dblp.uni-trier.dewww.uni-trier.de

Somesh Jha

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
96 Peng Ning, Paul F. Syverson, Somesh Jha: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 ACM 2008
95EEVinod Ganapathy, Matthew J. Renzelmann, Arini Balakrishnan, Michael M. Swift, Somesh Jha: The design and implementation of microdrivers. ASPLOS 2008: 168-178
94EERandy Smith, Cristian Estan, Somesh Jha, Ida Siahaan: Fast Signature Matching Using Extended Finite Automaton (XFA). ICISS 2008: 158-172
93EERandy Smith, Cristian Estan, Somesh Jha: XFA: Faster Signature Matching with Extended Automata. IEEE Symposium on Security and Privacy 2008: 187-201
92EESomesh Jha, Louis Kruger, Vitaly Shmatikov: Towards Practical Privacy for Genomic Computation. IEEE Symposium on Security and Privacy 2008: 216-230
91EEMihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ISEC 2008: 5-14
90EELorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell: A Layered Architecture for Detecting Malicious Behaviors. RAID 2008: 78-97
89EERandy Smith, Cristian Estan, Somesh Jha, Shijin Kong: Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. SIGCOMM 2008: 207-218
88EEDave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia: Effective blame for information-flow violations. SIGSOFT FSE 2008: 250-260
87EEMila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray: A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst. 30(5): (2008)
86EEDavid Brumley, James Newsome, D. Song, Hao Wang, Somesh Jha: Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. IEEE Trans. Dependable Sec. Comput. 5(4): 224-241 (2008)
2007
85EELorenzo Martignoni, Mihai Christodorescu, Somesh Jha: OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. ACSAC 2007: 431-441
84EEDavid Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song: Creating Vulnerability Signatures Using Weakest Preconditions. CSF 2007: 311-325
83EEMihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ESEC/SIGSOFT FSE 2007: 5-14
82EEVinod Ganapathy, Dave King, Trent Jaeger, Somesh Jha: Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. ICSE 2007: 458-467
81EESomesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney: Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. IEEE Symposium on Security and Privacy 2007: 179-186
80EEMila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray: A semantics-based approach to malware detection. POPL 2007: 377-388
79EEMihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith: Software transformations to improve malware detection. Journal in Computer Virology 3(4): 253-265 (2007)
2006
78EELouis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh: Secure function evaluation with ordered binary decision diagrams. ACM Conference on Computer and Communications Security 2006: 410-420
77EEShai Rubin, Somesh Jha, Barton P. Miller: Protomatching network traffic for high throughputnetwork intrusion detection. ACM Conference on Computer and Communications Security 2006: 47-58
76EERandy Smith, Cristian Estan, Somesh Jha: Backtracking Algorithmic Complexity Attacks against a NIDS. ACSAC 2006: 89-98
75EEHao Wang, Somesh Jha, Vinod Ganapathy: NetSpy: Automatic Generation of Spyware Signatures for NIDS. ACSAC 2006: 99-108
74EEShai Rubin, Somesh Jha, Barton P. Miller: On the Completeness of Attack Mutation Algorithms. CSFW 2006: 43-56
73EEHao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine: Reducing the Dependence of SPKI/SDSI on PKI. ESORICS 2006: 156-173
72EEDavid Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha: Towards Automatic Generation of Vulnerability-Based Signatures. IEEE Symposium on Security and Privacy 2006: 2-16
71EEVinod Ganapathy, Trent Jaeger, Somesh Jha: Retrofitting Legacy Code for Authorization Policy Enforcement. IEEE Symposium on Security and Privacy 2006: 214-229
70EEJonathon T. Giffin, Somesh Jha, Barton P. Miller: Automated Discovery of Mimicry Attacks. RAID 2006: 41-60
69EESomesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps: Weighted Pushdown Systems and Trust-Management Systems. TACAS 2006: 1-26
2005
68EEVinod Ganapathy, Trent Jaeger, Somesh Jha: Automatic placement of authorization hooks in the linux security modules framework. ACM Conference on Computer and Communications Security 2005: 330-339
