2008 |
96 | | Peng Ning,
Paul F. Syverson,
Somesh Jha:
Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008
ACM 2008 |
95 | EE | Vinod Ganapathy,
Matthew J. Renzelmann,
Arini Balakrishnan,
Michael M. Swift,
Somesh Jha:
The design and implementation of microdrivers.
ASPLOS 2008: 168-178 |
94 | EE | Randy Smith,
Cristian Estan,
Somesh Jha,
Ida Siahaan:
Fast Signature Matching Using Extended Finite Automaton (XFA).
ICISS 2008: 158-172 |
93 | EE | Randy Smith,
Cristian Estan,
Somesh Jha:
XFA: Faster Signature Matching with Extended Automata.
IEEE Symposium on Security and Privacy 2008: 187-201 |
92 | EE | Somesh Jha,
Louis Kruger,
Vitaly Shmatikov:
Towards Practical Privacy for Genomic Computation.
IEEE Symposium on Security and Privacy 2008: 216-230 |
91 | EE | Mihai Christodorescu,
Somesh Jha,
Christopher Kruegel:
Mining specifications of malicious behavior.
ISEC 2008: 5-14 |
90 | EE | Lorenzo Martignoni,
Elizabeth Stinson,
Matt Fredrikson,
Somesh Jha,
John C. Mitchell:
A Layered Architecture for Detecting Malicious Behaviors.
RAID 2008: 78-97 |
89 | EE | Randy Smith,
Cristian Estan,
Somesh Jha,
Shijin Kong:
Deflating the big bang: fast and scalable deep packet inspection with extended finite automata.
SIGCOMM 2008: 207-218 |
88 | EE | Dave King,
Trent Jaeger,
Somesh Jha,
Sanjit A. Seshia:
Effective blame for information-flow violations.
SIGSOFT FSE 2008: 250-260 |
87 | EE | Mila Dalla Preda,
Mihai Christodorescu,
Somesh Jha,
Saumya K. Debray:
A semantics-based approach to malware detection.
ACM Trans. Program. Lang. Syst. 30(5): (2008) |
86 | EE | David Brumley,
James Newsome,
D. Song,
Hao Wang,
Somesh Jha:
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
IEEE Trans. Dependable Sec. Comput. 5(4): 224-241 (2008) |
2007 |
85 | EE | Lorenzo Martignoni,
Mihai Christodorescu,
Somesh Jha:
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware.
ACSAC 2007: 431-441 |
84 | EE | David Brumley,
Hao Wang,
Somesh Jha,
Dawn Xiaodong Song:
Creating Vulnerability Signatures Using Weakest Preconditions.
CSF 2007: 311-325 |
83 | EE | Mihai Christodorescu,
Somesh Jha,
Christopher Kruegel:
Mining specifications of malicious behavior.
ESEC/SIGSOFT FSE 2007: 5-14 |
82 | EE | Vinod Ganapathy,
Dave King,
Trent Jaeger,
Somesh Jha:
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis.
ICSE 2007: 458-467 |
81 | EE | Somesh Jha,
Stefan Katzenbeisser,
Christian Schallhart,
Helmut Veith,
Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
IEEE Symposium on Security and Privacy 2007: 179-186 |
80 | EE | Mila Dalla Preda,
Mihai Christodorescu,
Somesh Jha,
Saumya K. Debray:
A semantics-based approach to malware detection.
POPL 2007: 377-388 |
79 | EE | Mihai Christodorescu,
Somesh Jha,
Johannes Kinder,
Stefan Katzenbeisser,
Helmut Veith:
Software transformations to improve malware detection.
Journal in Computer Virology 3(4): 253-265 (2007) |
2006 |
78 | EE | Louis Kruger,
Somesh Jha,
Eu-Jin Goh,
Dan Boneh:
Secure function evaluation with ordered binary decision diagrams.
ACM Conference on Computer and Communications Security 2006: 410-420 |
77 | EE | Shai Rubin,
Somesh Jha,
Barton P. Miller:
Protomatching network traffic for high throughputnetwork intrusion detection.
