| 2008 |
| 86 | | Georg Carle,
Falko Dressler,
Richard A. Kemmerer,
Hartmut König,
Christopher Kruegel:
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 |
| 85 | EE | Davide Balzarotti,
Greg Banks,
Marco Cova,
Viktoria Felmetsger,
Richard A. Kemmerer,
William K. Robertson,
Fredrik Valeur,
Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems.
ISSTA 2008: 237-248 |
| 84 | EE | Georg Carle,
Falko Dressler,
Richard A. Kemmerer,
Hartmut König,
Christopher Kruegel:
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense.
Network Attack Detection and Defense 2008 |
| 83 | EE | Georg Carle,
Falko Dressler,
Richard A. Kemmerer,
Hartmut König,
Christopher Kruegel,
Pavel Laskov:
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense.
Network Attack Detection and Defense 2008 |
| 82 | EE | Richard A. Kemmerer,
Roland Büschkes,
Ali Fessi,
Hartmut König,
Peter Herrmann,
Stephen D. Wolthusen,
Marko Jahnke,
Hervé Debar,
Ralph Holz,
Tanja Zseby,
Dirk Haage:
08102 Outcome Working Group -- Situational Awareness.
Network Attack Detection and Defense 2008 |
| 2007 |
| 81 | EE | Richard A. Kemmerer:
So You Think You Can Dance?
ACSAC 2007: 3-17 |
| 80 | EE | Darren Mutz,
William K. Robertson,
Giovanni Vigna,
Richard A. Kemmerer:
Exploiting Execution Context for the Detection of Anomalous System Calls.
RAID 2007: 1-20 |
| 79 | EE | André Årnes,
Paul Haas,
Giovanni Vigna,
Richard A. Kemmerer:
Using a virtual security testbed for digital forensic reconstruction.
Journal in Computer Virology 2(4): 275-289 (2007) |
| 2006 |
| 78 | EE | André Årnes,
Paul Haas,
Giovanni Vigna,
Richard A. Kemmerer:
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.
DIMVA 2006: 144-163 |
| 77 | EE | Greg Banks,
Marco Cova,
Viktoria Felmetsger,
Kevin C. Almeroth,
Richard A. Kemmerer,
Giovanni Vigna:
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr.
ISC 2006: 343-358 |
| 76 | EE | William K. Robertson,
Giovanni Vigna,
Christopher Krügel,
Richard A. Kemmerer:
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
NDSS 2006 |
| 75 | EE | André Årnes,
Fredrik Valeur,
Giovanni Vigna,
Richard A. Kemmerer:
Using Hidden Markov Models to Evaluate the Risks of Intrusions.
RAID 2006: 145-164 |
| 2005 |
| 74 | EE | Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems.
ASE 2005: 3 |
| 2004 |
| 73 | EE | Giovanni Vigna,
Sumit Gwalani,
Kavitha Srinivasan,
Elizabeth M. Belding-Royer,
Richard A. Kemmerer:
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks.
ACSAC 2004: 16-27 |
| 72 | EE | Fredrik Valeur,
Giovanni Vigna,
Christopher Krügel,
Richard A. Kemmerer:
A Comprehensive Approach to Intrusion Detection Alert Correlation.
IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004) |
| 71 | EE | Zhe Dang,
Tevfik Bultan,
Oscar H. Ibarra,
Richard A. Kemmerer:
Past pushdown timed automata and safety verification.
Theor. Comput. Sci. 313(1): 57-71 (2004) |
| 2003 |
| 70 | EE | Giovanni Vigna,
William K. Robertson,
Vishal Kher,
Richard A. Kemmerer:
A Stateful Intrusion Detection System for World-Wide Web Servers.
ACSAC 2003: 34-45 |
| 69 | EE | Darren Mutz,
Giovanni Vigna,
Richard A. Kemmerer:
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems.
ACSAC 2003: 374-383 |
| 68 | EE | Giovanni Vigna,
Fredrik Valeur,
Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems.
ESEC / SIGSOFT FSE 2003: 88-97 |
| 67 | EE | Richard A. Kemmerer:
Cybersecurity.