67EESomesh Jha, Louis Kruger, Patrick McDaniel: Privacy Preserving Clustering. ESORICS 2005: 397-417
66EEMuthian Sivathanu, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Somesh Jha: A Logic of File Systems. FAST 2005
65EEVinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant: Automatic discovery of API-level exploits. ICSE 2005: 312-321
64EEShai Rubin, Somesh Jha, Barton P. Miller: Language-Based Generation and Evaluation of NIDS Signatures. IEEE Symposium on Security and Privacy 2005: 3-17
63EEMihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant: Semantics-Aware Malware Detection. IEEE Symposium on Security and Privacy 2005: 32-46
62EEJonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller: Environment-Sensitive Intrusion Detection. RAID 2005: 185-206
61EESagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith: An Iterative Framework for Simulation Conformance. J. Log. Comput. 15(4): 465-488 (2005)
60EEThomas W. Reps, Stefan Schwoon, Somesh Jha, David Melski: Weighted pushdown systems and their application to interprocedural dataflow analysis. Sci. Comput. Program. 58(1-2): 206-263 (2005)
2004
59EEShai Rubin, Somesh Jha, Barton P. Miller: Automatic Generation and Analysis of NIDS Attacks. ACSAC 2004: 28-38
58EEHenry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller: Formalizing Sensitivity in Static Analysis for Intrusion Detection. IEEE Symposium on Security and Privacy 2004: 194-
57EEMihai Christodorescu, Somesh Jha: Testing malware detectors. ISSTA 2004: 34-44
56EEJonathon T. Giffin, Somesh Jha, Barton P. Miller: Efficient Context-Sensitive Intrusion Detection. NDSS 2004
55EEVinod Yegneswaran, Paul Barford, Somesh Jha: Global Intrusion Detection in the DOMINO Overlay System. NDSS 2004
54EEHao Wang, Somesh Jha, Miron Livny, Patrick Drew McDaniel: Security Policy Reconciliation in Distributed Computing Environments. POLICY 2004: 137-
53EESagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith: Modular Verification of Software Components in C. IEEE Trans. Software Eng. 30(6): 388-402 (2004)
52 Somesh Jha, Thomas W. Reps: Model checking SPKI/SDSI. Journal of Computer Security 12(3-4): 317-353 (2004)
2003
51EEVinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek: Buffer overrun detection using linear programming and static analysis. ACM Conference on Computer and Communications Security 2003: 345-354
50EEStefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine: On Generalized Authorization Problems. CSFW 2003: 202-
49EESagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith: Modular Verification of Software Components in C. ICSE 2003: 385-395
48EEThomas W. Reps, Stefan Schwoon, Somesh Jha: Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis. SAS 2003: 189-213
47 Sagar Chaki, Pascal Fenkam, Harald Gall, Somesh Jha, Engin Kirda, Helmut Veith: Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. SEKE 2003: 510-517
46EEEdmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Counterexample-guided abstraction refinement for symbolic model checking. J. ACM 50(5): 752-794 (2003)
45EEEdmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Efficient verification of security protocols using partial-order reductions. STTT 4(2): 173-188 (2003)
2002
44EESomesh Jha, Thomas W. Reps: Analysis of SPKI/SDSI Certificates Using Model Checking. CSFW 2002: 129-
43EESomesh Jha, Oleg Sheyner, Jeannette M. Wing: Two Formal Analys s of Attack Graphs. CSFW 2002: 49-63
42EESomesh Jha, Jens Palsberg, Tian Zhao: Efficient Type Matching. FoSSaCS 2002: 187-204
41EEOleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing: Automated Generation and Analysis of Attack Graphs. IEEE Symposium on Security and Privacy 2002: 273-284
40EEEdmund M. Clarke, Somesh Jha, Yuan Lu, Helmut Veith: Tree-Like Counterexamples in Model Checking. LICS 2002: 19-29
39EEJonathon T. Giffin, Somesh Jha, Barton P. Miller: Detecting Manipulated Remote Call Streams. USENIX Security Symposium 2002: 61-79
2001
38EEPankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Helmut Veith, Dong Wang: Using Combinatorial Optimization Methods for Quantification Scheduling. CHARME 2001: 293-309
