2008 | ||
---|---|---|
96 | Peng Ning, Paul F. Syverson, Somesh Jha: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 ACM 2008 | |
95 | EE | Vinod Ganapathy, Matthew J. Renzelmann, Arini Balakrishnan, Michael M. Swift, Somesh Jha: The design and implementation of microdrivers. ASPLOS 2008: 168-178 |
94 | EE | Randy Smith, Cristian Estan, Somesh Jha, Ida Siahaan: Fast Signature Matching Using Extended Finite Automaton (XFA). ICISS 2008: 158-172 |
93 | EE | Randy Smith, Cristian Estan, Somesh Jha: XFA: Faster Signature Matching with Extended Automata. IEEE Symposium on Security and Privacy 2008: 187-201 |
92 | EE | Somesh Jha, Louis Kruger, Vitaly Shmatikov: Towards Practical Privacy for Genomic Computation. IEEE Symposium on Security and Privacy 2008: 216-230 |
91 | EE | Mihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ISEC 2008: 5-14 |
90 | EE | Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell: A Layered Architecture for Detecting Malicious Behaviors. RAID 2008: 78-97 |
89 | EE | Randy Smith, Cristian Estan, Somesh Jha, Shijin Kong: Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. SIGCOMM 2008: 207-218 |
88 | EE | Dave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia: Effective blame for information-flow violations. SIGSOFT FSE 2008: 250-260 |
87 | EE | Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray: A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst. 30(5): (2008) |
86 | EE | David Brumley, James Newsome, D. Song, Hao Wang, Somesh Jha: Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. IEEE Trans. Dependable Sec. Comput. 5(4): 224-241 (2008) |
2007 | ||
85 | EE | Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha: OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. ACSAC 2007: 431-441 |
84 | EE | David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song: Creating Vulnerability Signatures Using Weakest Preconditions. CSF 2007: 311-325 |
83 | EE | Mihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ESEC/SIGSOFT FSE 2007: 5-14 |
82 | EE | Vinod Ganapathy, Dave King, Trent Jaeger, Somesh Jha: Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. ICSE 2007: 458-467 |
81 | EE | Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney: Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. IEEE Symposium on Security and Privacy 2007: 179-186 |
80 | EE | Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray: A semantics-based approach to malware detection. POPL 2007: 377-388 |
79 | EE | Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith: Software transformations to improve malware detection. Journal in Computer Virology 3(4): 253-265 (2007) |
2006 | ||
78 | EE | Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh: Secure function evaluation with ordered binary decision diagrams. ACM Conference on Computer and Communications Security 2006: 410-420 |
77 | EE | Shai Rubin, Somesh Jha, Barton P. Miller: Protomatching network traffic for high throughputnetwork intrusion detection. ACM Conference on Computer and Communications Security 2006: 47-58 |
76 | EE | Randy Smith, Cristian Estan, Somesh Jha: Backtracking Algorithmic Complexity Attacks against a NIDS. ACSAC 2006: 89-98 |
75 | EE | Hao Wang, Somesh Jha, Vinod Ganapathy: NetSpy: Automatic Generation of Spyware Signatures for NIDS. ACSAC 2006: 99-108 |
74 | EE | Shai Rubin, Somesh Jha, Barton P. Miller: On the Completeness of Attack Mutation Algorithms. CSFW 2006: 43-56 |
73 | EE | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine: Reducing the Dependence of SPKI/SDSI on PKI. ESORICS 2006: 156-173 |
