dblp.uni-trier.dewww.uni-trier.de

Richard A. Kemmerer

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
86 Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
85EEDavide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248
84EEGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
83EEGeorg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
82EERichard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage: 08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008
2007
81EERichard A. Kemmerer: So You Think You Can Dance? ACSAC 2007: 3-17
80EEDarren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer: Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20
79EEAndré Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Using a virtual security testbed for digital forensic reconstruction. Journal in Computer Virology 2(4): 275-289 (2007)
2006
78EEAndré Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. DIMVA 2006: 144-163
77EEGreg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna: SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358
76EEWilliam K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006
75EEAndré Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164
2005
74EERichard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ASE 2005: 3
2004
73EEGiovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer: An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. ACSAC 2004: 16-27
72EEFredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004)
71EEZhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer: Past pushdown timed automata and safety verification. Theor. Comput. Sci. 313(1): 57-71 (2004)
2003
70EEGiovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer: A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-45
69EEDarren Mutz, Giovanni Vigna, Richard A. Kemmerer: An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ACSAC 2003: 374-383
68EEGiovanni Vigna, Fredrik Valeur, Richard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97
67EERichard A. Kemmerer: Cybersecurity. ICSE 2003: 705-717
66EERichard A. Kemmerer, Giovanni Vigna: Internet Security and Intrusion Detection. ICSE 2003: 748-749
65EEZhe Dang, Pierluigi San Pietro, Richard A. Kemmerer: Presburger liveness verification of discrete timed automata. Theor. Comput. Sci. 1-3(299): 413-438 (2003)
64EEZhe Dang, Oscar H. Ibarra, Richard A. Kemmerer: Generalized discrete timed automata: decidable approximations for safety verificatio. Theor. Comput. Sci. 296(1): 59-74 (2003)
2002
63EERichard A. Kemmerer: A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. ACSAC 2002: 109-118
62EEGiovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer: Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24
61EEChristopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285-
60 Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer: STATL: An Attack Language for State-Based Intrusion Detection. Journal of Computer Security 10(1/2): 71-104 (2002)
59 Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer: Counter Machines and Verification Problems. Theor. Comput. Sci. 289(1): 165-189 (2002)
2001
58EEZhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer: Past Pushdown Timed Automata. CIAA 2001: 74-86
57EEZhe Dang, Oscar H. Ibarra, Richard A. Kemmerer: Decidable Approximations on Generalized and Parameterized Discrete Timed Automata. COCOON 2001: 529-539
56EESebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer: Evaluating the Security of Three Java-Based Mobile Agent Systems. Mobile Agents 2001: 31-41
55EEGiovanni Vigna, Richard A. Kemmerer, Per Blix: Designing a Web of Highly-Configurable Intrusion Detection Sensors. Recent Advances in Intrusion Detection 2001: 69-84
54EEZhe Dang, Pierluigi San Pietro, Richard A. Kemmerer: On Presburger Liveness of Discrete Timed Automata. STACS 2001: 132-143
2000
53EEAndré L. M. dos Santos, Richard A. Kemmerer: Implementing Security Policies using the Safe Areas of Computation Approach. ACSAC 2000: 90-99
52 Zhe Dang, Oscar H. Ibarra, Tevfik Bultan, Richard A. Kemmerer, Jianwen Su: Binary Reachability Analysis of Discrete Pushdown Timed Automata. CAV 2000: 69-84
51EEPaul Z. Kolano, Richard A. Kemmerer, Dino Mandrioli: Parallel Refinement Mechanisms for Real-Time Systems. FASE 2000: 35-50