37EESomesh Jha, Kymie M. C. Tan, Roy A. Maxion: Markov Chains, Classifiers, and Intrusion Detection. CSFW 2001: 206-219
36EEPankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Thomas R. Shiple, Helmut Veith, Dong Wang: Non-linear Quantification Scheduling in Image Computation. ICCAD 2001: 293-
35 Somesh Jha, Jeannette M. Wing: Survivability Analysis of Network Systems. ICSE 2001: 307-317
34 Alexis Campailla, Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith: Efficient Filtering in Publish-Subscribe Systems Using Binary Decision. ICSE 2001: 443-452
33EEEdmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Progress on the State Explosion Problem in Model Checking. Informatics 2001: 176-194
2000
32 Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Counterexample-Guided Abstraction Refinement. CAV 2000: 154-169
31 Sergey Berezin, Edmund M. Clarke, Somesh Jha, Will Marrero: Model checking algorithms for the µ-calculus. Proof, Language, and Interaction 2000: 309-338
30EEEdmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Partial Order Reductions for Security Protocol Verification. TACAS 2000: 503-518
29EEEdmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Verifying security protocols with Brutus. ACM Trans. Softw. Eng. Methodol. 9(4): 443-487 (2000)
1999
28EEEdmund M. Clarke, Somesh Jha, Yuan Lu, Dong Wang: Abstract BDDs: A Technque for Using Abstraction in Model Checking. CHARME 1999: 172-186
27 Somesh Jha, Doron Peled: Generalized Stuttering Equivalence. PDPTA 1999: 1054-1060
26EEPrasad Chalasani, Somesh Jha, Isaac Saias: Approximate Option Pricing. Algorithmica 25(1): 2-21 (1999)
1998
25 Onn Shehory, Katia P. Sycara, Prasad Chalasani, Somesh Jha: Increasing Resource Utilization and Task Performance by Agent Cloning. ATAL 1998: 413-426
24EEPrasad Chalasani, Somesh Jha, Onn Shehory, Katia P. Sycara: Query Restart Strategies for Web Agent. Agents 1998: 124-131
23EESomesh Jha, Prasad Chalasani, Onn Shehory, Katia P. Sycara: A Formal Treatment of Distributed Matchmaking. Agents 1998: 457-458
22 Edmund M. Clarke, E. Allen Emerson, Somesh Jha, A. Prasad Sistla: Symmetry Reductions inModel Checking. CAV 1998: 147-158
21EEPrasad Chalasani, Somesh Jha, Onn Shehory, Katia P. Sycara: Strategies for Querying Information Agents. CIA 1998: 94-107
20 Onn Shehory, Katia P. Sycara, Prasad Chalasani, Somesh Jha: Agent Cloning. ICMAS 1998: 463-464
19 Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Using state space exploration and a natural deduction style message derivation engine to verify security protocols. PROCOMET 1998: 87-106
18EEDavid Garlan, Somesh Jha, David Notkin: Reasoning about Implicit Invocation. SIGSOFT FSE 1998: 209-221
17EEDaniel Jackson, Somesh Jha, Craig Damon: Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications. ACM Trans. Program. Lang. Syst. 20(2): 302-343 (1998)
16EEJürgen Dingel, David Garlan, Somesh Jha, David Notkin: Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning. Formal Asp. Comput. 10(3): 193-213 (1998)
1997
15 Onn Shehory, Katia P. Sycara, Somesh Jha: Multi-Agent Coordination through Coalition Formation. ATAL 1997: 143-154
14 Somesh Jha, Yuan Lu, Marius Minea, Edmund M. Clarke: Equivalence Checking Using Abstract BDDs. ICCD 1997: 332-337
13 E. Allen Emerson, Somesh Jha, Doron Peled: Combining Partial Order and Symmetry Reductions. TACAS 1997: 19-34
12EEEdmund M. Clarke, Orna Grumberg, Somesh Jha: Verifying Parameterized Networks. ACM Trans. Program. Lang. Syst. 19(5): 726-750 (1997)
11EEAnca Browne, Edmund M. Clarke, Somesh Jha, David E. Long, Wilfredo R. Marrero: An Improved Algorithm for the Evaluation of Fixpoint Expressions. Theor. Comput. Sci. 178(1-2): 237-255 (1997)
1996
10 Prasad Chalasani, Somesh Jha, Isaac Saias: Approximate Option Pricing. FOCS 1996: 244-253
9EEDaniel Jackson, Somesh Jha, Craig Damon: Faster Checking of Software Specifications by Eliminating Isomorphs. POPL 1996: 79-90
8EECraig Damon, Daniel Jackson, Somesh Jha: Checking Relational Specifications With Binary Decision Diagrams. SIGSOFT FSE 1996: 70-80
7 Edmund M. Clarke, Somesh Jha, Reinhard Enders, Thomas Filkorn: Exploiting Symmetry in Temporal Logic Model Checking. Formal Methods in System Design 9(1/2): 77-104 (1996)