72 | EE | David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha: Towards Automatic Generation of Vulnerability-Based Signatures. IEEE Symposium on Security and Privacy 2006: 2-16 |
71 | EE | Vinod Ganapathy, Trent Jaeger, Somesh Jha: Retrofitting Legacy Code for Authorization Policy Enforcement. IEEE Symposium on Security and Privacy 2006: 214-229 |
70 | EE | Jonathon T. Giffin, Somesh Jha, Barton P. Miller: Automated Discovery of Mimicry Attacks. RAID 2006: 41-60 |
69 | EE | Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps: Weighted Pushdown Systems and Trust-Management Systems. TACAS 2006: 1-26 |
2005 | ||
68 | EE | Vinod Ganapathy, Trent Jaeger, Somesh Jha: Automatic placement of authorization hooks in the linux security modules framework. ACM Conference on Computer and Communications Security 2005: 330-339 |
67 | EE | Somesh Jha, Louis Kruger, Patrick McDaniel: Privacy Preserving Clustering. ESORICS 2005: 397-417 |
66 | EE | Muthian Sivathanu, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Somesh Jha: A Logic of File Systems. FAST 2005 |
65 | EE | Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant: Automatic discovery of API-level exploits. ICSE 2005: 312-321 |
64 | EE | Shai Rubin, Somesh Jha, Barton P. Miller: Language-Based Generation and Evaluation of NIDS Signatures. IEEE Symposium on Security and Privacy 2005: 3-17 |
63 | EE | Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant: Semantics-Aware Malware Detection. IEEE Symposium on Security and Privacy 2005: 32-46 |
62 | EE | Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller: Environment-Sensitive Intrusion Detection. RAID 2005: 185-206 |
61 | EE | Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith: An Iterative Framework for Simulation Conformance. J. Log. Comput. 15(4): 465-488 (2005) |
60 | EE | Thomas W. Reps, Stefan Schwoon, Somesh Jha, David Melski: Weighted pushdown systems and their application to interprocedural dataflow analysis. Sci. Comput. Program. 58(1-2): 206-263 (2005) |
2004 | ||
59 | EE | Shai Rubin, Somesh Jha, Barton P. Miller: Automatic Generation and Analysis of NIDS Attacks. ACSAC 2004: 28-38 |
58 | EE | Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller: Formalizing Sensitivity in Static Analysis for Intrusion Detection. IEEE Symposium on Security and Privacy 2004: 194- |
57 | EE | Mihai Christodorescu, Somesh Jha: Testing malware detectors. ISSTA 2004: 34-44 |
56 | EE | Jonathon T. Giffin, Somesh Jha, Barton P. Miller: Efficient Context-Sensitive Intrusion Detection. NDSS 2004 |
55 | EE | Vinod Yegneswaran, Paul Barford, Somesh Jha: Global Intrusion Detection in the DOMINO Overlay System. NDSS 2004 |
54 | EE | Hao Wang, Somesh Jha, Miron Livny, Patrick Drew McDaniel: Security Policy Reconciliation in Distributed Computing Environments. POLICY 2004: 137- |
53 | EE | Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith: Modular Verification of Software Components in C. IEEE Trans. Software Eng. 30(6): 388-402 (2004) |
52 | Somesh Jha, Thomas W. Reps: Model checking SPKI/SDSI. Journal of Computer Security 12(3-4): 317-353 (2004) | |
2003 | ||
51 | EE | Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek: Buffer overrun detection using linear programming and static analysis. ACM Conference on Computer and Communications Security 2003: 345-354 |
50 | EE | Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine: On Generalized Authorization Problems. CSFW 2003: 202- |
49 | EE | Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith: Modular Verification of Software Components in C. ICSE 2003: 385-395 |