ACM Conference on Computer and Communications Security 2006: 47-58 |
76 | EE | Randy Smith,
Cristian Estan,
Somesh Jha:
Backtracking Algorithmic Complexity Attacks against a NIDS.
ACSAC 2006: 89-98 |
75 | EE | Hao Wang,
Somesh Jha,
Vinod Ganapathy:
NetSpy: Automatic Generation of Spyware Signatures for NIDS.
ACSAC 2006: 99-108 |
74 | EE | Shai Rubin,
Somesh Jha,
Barton P. Miller:
On the Completeness of Attack Mutation Algorithms.
CSFW 2006: 43-56 |
73 | EE | Hao Wang,
Somesh Jha,
Thomas W. Reps,
Stefan Schwoon,
Stuart G. Stubblebine:
Reducing the Dependence of SPKI/SDSI on PKI.
ESORICS 2006: 156-173 |
72 | EE | David Brumley,
James Newsome,
Dawn Xiaodong Song,
Hao Wang,
Somesh Jha:
Towards Automatic Generation of Vulnerability-Based Signatures.
IEEE Symposium on Security and Privacy 2006: 2-16 |
71 | EE | Vinod Ganapathy,
Trent Jaeger,
Somesh Jha:
Retrofitting Legacy Code for Authorization Policy Enforcement.
IEEE Symposium on Security and Privacy 2006: 214-229 |
70 | EE | Jonathon T. Giffin,
Somesh Jha,
Barton P. Miller:
Automated Discovery of Mimicry Attacks.
RAID 2006: 41-60 |
69 | EE | Somesh Jha,
Stefan Schwoon,
Hao Wang,
Thomas W. Reps:
Weighted Pushdown Systems and Trust-Management Systems.
TACAS 2006: 1-26 |
2005 |
68 | EE | Vinod Ganapathy,
Trent Jaeger,
Somesh Jha:
Automatic placement of authorization hooks in the linux security modules framework.
ACM Conference on Computer and Communications Security 2005: 330-339 |
67 | EE | Somesh Jha,
Louis Kruger,
Patrick McDaniel:
Privacy Preserving Clustering.
ESORICS 2005: 397-417 |
66 | EE | Muthian Sivathanu,
Andrea C. Arpaci-Dusseau,
Remzi H. Arpaci-Dusseau,
Somesh Jha:
A Logic of File Systems.
FAST 2005 |
65 | EE | Vinod Ganapathy,
Sanjit A. Seshia,
Somesh Jha,
Thomas W. Reps,
Randal E. Bryant:
Automatic discovery of API-level exploits.
ICSE 2005: 312-321 |
64 | EE | Shai Rubin,
Somesh Jha,
Barton P. Miller:
Language-Based Generation and Evaluation of NIDS Signatures.
IEEE Symposium on Security and Privacy 2005: 3-17 |
63 | EE | Mihai Christodorescu,
Somesh Jha,
Sanjit A. Seshia,
Dawn Xiaodong Song,
Randal E. Bryant:
Semantics-Aware Malware Detection.
IEEE Symposium on Security and Privacy 2005: 32-46 |
62 | EE | Jonathon T. Giffin,
David Dagon,
Somesh Jha,
Wenke Lee,
Barton P. Miller:
Environment-Sensitive Intrusion Detection.
RAID 2005: 185-206 |
61 | EE | Sagar Chaki,
Edmund M. Clarke,
Somesh Jha,
Helmut Veith:
An Iterative Framework for Simulation Conformance.
J. Log. Comput. 15(4): 465-488 (2005) |
60 | EE | Thomas W. Reps,
Stefan Schwoon,
Somesh Jha,
David Melski:
Weighted pushdown systems and their application to interprocedural dataflow analysis.
Sci. Comput. Program. 58(1-2): 206-263 (2005) |
2004 |
59 | EE | Shai Rubin,
Somesh Jha,
Barton P. Miller:
Automatic Generation and Analysis of NIDS Attacks.