1995
6 Edmund M. Clarke, Orna Grumberg, Somesh Jha: Veryfying Parameterized Networks using Abstraction and Regular Languages. CONCUR 1995: 395-407
5 Edmund M. Clarke, Somesh Jha: Symmetry and Induction in Model Checking. Computer Science Today 1995: 455-470
4 Edmund M. Clarke, Orna Grumberg, Hiromi Hiraishi, Somesh Jha, David E. Long, Kenneth L. McMillan, Linda A. Ness: Verification of the Futurebus+ Cache Coherence Protocol. Formal Methods in System Design 6(2): 217-232 (1995)
1994
3 David E. Long, Anca Browne, Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: An Improved Algorithm for the Evaluation of Fixpoint Expressions. CAV 1994: 338-350
1993
2 Edmund M. Clarke, Thomas Filkorn, Somesh Jha: Exploiting Symmetry In Temporal Logic Model Checking. CAV 1993: 450-462
1 Edmund M. Clarke, Orna Grumberg, Hiromi Hiraishi, Somesh Jha, David E. Long, Kenneth L. McMillan, Linda A. Ness: Verification of the Futurebus+ Cache Coherence Protocol. CHDL 1993: 15-30

Coauthor Index

1Andrea C. Arpaci-Dusseau [66]
2Remzi H. Arpaci-Dusseau [66]
3Arini Balakrishnan [95]
4Paul Barford [55]
5Sergey Berezin [31]
6Dan Boneh [78]
7Anca Browne (I. A. Draghicescu) [3] [11]
8David Brumley [72] [84] [86]
9Randal E. Bryant [63] [65]
10Alexis Campailla [34]
11Sagar Chaki [34] [47] [49] [53] [61]
12Prasad Chalasani [10] [20] [21] [23] [24] [25] [26]
13David Chandler [51]
14Pankaj Chauhan [36] [38]
15Stephen Chenney [81]
16Mihai Christodorescu [57] [63] [79] [80] [83] [85] [87] [91]
17Edmund M. Clarke [1] [2] [3] [4] [5] [6] [7] [11] [12] [14] [19] [22] [28] [29] [30] [31] [32] [33] [34] [36] [38] [40] [45] [46] [49] [53] [61]
18David Dagon [62]
19Craig Damon [8] [9] [17]
20Saumya K. Debray [80] [87]
21Jürgen Dingel [16]
22E. Allen Emerson [13] [22]
23Reinhard Enders [7]
24Cristian Estan [76] [89] [93] [94]
25Henry Hanping Feng [58]
26Pascal Fenkam [47]
27Thomas Filkorn [2] [7]
28Matt Fredrikson [90]
29Harald Gall [47]
30Vinod Ganapathy [51] [65] [68] [71] [75] [82] [95]
31David Garlan [16] [18]
32Jonathon T. Giffin [39] [56] [58] [62] [70]
33Eu-Jin Goh [78]
34Alex Groce [49] [53]
35Orna Grumberg [1] [4] [6] [12] [32] [33] [46]
36Joshua W. Haines [41]
37Hiromi Hiraishi [1] [4]
38Yong Huang [58]
39Daniel Jackson [8] [9] [17]
40Trent Jaeger [68] [71] [82] [88]
41Stefan Katzenbeisser [79] [81]
42Johannes Kinder [79]
43Dave King [82] [88]
44Engin Kirda [47]
45Shijin Kong [89]
46Christopher Krügel (Christopher Kruegel) [83] [91]
47Louis Kruger [67] [78] [92]
48James H. Kukula [36] [38]
49Wenke Lee [58] [62]
50Richard Lippmann [41]
51Miron Livny [54]
52David E. Long [1] [3] [4] [11]
53Yuan Lu [14] [28] [32] [33] [40] [46]
54Wilfredo R. Marrero [3] [11] [19] [29] [30] [45]
55Will Marrero [31]
56Lorenzo Martignoni [85] [90]
57Roy A. Maxion [37]
58Patrick Drew McDaniel (Patrick McDaniel) [54] [67]
59Kenneth L. McMillan [1] [4]
60David Melski [51] [60]
61Barton P. Miller [39] [56] [58] [59] [62] [64] [70] [74] [77]
62Marius Minea [14]
63John C. Mitchell [90]
64Linda A. Ness [1] [4]
65James Newsome [72] [86]
66Peng Ning [96]
67David Notkin [16] [18]
68Jens Palsberg [42]
69Doron Peled [13] [27]
70Mila Dalla Preda [80] [87]
71Matthew J. Renzelmann [95]
72Thomas W. Reps [44] [48] [50] [52] [60] [65] [69] [73]
73Shai Rubin [59] [64] [74] [77]
74Isaac Saias [10] [26]
75Christian Schallhart [81]
76Stefan Schwoon [48] [50] [60] [69] [73]
77Sanjit A. Seshia [63] [65] [88]
78Onn Shehory [15] [20] [21] [23] [24] [25]
79Oleg Sheyner [41] [43]
80Thomas R. Shiple [36]
81Vitaly Shmatikov [92]
82Ida Siahaan [94]
83A. Prasad Sistla [22]
84Muthian Sivathanu [66]
85Randy Smith [76] [89] [93] [94]
86D. Song [86]
87Dawn Xiaodong Song [63] [72] [84]
88Elizabeth Stinson [90]
89Stuart G. Stubblebine [50] [73]
90Michael M. Swift [95]
91Katia P. Sycara [15] [20] [21] [23] [24] [25]
92Paul F. Syverson [96]
93Kymie M. C. Tan [37]
94Helmut Veith [32] [33] [34] [36] [38] [40] [46] [47] [49] [53] [61] [79] [81]
95David Vitek [51]
96Dong Wang [28] [36] [38]
97Hao Wang [54] [69] [72] [73] [75] [84] [86]
98Jeannette M. Wing [35] [41] [43]
99Vinod Yegneswaran [55]
100Tian Zhao [42]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)