. Reps
Analysis of SPKI/SDSI Certificates Using Model Checking. [Citation Graph (0, 0)][DBLP] CSFW, 2002, pp:129-0 [Conf]
- Somesh Jha, Oleg Sheyner, Jeannette M. Wing
Two Formal Analys s of Attack Graphs. [Citation Graph (0, 0)][DBLP] CSFW, 2002, pp:49-63 [Conf]
- Somesh Jha, Kymie M. C. Tan, Roy A. Maxion
Markov Chains, Classifiers, and Intrusion Detection. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:206-219 [Conf]
- Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine
On Generalized Authorization Problems. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:202-0 [Conf]
- Shai Rubin, Somesh Jha, Barton P. Miller
On the Completeness of Attack Mutation Algorithms. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:43-56 [Conf]
- Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith
Progress on the State Explosion Problem in Model Checking. [Citation Graph (0, 0)][DBLP] Informatics, 2001, pp:176-194 [Conf]
- Somesh Jha, Louis Kruger, Patrick McDaniel
Privacy Preserving Clustering. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:397-417 [Conf]
- Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine
Reducing the Dependence of SPKI/SDSI on PKI. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:156-173 [Conf]
- Muthian Sivathanu, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Somesh Jha
A Logic of File Systems. [Citation Graph (0, 0)][DBLP] FAST, 2005, pp:- [Conf]
- Prasad Chalasani, Somesh Jha, Isaac Saias
Approximate Option Pricing. [Citation Graph (0, 0)][DBLP] FOCS, 1996, pp:244-253 [Conf]
- Somesh Jha, Jens Palsberg, Tian Zhao
Efficient Type Matching. [Citation Graph (0, 0)][DBLP] FoSSaCS, 2002, pp:187-204 [Conf]
- Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Thomas R. Shiple, Helmut Veith, Dong Wang
Non-linear Quantification Scheduling in Image Computation. [Citation Graph (0, 0)][DBLP] ICCAD, 2001, pp:293-0 [Conf]
- Somesh Jha, Yuan Lu, Marius Minea, Edmund M. Clarke
Equivalence Checking Using Abstract BDDs. [Citation Graph (0, 0)][DBLP] ICCD, 1997, pp:332-337 [Conf]
- Onn Shehory, Katia P. Sycara, Prasad Chalasani, Somesh Jha
Agent Cloning. [Citation Graph (0, 0)][DBLP] ICMAS, 1998, pp:463-464 [Conf]
- Alexis Campailla, Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith
Efficient Filtering in Publish-Subscribe Systems Using Binary Decision. [Citation Graph (0, 0)][DBLP] ICSE, 2001, pp:443-452 [Conf]
- Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith
Modular Verification of Software Components in C. [Citation Graph (0, 0)][DBLP] ICSE, 2003, pp:385-395 [Conf]
- Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant
Automatic discovery of API-level exploits. [Citation Graph (0, 0)][DBLP] ICSE, 2005, pp:312-321 [Conf]
- Somesh Jha, Jeannette M. Wing
Survivability Analysis of Network Systems. [Citation Graph (0, 0)][DBLP] ICSE, 2001, pp:307-317 [Conf]
- Vinod Ganapathy, David King, Trent Jaeger, Somesh Jha
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. [Citation Graph (0, 0)][DBLP] ICSE, 2007, pp:458-467 [Conf]
- Mihai Christodorescu, Somesh Jha
Testing malware detectors. [Citation Graph (0, 0)][DBLP] ISSTA, 2004, pp:34-44 [Conf]
- Edmund M. Clarke, Somesh Jha, Yuan Lu, Helmut Veith
Tree-Like Counterexamples in Model Checking. [Citation Graph (0, 0)][DBLP] LICS, 2002, pp:19-29 [Conf]
- Jonathon T. Giffin, Somesh Jha, Barton P. Miller
Efficient Context-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Vinod Yegneswaran, Paul Barford, Somesh Jha
Global Intrusion Detection in the DOMINO Overlay System. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Somesh Jha, Doron Peled
Generalized Stuttering Equivalence. [Citation Graph (0, 0)][DBLP] PDPTA, 1999, pp:1054-1060 [Conf]
- Hao Wang, Somesh Jha, Miron Livny, Patrick Drew McDaniel
Security Policy Reconciliation in Distributed Computing Environments. [Citation Graph (0, 0)][DBLP] POLICY, 2004, pp:137-0 [Conf]
- Daniel Jackson, Somesh Jha, Craig Damon