ACSAC 2004: 28-38 |
58 | EE | Henry Hanping Feng,
Jonathon T. Giffin,
Yong Huang,
Somesh Jha,
Wenke Lee,
Barton P. Miller:
Formalizing Sensitivity in Static Analysis for Intrusion Detection.
IEEE Symposium on Security and Privacy 2004: 194- |
57 | EE | Mihai Christodorescu,
Somesh Jha:
Testing malware detectors.
ISSTA 2004: 34-44 |
56 | EE | Jonathon T. Giffin,
Somesh Jha,
Barton P. Miller:
Efficient Context-Sensitive Intrusion Detection.
NDSS 2004 |
55 | EE | Vinod Yegneswaran,
Paul Barford,
Somesh Jha:
Global Intrusion Detection in the DOMINO Overlay System.
NDSS 2004 |
54 | EE | Hao Wang,
Somesh Jha,
Miron Livny,
Patrick Drew McDaniel:
Security Policy Reconciliation in Distributed Computing Environments.
POLICY 2004: 137- |
53 | EE | Sagar Chaki,
Edmund M. Clarke,
Alex Groce,
Somesh Jha,
Helmut Veith:
Modular Verification of Software Components in C.
IEEE Trans. Software Eng. 30(6): 388-402 (2004) |
52 | | Somesh Jha,
Thomas W. Reps:
Model checking SPKI/SDSI.
Journal of Computer Security 12(3-4): 317-353 (2004) |
2003 |
51 | EE | Vinod Ganapathy,
Somesh Jha,
David Chandler,
David Melski,
David Vitek:
Buffer overrun detection using linear programming and static analysis.
ACM Conference on Computer and Communications Security 2003: 345-354 |
50 | EE | Stefan Schwoon,
Somesh Jha,
Thomas W. Reps,
Stuart G. Stubblebine:
On Generalized Authorization Problems.
CSFW 2003: 202- |
49 | EE | Sagar Chaki,
Edmund M. Clarke,
Alex Groce,
Somesh Jha,
Helmut Veith:
Modular Verification of Software Components in C.
ICSE 2003: 385-395 |
48 | EE | Thomas W. Reps,
Stefan Schwoon,
Somesh Jha:
Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis.
SAS 2003: 189-213 |
47 | | Sagar Chaki,
Pascal Fenkam,
Harald Gall,
Somesh Jha,
Engin Kirda,
Helmut Veith:
Integrating Publish/Subscribe into a Mobile Teamwork Support Platform.
SEKE 2003: 510-517 |
46 | EE | Edmund M. Clarke,
Orna Grumberg,
Somesh Jha,
Yuan Lu,
Helmut Veith:
Counterexample-guided abstraction refinement for symbolic model checking.
J. ACM 50(5): 752-794 (2003) |
45 | EE | Edmund M. Clarke,
Somesh Jha,
Wilfredo R. Marrero:
Efficient verification of security protocols using partial-order reductions.
STTT 4(2): 173-188 (2003) |
2002 |
44 | EE | Somesh Jha,
Thomas W. Reps:
Analysis of SPKI/SDSI Certificates Using Model Checking.
CSFW 2002: 129- |
43 | EE | Somesh Jha,
Oleg Sheyner,
Jeannette M. Wing:
Two Formal Analys s of Attack Graphs.
CSFW 2002: 49-63 |
42 | EE | Somesh Jha,
Jens Palsberg,
Tian Zhao:
Efficient Type Matching.
FoSSaCS 2002: 187-204 |
41 | EE | Oleg Sheyner,
Joshua W. Haines,
Somesh Jha,
Richard Lippmann,
Jeannette M. Wing:
Automated Generation and Analysis of Attack Graphs.
IEEE Symposium on Security and Privacy 2002: 273-284 |
40 | EE | Edmund M. Clarke,
Somesh Jha,
Yuan Lu,
Helmut Veith:
Tree-Like Counterexamples in Model Checking.
LICS 2002: 19-29 |
39 | EE | Jonathon T. Giffin,
Somesh Jha,
Barton P. Miller:
Detecting Manipulated Remote Call Streams.
