The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Somesh Jha: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Somesh Jha, Prasad Chalasani, Onn Shehory, Katia P. Sycara
    A Formal Treatment of Distributed Matchmaking. [Citation Graph (1, 0)][DBLP]
    Agents, 1998, pp:457-458 [Conf]
  2. Shai Rubin, Somesh Jha, Barton P. Miller
    Automatic Generation and Analysis of NIDS Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:28-38 [Conf]
  3. Prasad Chalasani, Somesh Jha, Onn Shehory, Katia P. Sycara
    Query Restart Strategies for Web Agent. [Citation Graph (0, 0)][DBLP]
    Agents, 1998, pp:124-131 [Conf]
  4. Onn Shehory, Katia P. Sycara, Prasad Chalasani, Somesh Jha
    Increasing Resource Utilization and Task Performance by Agent Cloning. [Citation Graph (0, 0)][DBLP]
    ATAL, 1998, pp:413-426 [Conf]
  5. Onn Shehory, Katia P. Sycara, Somesh Jha
    Multi-Agent Coordination through Coalition Formation. [Citation Graph (0, 0)][DBLP]
    ATAL, 1997, pp:143-154 [Conf]
  6. Edmund M. Clarke, E. Allen Emerson, Somesh Jha, A. Prasad Sistla
    Symmetry Reductions inModel Checking. [Citation Graph (0, 0)][DBLP]
    CAV, 1998, pp:147-158 [Conf]
  7. Edmund M. Clarke, Thomas Filkorn, Somesh Jha
    Exploiting Symmetry In Temporal Logic Model Checking. [Citation Graph (0, 0)][DBLP]
    CAV, 1993, pp:450-462 [Conf]
  8. Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith
    Counterexample-Guided Abstraction Refinement. [Citation Graph (0, 0)][DBLP]
    CAV, 2000, pp:154-169 [Conf]
  9. David E. Long, Anca Browne, Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
    An Improved Algorithm for the Evaluation of Fixpoint Expressions. [Citation Graph (0, 0)][DBLP]
    CAV, 1994, pp:338-350 [Conf]
  10. Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek
    Buffer overrun detection using linear programming and static analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:345-354 [Conf]
  11. Vinod Ganapathy, Trent Jaeger, Somesh Jha
    Automatic placement of authorization hooks in the linux security modules framework. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:330-339 [Conf]
  12. Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
    Secure function evaluation with ordered binary decision diagrams. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:410-420 [Conf]
  13. Shai Rubin, Somesh Jha, Barton P. Miller
    Protomatching network traffic for high throughputnetwork intrusion detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:47-58 [Conf]
  14. Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Helmut Veith, Dong Wang
    Using Combinatorial Optimization Methods for Quantification Scheduling. [Citation Graph (0, 0)][DBLP]
    CHARME, 2001, pp:293-309 [Conf]
  15. Edmund M. Clarke, Somesh Jha, Yuan Lu, Dong Wang
    Abstract BDDs: A Technque for Using Abstraction in Model Checking. [Citation Graph (0, 0)][DBLP]
    CHARME, 1999, pp:172-186 [Conf]
  16. Edmund M. Clarke, Orna Grumberg, Hiromi Hiraishi, Somesh Jha, David E. Long, Kenneth L. McMillan, Linda A. Ness
    Verification of the Futurebus+ Cache Coherence Protocol. [Citation Graph (0, 0)][DBLP]
    CHDL, 1993, pp:15-30 [Conf]
  17. Prasad Chalasani, Somesh Jha, Onn Shehory, Katia P. Sycara
    Strategies for Querying Information Agents. [Citation Graph (0, 0)][DBLP]
    CIA, 1998, pp:94-107 [Conf]
  18. Edmund M. Clarke, Orna Grumberg, Somesh Jha
    Veryfying Parameterized Networks using Abstraction and Regular Languages. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1995, pp:395-407 [Conf]
  19. Somesh Jha, Thomas W. Reps
    Analysis of SPKI/SDSI Certificates Using Model Checking. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:129-0 [Conf]
  20. Somesh Jha, Oleg Sheyner, Jeannette M. Wing
    Two Formal Analys s of Attack Graphs. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:49-63 [Conf]
  21. Somesh Jha, Kymie M. C. Tan, Roy A. Maxion
    Markov Chains, Classifiers, and Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:206-219 [Conf]
  22. Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine
    On Generalized Authorization Problems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:202-0 [Conf]
  23. Shai Rubin, Somesh Jha, Barton P. Miller
    On the Completeness of Attack Mutation Algorithms. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:43-56 [Conf]
  24. Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith
    Progress on the State Explosion Problem in Model Checking. [Citation Graph (0, 0)][DBLP]
    Informatics, 2001, pp:176-194 [Conf]
  25. Somesh Jha, Louis Kruger, Patrick McDaniel
    Privacy Preserving Clustering. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:397-417 [Conf]
  26. Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine
    Reducing the Dependence of SPKI/SDSI on PKI. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:156-173 [Conf]