48 | EE | Thomas W. Reps, Stefan Schwoon, Somesh Jha: Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis. SAS 2003: 189-213 |
47 | Sagar Chaki, Pascal Fenkam, Harald Gall, Somesh Jha, Engin Kirda, Helmut Veith: Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. SEKE 2003: 510-517 | |
46 | EE | Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Counterexample-guided abstraction refinement for symbolic model checking. J. ACM 50(5): 752-794 (2003) |
45 | EE | Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Efficient verification of security protocols using partial-order reductions. STTT 4(2): 173-188 (2003) |
2002 | ||
44 | EE | Somesh Jha, Thomas W. Reps: Analysis of SPKI/SDSI Certificates Using Model Checking. CSFW 2002: 129- |
43 | EE | Somesh Jha, Oleg Sheyner, Jeannette M. Wing: Two Formal Analys s of Attack Graphs. CSFW 2002: 49-63 |
42 | EE | Somesh Jha, Jens Palsberg, Tian Zhao: Efficient Type Matching. FoSSaCS 2002: 187-204 |
41 | EE | Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing: Automated Generation and Analysis of Attack Graphs. IEEE Symposium on Security and Privacy 2002: 273-284 |
40 | EE | Edmund M. Clarke, Somesh Jha, Yuan Lu, Helmut Veith: Tree-Like Counterexamples in Model Checking. LICS 2002: 19-29 |
39 | EE | Jonathon T. Giffin, Somesh Jha, Barton P. Miller: Detecting Manipulated Remote Call Streams. USENIX Security Symposium 2002: 61-79 |
2001 | ||
38 | EE | Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Helmut Veith, Dong Wang: Using Combinatorial Optimization Methods for Quantification Scheduling. CHARME 2001: 293-309 |
37 | EE | Somesh Jha, Kymie M. C. Tan, Roy A. Maxion: Markov Chains, Classifiers, and Intrusion Detection. CSFW 2001: 206-219 |
36 | EE | Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Thomas R. Shiple, Helmut Veith, Dong Wang: Non-linear Quantification Scheduling in Image Computation. ICCAD 2001: 293- |
35 | Somesh Jha, Jeannette M. Wing: Survivability Analysis of Network Systems. ICSE 2001: 307-317 | |
34 | Alexis Campailla, Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith: Efficient Filtering in Publish-Subscribe Systems Using Binary Decision. ICSE 2001: 443-452 | |
33 | EE | Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Progress on the State Explosion Problem in Model Checking. Informatics 2001: 176-194 |
2000 | ||
32 | Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Counterexample-Guided Abstraction Refinement. CAV 2000: 154-169 | |
31 | Sergey Berezin, Edmund M. Clarke, Somesh Jha, Will Marrero: Model checking algorithms for the µ-calculus. Proof, Language, and Interaction 2000: 309-338 | |
30 | EE | Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Partial Order Reductions for Security Protocol Verification. TACAS 2000: 503-518 |
29 | EE | Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Verifying security protocols with Brutus. ACM Trans. Softw. Eng. Methodol. 9(4): 443-487 (2000) |
1999 | ||
28 | EE | Edmund M. Clarke, Somesh Jha, Yuan Lu, Dong Wang: Abstract BDDs: A Technque for Using Abstraction in Model Checking. CHARME 1999: 172-186 |
27 | Somesh Jha, Doron Peled: Generalized Stuttering Equivalence. PDPTA 1999: 1054-1060 | |
26 | EE | Prasad Chalasani, Somesh Jha, Isaac Saias: Approximate Option Pricing. Algorithmica 25(1): 2-21 (1999) |
1998 | ||
25 | Onn Shehory, Katia P. Sycara, Prasad Chalasani, Somesh Jha: Increasing Resource Utilization and Task Performance by Agent Cloning. ATAL 1998: 413-426 | |