50EEZhe Dang, Richard A. Kemmerer: Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems. ICSE 2000: 345-354
49EEPaul Z. Kolano, Richard A. Kemmerer: Classification schemes to aid in the analysis of real-time systems. ISSTA 2000: 86-95
48EEOscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer: Conter Machines: Decidable Properties and Applications to Verification Problems. MFCS 2000: 426-435
47EERichard A. Kemmerer: Editorial. IEEE Trans. Software Eng. 26(2): 97 (2000)
1999
46EEAndré L. M. dos Santos, Richard A. Kemmerer: Safe Areas of Computation for Secure Computing with Insecure Applications. ACSAC 1999: 35-44
45EEZhe Dang, Richard A. Kemmerer: Using the ASTRAL Model Checker to Analyze Mobile IP. ICSE 1999: 132-142
44EEZhe Dang, Richard A. Kemmerer: A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications. RTCSA 1999: 174-181
43 Paul Z. Kolano, Zhe Dang, Richard A. Kemmerer: The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment. Ann. Software Eng. 7: 177-210 (1999)
42EERichard A. Kemmerer: Editor's Note. IEEE Trans. Software Eng. 25(4): 433-434 (1999)
41EERichard A. Kemmerer: Editorial. IEEE Trans. Software Eng. 25(6): 745-746 (1999)
40 Giovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security 7(1): (1999)
1998
39EEGiovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-Based Intrusion Detection Approach. ACSAC 1998: 25-
38EERichard G. Hamlet, Richard A. Kemmerer, Edward F. Miller, Debra J. Richardson: The Most Influential Papers from the ISSTA Research Community (Panel). ISSTA 1998: 49
37EEFlavio De Paoli, André L. M. dos Santos, Richard A. Kemmerer: Web Browsers and Security. Mobile Agents and Security 1998: 235-256
1997
36EERichard A. Kemmerer: Security Issues in Distributed Software. ESEC / SIGSOFT FSE 1997: 52-59
35 Richard A. Kemmerer: Formally Specifying and Verifying Real-Time Systems. ICFEM 1997: 112-
34EEAlberto Coen-Porisini, Carlo Ghezzi, Richard A. Kemmerer: Specification of Realtime Systems Using ASTRAL. IEEE Trans. Software Eng. 23(9): 572-598 (1997)
1996
33EERichard A. Kemmerer, Tad Taylor: A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/. ACSAC 1996: 224-235
32EERichard Denney, Richard A. Kemmerer, Nancy G. Leveson, Alberto Savoia: Why State-of-the-Art is not State-of-the-Practice (Panel Abstract). ISSTA 1996: 293
1995
31 Alberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli: A Formal Framework for ASTRAL Inter-level Proof Obligations. ESEC 1995: 90-108
30EEKoral Ilgun, Richard A. Kemmerer, Phillip A. Porras: State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Trans. Software Eng. 21(3): 181-199 (1995)
1994
29EEJeffrey Douglas, Richard A. Kemmerer: Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications. ISSTA 1994: 15-27
28EEAlberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli: A Formal Framework for ASTRAL Intralevel Proof Obligations. IEEE Trans. Software Eng. 20(8): 548-561 (1994)
27 Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen: Three System for Cryptographic Protocol Analysis. J. Cryptology 7(2): 79-130 (1994)
1993
26EEAlberto Coen-Porisini, Richard A. Kemmerer: The Composability of ASTRAL Realtime Specifications. ISSTA 1993: 128-138
1992
25 Jonathan D. Reichbach, Richard A. Kemmerer: SoundWorks: An Object-Oriented Distributed System for Digital Sound. IEEE Computer 25(3): 25-37 (1992)
24EERichard A. Kemmerer, Carlo Ghezzi: Guest Editors' Introduction: Specification and Analysis of Real-Time Systems. IEEE Trans. Software Eng. 18(9): 766-767 (1992)
1991
23 Carlo Ghezzi, Richard A. Kemmerer: ASTRAL: An Assertion Language for Specifying Realtime Systems. ESEC 1991: 122-146
22 Phillip A. Porras, Richard A. Kemmerer: Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. IEEE Symposium on Security and Privacy 1991: 36-51
21EERichard A. Kemmerer, Phillip A. Porras: Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. IEEE Trans. Software Eng. 17(11): 1166-1185 (1991)
1990
20 Richard A. Kemmerer: A Multilevel Formal Specification of a Mental Health Care Database. DBSec 1990: 27-52
19 Richard A. Kemmerer: Integrating Formal Methods into the Development Process. IEEE Software 7(5): 37-50 (1990)
1989
18 Richard A. Kemmerer: Formal Specification of a Mental Health Delivery System. DBSec 1989: 341-351