  27. Muthian Sivathanu, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Somesh Jha
    A Logic of File Systems. [Citation Graph (0, 0)][DBLP]
    FAST, 2005, pp:- [Conf]
  28. Prasad Chalasani, Somesh Jha, Isaac Saias
    Approximate Option Pricing. [Citation Graph (0, 0)][DBLP]
    FOCS, 1996, pp:244-253 [Conf]
  29. Somesh Jha, Jens Palsberg, Tian Zhao
    Efficient Type Matching. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2002, pp:187-204 [Conf]
  30. Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Thomas R. Shiple, Helmut Veith, Dong Wang
    Non-linear Quantification Scheduling in Image Computation. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2001, pp:293-0 [Conf]
  31. Somesh Jha, Yuan Lu, Marius Minea, Edmund M. Clarke
    Equivalence Checking Using Abstract BDDs. [Citation Graph (0, 0)][DBLP]
    ICCD, 1997, pp:332-337 [Conf]
  32. Onn Shehory, Katia P. Sycara, Prasad Chalasani, Somesh Jha
    Agent Cloning. [Citation Graph (0, 0)][DBLP]
    ICMAS, 1998, pp:463-464 [Conf]
  33. Alexis Campailla, Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith
    Efficient Filtering in Publish-Subscribe Systems Using Binary Decision. [Citation Graph (0, 0)][DBLP]
    ICSE, 2001, pp:443-452 [Conf]
  34. Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith
    Modular Verification of Software Components in C. [Citation Graph (0, 0)][DBLP]
    ICSE, 2003, pp:385-395 [Conf]
  35. Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant
    Automatic discovery of API-level exploits. [Citation Graph (0, 0)][DBLP]
    ICSE, 2005, pp:312-321 [Conf]
  36. Somesh Jha, Jeannette M. Wing
    Survivability Analysis of Network Systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2001, pp:307-317 [Conf]
  37. Vinod Ganapathy, David King, Trent Jaeger, Somesh Jha
    Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. [Citation Graph (0, 0)][DBLP]
    ICSE, 2007, pp:458-467 [Conf]
  38. Mihai Christodorescu, Somesh Jha
    Testing malware detectors. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2004, pp:34-44 [Conf]
  39. Edmund M. Clarke, Somesh Jha, Yuan Lu, Helmut Veith
    Tree-Like Counterexamples in Model Checking. [Citation Graph (0, 0)][DBLP]
    LICS, 2002, pp:19-29 [Conf]
  40. Jonathon T. Giffin, Somesh Jha, Barton P. Miller
    Efficient Context-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  41. Vinod Yegneswaran, Paul Barford, Somesh Jha
    Global Intrusion Detection in the DOMINO Overlay System. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  42. Somesh Jha, Doron Peled
    Generalized Stuttering Equivalence. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:1054-1060 [Conf]
  43. Hao Wang, Somesh Jha, Miron Livny, Patrick Drew McDaniel
    Security Policy Reconciliation in Distributed Computing Environments. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:137-0 [Conf]
  44. Daniel Jackson, Somesh Jha, Craig Damon
    Faster Checking of Software Specifications by Eliminating Isomorphs. [Citation Graph (0, 0)][DBLP]
    POPL, 1996, pp:79-90 [Conf]
  45. Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray
    A semantics-based approach to malware detection. [Citation Graph (0, 0)][DBLP]
    POPL, 2007, pp:377-388 [Conf]
  46. Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
    Using state space exploration and a natural deduction style message derivation engine to verify security protocols. [Citation Graph (0, 0)][DBLP]
    PROCOMET, 1998, pp:87-106 [Conf]
  47. Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
    Environment-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:185-206 [Conf]
  48. Jonathon T. Giffin, Somesh Jha, Barton P. Miller
    Automated Discovery of Mimicry Attacks. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:41-60 [Conf]
  49. Thomas W. Reps, Stefan Schwoon, Somesh Jha
    Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis. [Citation Graph (0, 0)][DBLP]
    SAS, 2003, pp:189-213 [Conf]
  50. Sagar Chaki, Pascal Fenkam, Harald Gall, Somesh Jha, Engin Kirda, Helmut Veith
    Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. [Citation Graph (0, 0)][DBLP]
    SEKE, 2003, pp:510-517 [Conf]
  51. David Garlan, Somesh Jha, David Notkin
    Reasoning about Implicit Invocation. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1998, pp:209-221 [Conf]
  52. Craig Damon, Daniel Jackson, Somesh Jha
    Checking Relational Specifications With Binary Decision Diagrams. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1996, pp:70-80 [Conf]
  53. Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant
    Semantics-Aware Malware Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:32-46 [Conf]
  54. Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller
    Formalizing Sensitivity in Static Analysis for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:194-0 [Conf]