Faster Checking of Software Specifications by Eliminating Isomorphs. [Citation Graph (0, 0)][DBLP] POPL, 1996, pp:79-90 [Conf]
- Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray
A semantics-based approach to malware detection. [Citation Graph (0, 0)][DBLP] POPL, 2007, pp:377-388 [Conf]
- Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
Using state space exploration and a natural deduction style message derivation engine to verify security protocols. [Citation Graph (0, 0)][DBLP] PROCOMET, 1998, pp:87-106 [Conf]
- Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
Environment-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:185-206 [Conf]
- Jonathon T. Giffin, Somesh Jha, Barton P. Miller
Automated Discovery of Mimicry Attacks. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:41-60 [Conf]
- Thomas W. Reps, Stefan Schwoon, Somesh Jha
Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis. [Citation Graph (0, 0)][DBLP] SAS, 2003, pp:189-213 [Conf]
- Sagar Chaki, Pascal Fenkam, Harald Gall, Somesh Jha, Engin Kirda, Helmut Veith
Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. [Citation Graph (0, 0)][DBLP] SEKE, 2003, pp:510-517 [Conf]
- David Garlan, Somesh Jha, David Notkin
Reasoning about Implicit Invocation. [Citation Graph (0, 0)][DBLP] SIGSOFT FSE, 1998, pp:209-221 [Conf]
- Craig Damon, Daniel Jackson, Somesh Jha
Checking Relational Specifications With Binary Decision Diagrams. [Citation Graph (0, 0)][DBLP] SIGSOFT FSE, 1996, pp:70-80 [Conf]
- Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant
Semantics-Aware Malware Detection. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2005, pp:32-46 [Conf]
- Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller
Formalizing Sensitivity in Static Analysis for Intrusion Detection. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2004, pp:194-0 [Conf]
- David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha
Towards Automatic Generation of Vulnerability-Based Signatures. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:2-16 [Conf]
- Vinod Ganapathy, Trent Jaeger, Somesh Jha
Retrofitting Legacy Code for Authorization Policy Enforcement. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:214-229 [Conf]
- Shai Rubin, Somesh Jha, Barton P. Miller
Language-Based Generation and Evaluation of NIDS Signatures. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2005, pp:3-17 [Conf]
- Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing
Automated Generation and Analysis of Attack Graphs. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2002, pp:273-284 [Conf]
- Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:179-186 [Conf]
- Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
Partial Order Reductions for Security Protocol Verification. [Citation Graph (0, 0)][DBLP] TACAS, 2000, pp:503-518 [Conf]
- E. Allen Emerson, Somesh Jha, Doron Peled
Combining Partial Order and Symmetry Reductions. [Citation Graph (0, 0)][DBLP] TACAS, 1997, pp:19-34 [Conf]
- Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps
Weighted Pushdown Systems and Trust-Management Systems. [Citation Graph (0, 0)][DBLP] TACAS, 2006, pp:1-26 [Conf]
- Jonathon T. Giffin, Somesh Jha, Barton P. Miller
Detecting Manipulated Remote Call Streams. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2002, pp:61-79 [Conf]
- Prasad Chalasani, Somesh Jha, Isaac Saias
Approximate Option Pricing. [Citation Graph (0, 0)][DBLP] Algorithmica, 1999, v:25, n:1, pp:2-21 [Journal]
- Jürgen Dingel, David Garlan, Somesh Jha, David Notkin
Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 1998, v:10, n:3, pp:193-213 [Journal]
- Edmund M. Clarke, Orna Grumberg, Hiromi Hiraishi, Somesh Jha, David E. Long, Kenneth L. McMillan, Linda A. Ness
Verification of the Futurebus+ Cache Coherence Protocol. [Citation Graph (0, 0)][DBLP] Formal Methods in System Design, 1995, v:6, n:2, pp:217-232 [Journal]
- Edmund M. Clarke, Somesh Jha, Reinhard Enders, Thomas Filkorn
