2008 |
86 | | Georg Carle,
Falko Dressler,
Richard A. Kemmerer,
Hartmut König,
Christopher Kruegel:
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 |
85 | EE | Davide Balzarotti,
Greg Banks,
Marco Cova,
Viktoria Felmetsger,
Richard A. Kemmerer,
William K. Robertson,
Fredrik Valeur,
Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems.
ISSTA 2008: 237-248 |
84 | EE | Georg Carle,
Falko Dressler,
Richard A. Kemmerer,
Hartmut König,
Christopher Kruegel:
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense.
Network Attack Detection and Defense 2008 |
83 | EE | Georg Carle,
Falko Dressler,
Richard A. Kemmerer,
Hartmut König,
Christopher Kruegel,
Pavel Laskov:
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense.
Network Attack Detection and Defense 2008 |
82 | EE | Richard A. Kemmerer,
Roland Büschkes,
Ali Fessi,
Hartmut König,
Peter Herrmann,
Stephen D. Wolthusen,
Marko Jahnke,
Hervé Debar,
Ralph Holz,
Tanja Zseby,
Dirk Haage:
08102 Outcome Working Group -- Situational Awareness.
Network Attack Detection and Defense 2008 |
2007 |
81 | EE | Richard A. Kemmerer:
So You Think You Can Dance?
ACSAC 2007: 3-17 |
80 | EE | Darren Mutz,
William K. Robertson,
Giovanni Vigna,
Richard A. Kemmerer:
Exploiting Execution Context for the Detection of Anomalous System Calls.
RAID 2007: 1-20 |
79 | EE | André Årnes,
Paul Haas,
Giovanni Vigna,
Richard A. Kemmerer:
Using a virtual security testbed for digital forensic reconstruction.
Journal in Computer Virology 2(4): 275-289 (2007) |
2006 |
78 | EE | André Årnes,
Paul Haas,
Giovanni Vigna,
Richard A. Kemmerer:
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.
DIMVA 2006: 144-163 |
77 | EE | Greg Banks,
Marco Cova,
Viktoria Felmetsger,
Kevin C. Almeroth,
Richard A. Kemmerer,
Giovanni Vigna:
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr.
ISC 2006: 343-358 |
76 | EE | William K. Robertson,
Giovanni Vigna,
Christopher Krügel,
Richard A. Kemmerer:
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
NDSS 2006 |
75 | EE | André Årnes,
Fredrik Valeur,
Giovanni Vigna,
Richard A. Kemmerer:
Using Hidden Markov Models to Evaluate the Risks of Intrusions.
RAID 2006: 145-164 |
2005 |
74 | EE | Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems.
ASE 2005: 3 |
2004 |
73 | EE | Giovanni Vigna,
Sumit Gwalani,
Kavitha Srinivasan,
Elizabeth M. Belding-Royer,
Richard A. Kemmerer:
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks.
ACSAC 2004: 16-27 |
72 | EE | Fredrik Valeur,
Giovanni Vigna,
Christopher Krügel,
Richard A. Kemmerer:
A Comprehensive Approach to Intrusion Detection Alert Correlation.
IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004) |
71 | EE | Zhe Dang,
Tevfik Bultan,
Oscar H. Ibarra,
Richard A. Kemmerer:
Past pushdown timed automata and safety verification.
Theor. Comput. Sci. 313(1): 57-71 (2004) |
2003 |
70 | EE | Giovanni Vigna,
William K. Robertson,
Vishal Kher,
Richard A. Kemmerer:
A Stateful Intrusion Detection System for World-Wide Web Servers.
ACSAC 2003: 34-45 |
69 | EE | Darren Mutz,
Giovanni Vigna,
Richard A. Kemmerer:
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems.
ACSAC 2003: 374-383 |
68 | EE | Giovanni Vigna,
Fredrik Valeur,
Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems.
ESEC / SIGSOFT FSE 2003: 88-97 |
67 | EE | Richard A. Kemmerer:
Cybersecurity.
ICSE 2003: 705-717 |
66 | EE | Richard A. Kemmerer,
Giovanni Vigna:
Internet Security and Intrusion Detection.
ICSE 2003: 748-749 |
65 | EE | Zhe Dang,
Pierluigi San Pietro,
Richard A. Kemmerer:
Presburger liveness verification of discrete timed automata.
Theor. Comput. Sci. 1-3(299): 413-438 (2003) |
64 | EE | Zhe Dang,
Oscar H. Ibarra,
Richard A. Kemmerer:
Generalized discrete timed automata: decidable approximations for safety verificatio.