24 | EE | Prasad Chalasani, Somesh Jha, Onn Shehory, Katia P. Sycara: Query Restart Strategies for Web Agent. Agents 1998: 124-131 |
23 | EE | Somesh Jha, Prasad Chalasani, Onn Shehory, Katia P. Sycara: A Formal Treatment of Distributed Matchmaking. Agents 1998: 457-458 |
22 | Edmund M. Clarke, E. Allen Emerson, Somesh Jha, A. Prasad Sistla: Symmetry Reductions inModel Checking. CAV 1998: 147-158 | |
21 | EE | Prasad Chalasani, Somesh Jha, Onn Shehory, Katia P. Sycara: Strategies for Querying Information Agents. CIA 1998: 94-107 |
20 | Onn Shehory, Katia P. Sycara, Prasad Chalasani, Somesh Jha: Agent Cloning. ICMAS 1998: 463-464 | |
19 | Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Using state space exploration and a natural deduction style message derivation engine to verify security protocols. PROCOMET 1998: 87-106 | |
18 | EE | David Garlan, Somesh Jha, David Notkin: Reasoning about Implicit Invocation. SIGSOFT FSE 1998: 209-221 |
17 | EE | Daniel Jackson, Somesh Jha, Craig Damon: Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications. ACM Trans. Program. Lang. Syst. 20(2): 302-343 (1998) |
16 | EE | Jürgen Dingel, David Garlan, Somesh Jha, David Notkin: Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning. Formal Asp. Comput. 10(3): 193-213 (1998) |
1997 | ||
15 | Onn Shehory, Katia P. Sycara, Somesh Jha: Multi-Agent Coordination through Coalition Formation. ATAL 1997: 143-154 | |
14 | Somesh Jha, Yuan Lu, Marius Minea, Edmund M. Clarke: Equivalence Checking Using Abstract BDDs. ICCD 1997: 332-337 | |
13 | E. Allen Emerson, Somesh Jha, Doron Peled: Combining Partial Order and Symmetry Reductions. TACAS 1997: 19-34 | |
12 | EE | Edmund M. Clarke, Orna Grumberg, Somesh Jha: Verifying Parameterized Networks. ACM Trans. Program. Lang. Syst. 19(5): 726-750 (1997) |
11 | EE | Anca Browne, Edmund M. Clarke, Somesh Jha, David E. Long, Wilfredo R. Marrero: An Improved Algorithm for the Evaluation of Fixpoint Expressions. Theor. Comput. Sci. 178(1-2): 237-255 (1997) |
1996 | ||
10 | Prasad Chalasani, Somesh Jha, Isaac Saias: Approximate Option Pricing. FOCS 1996: 244-253 | |
9 | EE | Daniel Jackson, Somesh Jha, Craig Damon: Faster Checking of Software Specifications by Eliminating Isomorphs. POPL 1996: 79-90 |
8 | EE | Craig Damon, Daniel Jackson, Somesh Jha: Checking Relational Specifications With Binary Decision Diagrams. SIGSOFT FSE 1996: 70-80 |
7 | Edmund M. Clarke, Somesh Jha, Reinhard Enders, Thomas Filkorn: Exploiting Symmetry in Temporal Logic Model Checking. Formal Methods in System Design 9(1/2): 77-104 (1996) | |
1995 | ||
6 | Edmund M. Clarke, Orna Grumberg, Somesh Jha: Veryfying Parameterized Networks using Abstraction and Regular Languages. CONCUR 1995: 395-407 | |
5 | Edmund M. Clarke, Somesh Jha: Symmetry and Induction in Model Checking. Computer Science Today 1995: 455-470 | |
4 | Edmund M. Clarke, Orna Grumberg, Hiromi Hiraishi, Somesh Jha, David E. Long, Kenneth L. McMillan, Linda A. Ness: Verification of the Futurebus+ Cache Coherence Protocol. Formal Methods in System Design 6(2): 217-232 (1995) | |
1994 | ||
3 | David E. Long, Anca Browne, Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: An Improved Algorithm for the Evaluation of Fixpoint Expressions. CAV 1994: 338-350 | |
1993 | ||
2 | Edmund M. Clarke, Thomas Filkorn, Somesh Jha: Exploiting Symmetry In Temporal Logic Model Checking. CAV 1993: 450-462 | |
1 | Edmund M. Clarke, Orna Grumberg, Hiromi Hiraishi, Somesh Jha, David E. Long, Kenneth L. McMillan, Linda A. Ness: Verification of the Futurebus+ Cache Coherence Protocol. CHDL 1993: 15-30 |