USENIX Security Symposium 2002: 61-79 |
2001 |
38 | EE | Pankaj Chauhan,
Edmund M. Clarke,
Somesh Jha,
James H. Kukula,
Helmut Veith,
Dong Wang:
Using Combinatorial Optimization Methods for Quantification Scheduling.
CHARME 2001: 293-309 |
37 | EE | Somesh Jha,
Kymie M. C. Tan,
Roy A. Maxion:
Markov Chains, Classifiers, and Intrusion Detection.
CSFW 2001: 206-219 |
36 | EE | Pankaj Chauhan,
Edmund M. Clarke,
Somesh Jha,
James H. Kukula,
Thomas R. Shiple,
Helmut Veith,
Dong Wang:
Non-linear Quantification Scheduling in Image Computation.
ICCAD 2001: 293- |
35 | | Somesh Jha,
Jeannette M. Wing:
Survivability Analysis of Network Systems.
ICSE 2001: 307-317 |
34 | | Alexis Campailla,
Sagar Chaki,
Edmund M. Clarke,
Somesh Jha,
Helmut Veith:
Efficient Filtering in Publish-Subscribe Systems Using Binary Decision.
ICSE 2001: 443-452 |
33 | EE | Edmund M. Clarke,
Orna Grumberg,
Somesh Jha,
Yuan Lu,
Helmut Veith:
Progress on the State Explosion Problem in Model Checking.
Informatics 2001: 176-194 |
2000 |
32 | | Edmund M. Clarke,
Orna Grumberg,
Somesh Jha,
Yuan Lu,
Helmut Veith:
Counterexample-Guided Abstraction Refinement.
CAV 2000: 154-169 |
31 | | Sergey Berezin,
Edmund M. Clarke,
Somesh Jha,
Will Marrero:
Model checking algorithms for the µ-calculus.
Proof, Language, and Interaction 2000: 309-338 |
30 | EE | Edmund M. Clarke,
Somesh Jha,
Wilfredo R. Marrero:
Partial Order Reductions for Security Protocol Verification.
TACAS 2000: 503-518 |
29 | EE | Edmund M. Clarke,
Somesh Jha,
Wilfredo R. Marrero:
Verifying security protocols with Brutus.
ACM Trans. Softw. Eng. Methodol. 9(4): 443-487 (2000) |
1999 |
28 | EE | Edmund M. Clarke,
Somesh Jha,
Yuan Lu,
Dong Wang:
Abstract BDDs: A Technque for Using Abstraction in Model Checking.
CHARME 1999: 172-186 |
27 | | Somesh Jha,
Doron Peled:
Generalized Stuttering Equivalence.
PDPTA 1999: 1054-1060 |
26 | EE | Prasad Chalasani,
Somesh Jha,
Isaac Saias:
Approximate Option Pricing.
Algorithmica 25(1): 2-21 (1999) |
1998 |
25 | | Onn Shehory,
Katia P. Sycara,
Prasad Chalasani,
Somesh Jha:
Increasing Resource Utilization and Task Performance by Agent Cloning.
ATAL 1998: 413-426 |
24 | EE | Prasad Chalasani,
Somesh Jha,
Onn Shehory,
Katia P. Sycara:
Query Restart Strategies for Web Agent.
Agents 1998: 124-131 |
23 | EE | Somesh Jha,
Prasad Chalasani,
Onn Shehory,
Katia P. Sycara:
A Formal Treatment of Distributed Matchmaking.
Agents 1998: 457-458 |
22 | | Edmund M. Clarke,
E. Allen Emerson,
Somesh Jha,
A. Prasad Sistla:
Symmetry Reductions inModel Checking.
CAV 1998: 147-158 |
21 | EE | Prasad Chalasani,
Somesh Jha,
Onn Shehory,
Katia P. Sycara:
Strategies for Querying Information Agents.
CIA 1998: 94-107 |
20 | | Onn Shehory,
Katia P. Sycara,
Prasad Chalasani,
Somesh Jha:
Agent Cloning.