17 Richard A. Kemmerer: Completely Validated Software. ICSE 1989: 359-360
1987
16EERichard A. Kemmerer: Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. CRYPTO 1987: 289-305
15 Richard A. Kemmerer: Formal Specification and Verification Techniques for Secure Database Systems. DBSec 1987: 229-240
14 Richard A. Kemmerer: Using Formal Verification Techniques to Analyze Encryption Protocols. IEEE Symposium on Security and Privacy 1987: 134-139
13 J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Trans. Software Eng. 13(2): 157-168 (1987)
1986
12 Richard A. Kemmerer: Analyzing Encryption Protocols Using Formal Verification Techniques. EUROCRYPT 1986: 48
11 J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Symposium on Security and Privacy 1986: 14-24
10 Brent Auernheimer, Richard A. Kemmerer: RT-ASLAN: A Specification Language for Real-Time Systems. IEEE Trans. Software Eng. 12(9): 879-889 (1986)
1985
9 Richard A. Kemmerer: Testing Formal Specifications to Detect Design Errors. IEEE Trans. Software Eng. 11(1): 32-43 (1985)
8EEJ. David Blaine, Richard A. Kemmerer: Complexity measures for assembly language programs. Journal of Systems and Software 5(3): 229-245 (1985)
7 Richard A. Kemmerer, Steven T. Eckman: UNISEX: A UNIX-based Symbolic EXecutor for Pascal. Softw., Pract. Exper. 15(5): 439-458 (1985)
1983
6 Thomas H. Hinke, Jose Althouse, Richard A. Kemmerer: SDC Secure Release Terminal Project. IEEE Symposium on Security and Privacy 1983: 113-119
5EERichard A. Kemmerer: Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels ACM Trans. Comput. Syst. 1(3): 256-277 (1983)
1982
4 Richard A. Kemmerer: A Practical Approach to Identifying Storage and Timing Channels. IEEE Symposium on Security and Privacy 1982: 66-73
1980
3 Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek: Specification and Verification of the UCLA Unix Security Kernel. Commun. ACM 23(2): 118-131 (1980)
2 Daniel M. Berry, Richard A. Kemmerer, Arndt von Staa, Shaula Yemini: Toward Modular Verifiable Exception Handling. Comput. Lang. 5(2): 77-101 (1980)
1979
1 Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek: Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract). SOSP 1979: 64-65

Coauthor Index

1Kevin C. Almeroth [77]
2Jose Althouse [6]
3André Årnes [75] [78] [79]
4Brent Auernheimer [10]
5Davide Balzarotti [85]
6Greg Banks [77] [85]
7Elizabeth M. Belding-Royer (Elizabeth M. Belding) [73]
8Daniel M. Berry [2]
9J. David Blaine [8]
10Per Blix [55]
11Tevfik Bultan [48] [52] [58] [59] [71]
12Roland Büschkes [82]
13Georg Carle [83] [84] [86]
14Alberto Coen-Porisini [26] [28] [31] [34]
15Marco Cova [77] [85]
16Zhe Dang [43] [44] [45] [48] [50] [52] [54] [57] [58] [59] [64] [65] [71]
17Hervé Debar [82]
18Richard Denney [32]
19Jeffrey Douglas [29]
20Falko Dressler [83] [84] [86]
21Steven T. Eckman [7]
22Steve T. Eckmann [60]
23Viktoria Felmetsger [77] [85]
24Ali Fessi [82]
25Sebastian Fischmeister [56]
26Carlo Ghezzi [23] [24] [34]
27Sumit Gwalani [73]
28Dirk Haage [82]
29Paul Haas [78] [79]
30J. Thomas Haigh [11] [13]
31Richard G. Hamlet [38]
32Peter Herrmann [82]
33Thomas H. Hinke [6]
34Ralph Holz [82]
35Oscar H. Ibarra [48] [52] [57] [58] [59] [64] [71]
36Koral Ilgun [30]
37Marko Jahnke [82]
38Vishal Kher [70]
39Paul Z. Kolano [43] [49] [51]
40Hartmut König [82] [83] [84] [86]
41Christopher Krügel (Christopher Kruegel) [61] [72] [76] [83] [84] [86]
42Pavel Laskov [83]
43Nancy G. Leveson [32]
44Dino Mandrioli [28] [31] [51]
45John McHugh [11] [13]
46Catherine Meadows [27]
47Jonathan K. Millen [27]
48Edward F. Miller [38]
49Darren Mutz [69] [80]
50Flavio De Paoli [37]
51Pierluigi San Pietro [54] [65]
52Gerald J. Popek [1] [3]
53Phillip A. Porras [21] [22] [30]
54Jonathan D. Reichbach [25]
55Debra J. Richardson [38]
56William K. Robertson [70] [76] [80] [85]
57André L. M. dos Santos [37] [46] [53]
58Alberto Savoia [32]
59Kavitha Srinivasan [73]
60Arndt von Staa [2]
61Jianwen Su [48] [52] [59]
62Tad Taylor [33]
63Fredrik Valeur [61] [62] [68] [72] [75] [85]
64Giovanni Vigna [39] [40] [55] [56] [60] [61] [62] [66] [68] [69] [70] [72] [73] [75] [76] [77] [78] [79] [80] [85]
65Bruce J. Walker [1] [3]
66Stephen D. Wolthusen [82]
67Shaula Yemini [2]
68William D. Young [11] [13]
69Jingyu Zhou [62]
70Tanja Zseby [82]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)