  55. David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha
    Towards Automatic Generation of Vulnerability-Based Signatures. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:2-16 [Conf]
  56. Vinod Ganapathy, Trent Jaeger, Somesh Jha
    Retrofitting Legacy Code for Authorization Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:214-229 [Conf]
  57. Shai Rubin, Somesh Jha, Barton P. Miller
    Language-Based Generation and Evaluation of NIDS Signatures. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:3-17 [Conf]
  58. Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing
    Automated Generation and Analysis of Attack Graphs. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:273-284 [Conf]
  59. Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
    Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:179-186 [Conf]
  60. Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
    Partial Order Reductions for Security Protocol Verification. [Citation Graph (0, 0)][DBLP]
    TACAS, 2000, pp:503-518 [Conf]
  61. E. Allen Emerson, Somesh Jha, Doron Peled
    Combining Partial Order and Symmetry Reductions. [Citation Graph (0, 0)][DBLP]
    TACAS, 1997, pp:19-34 [Conf]
  62. Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps
    Weighted Pushdown Systems and Trust-Management Systems. [Citation Graph (0, 0)][DBLP]
    TACAS, 2006, pp:1-26 [Conf]
  63. Jonathon T. Giffin, Somesh Jha, Barton P. Miller
    Detecting Manipulated Remote Call Streams. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:61-79 [Conf]
  64. Prasad Chalasani, Somesh Jha, Isaac Saias
    Approximate Option Pricing. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 1999, v:25, n:1, pp:2-21 [Journal]
  65. Jürgen Dingel, David Garlan, Somesh Jha, David Notkin
    Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1998, v:10, n:3, pp:193-213 [Journal]
  66. Edmund M. Clarke, Orna Grumberg, Hiromi Hiraishi, Somesh Jha, David E. Long, Kenneth L. McMillan, Linda A. Ness
    Verification of the Futurebus+ Cache Coherence Protocol. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 1995, v:6, n:2, pp:217-232 [Journal]
  67. Edmund M. Clarke, Somesh Jha, Reinhard Enders, Thomas Filkorn
    Exploiting Symmetry in Temporal Logic Model Checking. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 1996, v:9, n:1/2, pp:77-104 [Journal]
  68. Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith
    Counterexample-guided abstraction refinement for symbolic model checking. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2003, v:50, n:5, pp:752-794 [Journal]
  69. Somesh Jha, Thomas W. Reps
    Model checking SPKI/SDSI. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:317-353 [Journal]
  70. Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith
    An Iterative Framework for Simulation Conformance. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 2005, v:15, n:4, pp:465-488 [Journal]
  71. Thomas W. Reps, Stefan Schwoon, Somesh Jha, David Melski
    Weighted pushdown systems and their application to interprocedural dataflow analysis. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2005, v:58, n:1-2, pp:206-263 [Journal]
  72. Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
    Efficient verification of security protocols using partial-order reductions. [Citation Graph (0, 0)][DBLP]
    STTT, 2003, v:4, n:2, pp:173-188 [Journal]
  73. Anca Browne, Edmund M. Clarke, Somesh Jha, David E. Long, Wilfredo R. Marrero
    An Improved Algorithm for the Evaluation of Fixpoint Expressions. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1997, v:178, n:1-2, pp:237-255 [Journal]
  74. Edmund M. Clarke, Orna Grumberg, Somesh Jha
    Verifying Parameterized Networks. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1997, v:19, n:5, pp:726-750 [Journal]
  75. Daniel Jackson, Somesh Jha, Craig Damon
    Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1998, v:20, n:2, pp:302-343 [Journal]
  76. Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
    Verifying security protocols with Brutus. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:443-487 [Journal]
  77. Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith
    Modular Verification of Software Components in C. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2004, v:30, n:6, pp:388-402 [Journal]
  78. Randy Smith, Cristian Estan, Somesh Jha
    Backtracking Algorithmic Complexity Attacks against a NIDS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:89-98 [Conf]
  79. Hao Wang, Somesh Jha, Vinod Ganapathy
    NetSpy: Automatic Generation of Spyware Signatures for NIDS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:99-108 [Conf]
  80. Mihai Christodorescu, Somesh Jha, Christopher Kruegel
    Mining specifications of malicious behavior. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2007, pp:5-14 [Conf]