ICSE 2003: 705-717 |
| 66 | EE | Richard A. Kemmerer,
Giovanni Vigna:
Internet Security and Intrusion Detection.
ICSE 2003: 748-749 |
| 65 | EE | Zhe Dang,
Pierluigi San Pietro,
Richard A. Kemmerer:
Presburger liveness verification of discrete timed automata.
Theor. Comput. Sci. 1-3(299): 413-438 (2003) |
| 64 | EE | Zhe Dang,
Oscar H. Ibarra,
Richard A. Kemmerer:
Generalized discrete timed automata: decidable approximations for safety verificatio.
Theor. Comput. Sci. 296(1): 59-74 (2003) |
| 2002 |
| 63 | EE | Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later.
ACSAC 2002: 109-118 |
| 62 | EE | Giovanni Vigna,
Fredrik Valeur,
Jingyu Zhou,
Richard A. Kemmerer:
Composable Tools For Network Discovery and Security Analysis.
ACSAC 2002: 14-24 |
| 61 | EE | Christopher Krügel,
Fredrik Valeur,
Giovanni Vigna,
Richard A. Kemmerer:
Stateful Intrusion Detection for High-Speed Networks.
IEEE Symposium on Security and Privacy 2002: 285- |
| 60 | | Steve T. Eckmann,
Giovanni Vigna,
Richard A. Kemmerer:
STATL: An Attack Language for State-Based Intrusion Detection.
Journal of Computer Security 10(1/2): 71-104 (2002) |
| 59 | | Oscar H. Ibarra,
Jianwen Su,
Zhe Dang,
Tevfik Bultan,
Richard A. Kemmerer:
Counter Machines and Verification Problems.
Theor. Comput. Sci. 289(1): 165-189 (2002) |
| 2001 |
| 58 | EE | Zhe Dang,
Tevfik Bultan,
Oscar H. Ibarra,
Richard A. Kemmerer:
Past Pushdown Timed Automata.
CIAA 2001: 74-86 |
| 57 | EE | Zhe Dang,
Oscar H. Ibarra,
Richard A. Kemmerer:
Decidable Approximations on Generalized and Parameterized Discrete Timed Automata.
COCOON 2001: 529-539 |
| 56 | EE | Sebastian Fischmeister,
Giovanni Vigna,
Richard A. Kemmerer:
Evaluating the Security of Three Java-Based Mobile Agent Systems.
Mobile Agents 2001: 31-41 |
| 55 | EE | Giovanni Vigna,
Richard A. Kemmerer,
Per Blix:
Designing a Web of Highly-Configurable Intrusion Detection Sensors.
Recent Advances in Intrusion Detection 2001: 69-84 |
| 54 | EE | Zhe Dang,
Pierluigi San Pietro,
Richard A. Kemmerer:
On Presburger Liveness of Discrete Timed Automata.
STACS 2001: 132-143 |
| 2000 |
| 53 | EE | André L. M. dos Santos,
Richard A. Kemmerer:
Implementing Security Policies using the Safe Areas of Computation Approach.
ACSAC 2000: 90-99 |
| 52 | | Zhe Dang,
Oscar H. Ibarra,
Tevfik Bultan,
Richard A. Kemmerer,
Jianwen Su:
Binary Reachability Analysis of Discrete Pushdown Timed Automata.
CAV 2000: 69-84 |
| 51 | EE | Paul Z. Kolano,
Richard A. Kemmerer,
Dino Mandrioli:
Parallel Refinement Mechanisms for Real-Time Systems.
FASE 2000: 35-50 |
| 50 | EE | Zhe Dang,
Richard A. Kemmerer:
Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems.
ICSE 2000: 345-354 |
| 49 | EE | Paul Z. Kolano,
Richard A. Kemmerer:
Classification schemes to aid in the analysis of real-time systems.
ISSTA 2000: 86-95 |
| 48 | EE | Oscar H. Ibarra,
Jianwen Su,
Zhe Dang,
Tevfik Bultan,
Richard A. Kemmerer:
Conter Machines: Decidable Properties and Applications to Verification Problems.
MFCS 2000: 426-435 |
| 47 | EE | Richard A. Kemmerer:
Editorial.