ICMAS 1998: 463-464 |
19 | | Edmund M. Clarke,
Somesh Jha,
Wilfredo R. Marrero:
Using state space exploration and a natural deduction style message derivation engine to verify security protocols.
PROCOMET 1998: 87-106 |
18 | EE | David Garlan,
Somesh Jha,
David Notkin:
Reasoning about Implicit Invocation.
SIGSOFT FSE 1998: 209-221 |
17 | EE | Daniel Jackson,
Somesh Jha,
Craig Damon:
Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications.
ACM Trans. Program. Lang. Syst. 20(2): 302-343 (1998) |
16 | EE | Jürgen Dingel,
David Garlan,
Somesh Jha,
David Notkin:
Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning.
Formal Asp. Comput. 10(3): 193-213 (1998) |
1997 |
15 | | Onn Shehory,
Katia P. Sycara,
Somesh Jha:
Multi-Agent Coordination through Coalition Formation.
ATAL 1997: 143-154 |
14 | | Somesh Jha,
Yuan Lu,
Marius Minea,
Edmund M. Clarke:
Equivalence Checking Using Abstract BDDs.
ICCD 1997: 332-337 |
13 | | E. Allen Emerson,
Somesh Jha,
Doron Peled:
Combining Partial Order and Symmetry Reductions.
TACAS 1997: 19-34 |
12 | EE | Edmund M. Clarke,
Orna Grumberg,
Somesh Jha:
Verifying Parameterized Networks.
ACM Trans. Program. Lang. Syst. 19(5): 726-750 (1997) |
11 | EE | Anca Browne,
Edmund M. Clarke,
Somesh Jha,
David E. Long,
Wilfredo R. Marrero:
An Improved Algorithm for the Evaluation of Fixpoint Expressions.
Theor. Comput. Sci. 178(1-2): 237-255 (1997) |
1996 |
10 | | Prasad Chalasani,
Somesh Jha,
Isaac Saias:
Approximate Option Pricing.
FOCS 1996: 244-253 |
9 | EE | Daniel Jackson,
Somesh Jha,
Craig Damon:
Faster Checking of Software Specifications by Eliminating Isomorphs.
POPL 1996: 79-90 |
8 | EE | Craig Damon,
Daniel Jackson,
Somesh Jha:
Checking Relational Specifications With Binary Decision Diagrams.
SIGSOFT FSE 1996: 70-80 |
7 | | Edmund M. Clarke,
Somesh Jha,
Reinhard Enders,
Thomas Filkorn:
Exploiting Symmetry in Temporal Logic Model Checking.
Formal Methods in System Design 9(1/2): 77-104 (1996) |
1995 |
6 | | Edmund M. Clarke,
Orna Grumberg,
Somesh Jha:
Veryfying Parameterized Networks using Abstraction and Regular Languages.
CONCUR 1995: 395-407 |
5 | | Edmund M. Clarke,
Somesh Jha:
Symmetry and Induction in Model Checking.
Computer Science Today 1995: 455-470 |
4 | | Edmund M. Clarke,
Orna Grumberg,
Hiromi Hiraishi,
Somesh Jha,
David E. Long,
Kenneth L. McMillan,
Linda A. Ness:
Verification of the Futurebus+ Cache Coherence Protocol.
Formal Methods in System Design 6(2): 217-232 (1995) |
1994 |
3 | | David E. Long,
Anca Browne,
Edmund M. Clarke,
Somesh Jha,
Wilfredo R. Marrero:
An Improved Algorithm for the Evaluation of Fixpoint Expressions.
CAV 1994: 338-350 |
1993 |
2 | | Edmund M. Clarke,
Thomas Filkorn,
Somesh Jha:
Exploiting Symmetry In Temporal Logic Model Checking.
CAV 1993: 450-462 |
1 | | Edmund M. Clarke,
Orna Grumberg,
Hiromi Hiraishi,
Somesh Jha,
David E. Long,
Kenneth L. McMillan,
Linda A. Ness:
Verification of the Futurebus+ Cache Coherence Protocol.
CHDL 1993: 15-30 |