  81. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. [Citation Graph (, )][DBLP]


  82. The design and implementation of microdrivers. [Citation Graph (, )][DBLP]


  83. Model checking algorithms for the µ-calculus. [Citation Graph (, )][DBLP]


  84. Retrofitting Legacy Code for Security. [Citation Graph (, )][DBLP]


  85. Creating Vulnerability Signatures Using Weakest Preconditions. [Citation Graph (, )][DBLP]


  86. Automating Security Mediation Placement. [Citation Graph (, )][DBLP]


  87. Protocol Normalization Using Attribute Grammars. [Citation Graph (, )][DBLP]


  88. Verifying Information Flow Control over Unbounded Processes. [Citation Graph (, )][DBLP]


  89. Microdrivers: A New Architecture for Device Drivers. [Citation Graph (, )][DBLP]


  90. Fast Signature Matching Using Extended Finite Automaton (XFA). [Citation Graph (, )][DBLP]


  91. A Layered Architecture for Detecting Malicious Behaviors. [Citation Graph (, )][DBLP]


  92. Multi-byte Regular Expression Matching with Speculation. [Citation Graph (, )][DBLP]


  93. Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. [Citation Graph (, )][DBLP]


  94. Effective blame for information-flow violations. [Citation Graph (, )][DBLP]


  95. Towards Practical Privacy for Genomic Computation. [Citation Graph (, )][DBLP]


  96. XFA: Faster Signature Matching with Extended Automata. [Citation Graph (, )][DBLP]


  97. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. [Citation Graph (, )][DBLP]


  98. Mining specifications of malicious behavior. [Citation Graph (, )][DBLP]


Search in 0.009secs, Finished in 0.014secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002