IEEE Trans. Software Eng. 26(2): 97 (2000) |
| 1999 |
| 46 | EE | André L. M. dos Santos,
Richard A. Kemmerer:
Safe Areas of Computation for Secure Computing with Insecure Applications.
ACSAC 1999: 35-44 |
| 45 | EE | Zhe Dang,
Richard A. Kemmerer:
Using the ASTRAL Model Checker to Analyze Mobile IP.
ICSE 1999: 132-142 |
| 44 | EE | Zhe Dang,
Richard A. Kemmerer:
A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications.
RTCSA 1999: 174-181 |
| 43 | | Paul Z. Kolano,
Zhe Dang,
Richard A. Kemmerer:
The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment.
Ann. Software Eng. 7: 177-210 (1999) |
| 42 | EE | Richard A. Kemmerer:
Editor's Note.
IEEE Trans. Software Eng. 25(4): 433-434 (1999) |
| 41 | EE | Richard A. Kemmerer:
Editorial.
IEEE Trans. Software Eng. 25(6): 745-746 (1999) |
| 40 | | Giovanni Vigna,
Richard A. Kemmerer:
NetSTAT: A Network-based Intrusion Detection System.
Journal of Computer Security 7(1): (1999) |
| 1998 |
| 39 | EE | Giovanni Vigna,
Richard A. Kemmerer:
NetSTAT: A Network-Based Intrusion Detection Approach.
ACSAC 1998: 25- |
| 38 | EE | Richard G. Hamlet,
Richard A. Kemmerer,
Edward F. Miller,
Debra J. Richardson:
The Most Influential Papers from the ISSTA Research Community (Panel).
ISSTA 1998: 49 |
| 37 | EE | Flavio De Paoli,
André L. M. dos Santos,
Richard A. Kemmerer:
Web Browsers and Security.
Mobile Agents and Security 1998: 235-256 |
| 1997 |
| 36 | EE | Richard A. Kemmerer:
Security Issues in Distributed Software.
ESEC / SIGSOFT FSE 1997: 52-59 |
| 35 | | Richard A. Kemmerer:
Formally Specifying and Verifying Real-Time Systems.
ICFEM 1997: 112- |
| 34 | EE | Alberto Coen-Porisini,
Carlo Ghezzi,
Richard A. Kemmerer:
Specification of Realtime Systems Using ASTRAL.
IEEE Trans. Software Eng. 23(9): 572-598 (1997) |
| 1996 |
| 33 | EE | Richard A. Kemmerer,
Tad Taylor:
A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/.
ACSAC 1996: 224-235 |
| 32 | EE | Richard Denney,
Richard A. Kemmerer,
Nancy G. Leveson,
Alberto Savoia:
Why State-of-the-Art is not State-of-the-Practice (Panel Abstract).
ISSTA 1996: 293 |
| 1995 |
| 31 | | Alberto Coen-Porisini,
Richard A. Kemmerer,
Dino Mandrioli:
A Formal Framework for ASTRAL Inter-level Proof Obligations.
ESEC 1995: 90-108 |
| 30 | EE | Koral Ilgun,
Richard A. Kemmerer,
Phillip A. Porras:
State Transition Analysis: A Rule-Based Intrusion Detection Approach.
IEEE Trans. Software Eng. 21(3): 181-199 (1995) |
| 1994 |
| 29 | EE | Jeffrey Douglas,
Richard A. Kemmerer:
Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications.
ISSTA 1994: 15-27 |
| 28 | EE | Alberto Coen-Porisini,
Richard A. Kemmerer,
Dino Mandrioli:
A Formal Framework for ASTRAL Intralevel Proof Obligations.
IEEE Trans. Software Eng. 20(8): 548-561 (1994) |
| 27 | | Richard A. Kemmerer,
Catherine Meadows,
Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis.
J. Cryptology 7(2): 79-130 (1994) |
| 1993 |
| 26 | EE | Alberto Coen-Porisini,
Richard A. Kemmerer:
The Composability of ASTRAL Realtime Specifications.