Exploiting Symmetry in Temporal Logic Model Checking. [Citation Graph (0, 0)][DBLP] Formal Methods in System Design, 1996, v:9, n:1/2, pp:77-104 [Journal]
- Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith
Counterexample-guided abstraction refinement for symbolic model checking. [Citation Graph (0, 0)][DBLP] J. ACM, 2003, v:50, n:5, pp:752-794 [Journal]
- Somesh Jha, Thomas W. Reps
Model checking SPKI/SDSI. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:317-353 [Journal]
- Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith
An Iterative Framework for Simulation Conformance. [Citation Graph (0, 0)][DBLP] J. Log. Comput., 2005, v:15, n:4, pp:465-488 [Journal]
- Thomas W. Reps, Stefan Schwoon, Somesh Jha, David Melski
Weighted pushdown systems and their application to interprocedural dataflow analysis. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2005, v:58, n:1-2, pp:206-263 [Journal]
- Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
Efficient verification of security protocols using partial-order reductions. [Citation Graph (0, 0)][DBLP] STTT, 2003, v:4, n:2, pp:173-188 [Journal]
- Anca Browne, Edmund M. Clarke, Somesh Jha, David E. Long, Wilfredo R. Marrero
An Improved Algorithm for the Evaluation of Fixpoint Expressions. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1997, v:178, n:1-2, pp:237-255 [Journal]
- Edmund M. Clarke, Orna Grumberg, Somesh Jha
Verifying Parameterized Networks. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 1997, v:19, n:5, pp:726-750 [Journal]
- Daniel Jackson, Somesh Jha, Craig Damon
Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 1998, v:20, n:2, pp:302-343 [Journal]
- Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
Verifying security protocols with Brutus. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:443-487 [Journal]
- Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith
Modular Verification of Software Components in C. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 2004, v:30, n:6, pp:388-402 [Journal]
- Randy Smith, Cristian Estan, Somesh Jha
Backtracking Algorithmic Complexity Attacks against a NIDS. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:89-98 [Conf]
- Hao Wang, Somesh Jha, Vinod Ganapathy
NetSpy: Automatic Generation of Spyware Signatures for NIDS. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:99-108 [Conf]
- Mihai Christodorescu, Somesh Jha, Christopher Kruegel
Mining specifications of malicious behavior. [Citation Graph (0, 0)][DBLP] ESEC/SIGSOFT FSE, 2007, pp:5-14 [Conf]
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. [Citation Graph (, )][DBLP]
The design and implementation of microdrivers. [Citation Graph (, )][DBLP]
Model checking algorithms for the µ-calculus. [Citation Graph (, )][DBLP]
Retrofitting Legacy Code for Security. [Citation Graph (, )][DBLP]
Creating Vulnerability Signatures Using Weakest Preconditions. [Citation Graph (, )][DBLP]
Automating Security Mediation Placement. [Citation Graph (, )][DBLP]
Protocol Normalization Using Attribute Grammars. [Citation Graph (, )][DBLP]
Verifying Information Flow Control over Unbounded Processes. [Citation Graph (, )][DBLP]
Microdrivers: A New Architecture for Device Drivers. [Citation Graph (, )][DBLP]
Fast Signature Matching Using Extended Finite Automaton (XFA). [Citation Graph (, )][DBLP]
A Layered Architecture for Detecting Malicious Behaviors. [Citation Graph (, )][DBLP]
Multi-byte Regular Expression Matching with Speculation. [Citation Graph (, )][DBLP]
Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. [Citation Graph (, )][DBLP]
Effective blame for information-flow violations. [Citation Graph (, )][DBLP]
Towards Practical Privacy for Genomic Computation. [Citation Graph (, )][DBLP]
XFA: Faster Signature Matching with Extended Automata. [Citation Graph (, )][DBLP]
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. [Citation Graph (, )][DBLP]
Mining specifications of malicious behavior. [Citation Graph (, )][DBLP]
Search in 0.007secs, Finished in 0.761secs
|