ISSTA 1993: 128-138 |
| 1992 |
| 25 | | Jonathan D. Reichbach,
Richard A. Kemmerer:
SoundWorks: An Object-Oriented Distributed System for Digital Sound.
IEEE Computer 25(3): 25-37 (1992) |
| 24 | EE | Richard A. Kemmerer,
Carlo Ghezzi:
Guest Editors' Introduction: Specification and Analysis of Real-Time Systems.
IEEE Trans. Software Eng. 18(9): 766-767 (1992) |
| 1991 |
| 23 | | Carlo Ghezzi,
Richard A. Kemmerer:
ASTRAL: An Assertion Language for Specifying Realtime Systems.
ESEC 1991: 122-146 |
| 22 | | Phillip A. Porras,
Richard A. Kemmerer:
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels.
IEEE Symposium on Security and Privacy 1991: 36-51 |
| 21 | EE | Richard A. Kemmerer,
Phillip A. Porras:
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels.
IEEE Trans. Software Eng. 17(11): 1166-1185 (1991) |
| 1990 |
| 20 | | Richard A. Kemmerer:
A Multilevel Formal Specification of a Mental Health Care Database.
DBSec 1990: 27-52 |
| 19 | | Richard A. Kemmerer:
Integrating Formal Methods into the Development Process.
IEEE Software 7(5): 37-50 (1990) |
| 1989 |
| 18 | | Richard A. Kemmerer:
Formal Specification of a Mental Health Delivery System.
DBSec 1989: 341-351 |
| 17 | | Richard A. Kemmerer:
Completely Validated Software.
ICSE 1989: 359-360 |
| 1987 |
| 16 | EE | Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes.
CRYPTO 1987: 289-305 |
| 15 | | Richard A. Kemmerer:
Formal Specification and Verification Techniques for Secure Database Systems.
DBSec 1987: 229-240 |
| 14 | | Richard A. Kemmerer:
Using Formal Verification Techniques to Analyze Encryption Protocols.
IEEE Symposium on Security and Privacy 1987: 134-139 |
| 13 | | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Trans. Software Eng. 13(2): 157-168 (1987) |
| 1986 |
| 12 | | Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Techniques.
EUROCRYPT 1986: 48 |
| 11 | | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Symposium on Security and Privacy 1986: 14-24 |
| 10 | | Brent Auernheimer,
Richard A. Kemmerer:
RT-ASLAN: A Specification Language for Real-Time Systems.
IEEE Trans. Software Eng. 12(9): 879-889 (1986) |
| 1985 |
| 9 | | Richard A. Kemmerer:
Testing Formal Specifications to Detect Design Errors.
IEEE Trans. Software Eng. 11(1): 32-43 (1985) |
| 8 | EE | J. David Blaine,
Richard A. Kemmerer:
Complexity measures for assembly language programs.
Journal of Systems and Software 5(3): 229-245 (1985) |
| 7 | | Richard A. Kemmerer,
Steven T. Eckman:
UNISEX: A UNIX-based Symbolic EXecutor for Pascal.
Softw., Pract. Exper. 15(5): 439-458 (1985) |
| 1983 |
| 6 | | Thomas H. Hinke,
Jose Althouse,
Richard A. Kemmerer:
SDC Secure Release Terminal Project.
IEEE Symposium on Security and Privacy 1983: 113-119 |
| 5 | EE | Richard A. Kemmerer:
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
ACM Trans. Comput. Syst. 1(3): 256-277 (1983) |
| 1982 |
| 4 | | Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels.
IEEE Symposium on Security and Privacy 1982: 66-73 |
| 1980 |
| 3 | | Bruce J. Walker,
Richard A. Kemmerer,
Gerald J. Popek:
Specification and Verification of the UCLA Unix Security Kernel.
Commun. ACM 23(2): 118-131 (1980) |
| 2 | | Daniel M. Berry,
Richard A. Kemmerer,
Arndt von Staa,
Shaula Yemini:
Toward Modular Verifiable Exception Handling.
Comput. Lang. 5(2): 77-101 (1980) |
| 1979 |
| 1 | | Bruce J. Walker,
Richard A. Kemmerer,
Gerald J. Popek:
Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract).
SOSP 1979: 64-65 |