Theor. Comput. Sci. 296(1): 59-74 (2003) |
2002 |
63 | EE | Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later.
ACSAC 2002: 109-118 |
62 | EE | Giovanni Vigna,
Fredrik Valeur,
Jingyu Zhou,
Richard A. Kemmerer:
Composable Tools For Network Discovery and Security Analysis.
ACSAC 2002: 14-24 |
61 | EE | Christopher Krügel,
Fredrik Valeur,
Giovanni Vigna,
Richard A. Kemmerer:
Stateful Intrusion Detection for High-Speed Networks.
IEEE Symposium on Security and Privacy 2002: 285- |
60 | | Steve T. Eckmann,
Giovanni Vigna,
Richard A. Kemmerer:
STATL: An Attack Language for State-Based Intrusion Detection.
Journal of Computer Security 10(1/2): 71-104 (2002) |
59 | | Oscar H. Ibarra,
Jianwen Su,
Zhe Dang,
Tevfik Bultan,
Richard A. Kemmerer:
Counter Machines and Verification Problems.
Theor. Comput. Sci. 289(1): 165-189 (2002) |
2001 |
58 | EE | Zhe Dang,
Tevfik Bultan,
Oscar H. Ibarra,
Richard A. Kemmerer:
Past Pushdown Timed Automata.
CIAA 2001: 74-86 |
57 | EE | Zhe Dang,
Oscar H. Ibarra,
Richard A. Kemmerer:
Decidable Approximations on Generalized and Parameterized Discrete Timed Automata.
COCOON 2001: 529-539 |
56 | EE | Sebastian Fischmeister,
Giovanni Vigna,
Richard A. Kemmerer:
Evaluating the Security of Three Java-Based Mobile Agent Systems.
Mobile Agents 2001: 31-41 |
55 | EE | Giovanni Vigna,
Richard A. Kemmerer,
Per Blix:
Designing a Web of Highly-Configurable Intrusion Detection Sensors.
Recent Advances in Intrusion Detection 2001: 69-84 |
54 | EE | Zhe Dang,
Pierluigi San Pietro,
Richard A. Kemmerer:
On Presburger Liveness of Discrete Timed Automata.
STACS 2001: 132-143 |
2000 |
53 | EE | André L. M. dos Santos,
Richard A. Kemmerer:
Implementing Security Policies using the Safe Areas of Computation Approach.
ACSAC 2000: 90-99 |
52 | | Zhe Dang,
Oscar H. Ibarra,
Tevfik Bultan,
Richard A. Kemmerer,
Jianwen Su:
Binary Reachability Analysis of Discrete Pushdown Timed Automata.
CAV 2000: 69-84 |
51 | EE | Paul Z. Kolano,
Richard A. Kemmerer,
Dino Mandrioli:
Parallel Refinement Mechanisms for Real-Time Systems.
FASE 2000: 35-50 |
50 | EE | Zhe Dang,
Richard A. Kemmerer:
Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems.
ICSE 2000: 345-354 |
49 | EE | Paul Z. Kolano,
Richard A. Kemmerer:
Classification schemes to aid in the analysis of real-time systems.
ISSTA 2000: 86-95 |
48 | EE | Oscar H. Ibarra,
Jianwen Su,
Zhe Dang,
Tevfik Bultan,
Richard A. Kemmerer:
Conter Machines: Decidable Properties and Applications to Verification Problems.
MFCS 2000: 426-435 |
47 | EE | Richard A. Kemmerer:
Editorial.
IEEE Trans. Software Eng. 26(2): 97 (2000) |
1999 |
46 | EE | André L. M. dos Santos,
Richard A. Kemmerer:
Safe Areas of Computation for Secure Computing with Insecure Applications.
ACSAC 1999: 35-44 |
45 | EE | Zhe Dang,
Richard A. Kemmerer:
Using the ASTRAL Model Checker to Analyze Mobile IP.
ICSE 1999: 132-142 |
44 | EE | Zhe Dang,
Richard A. Kemmerer:
A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications.
RTCSA 1999: 174-181 |
43 | | Paul Z. Kolano,
Zhe Dang,
Richard A. Kemmerer:
The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment.
Ann. Software Eng. 7: 177-210 (1999) |
42 | EE | Richard A. Kemmerer:
Editor's Note.
IEEE Trans. Software Eng. 25(4): 433-434 (1999) |
41 | EE | Richard A. Kemmerer:
Editorial.
IEEE Trans. Software Eng. 25(6): 745-746 (1999) |
40 | | Giovanni Vigna,
Richard A. Kemmerer:
NetSTAT: A Network-based Intrusion Detection System.
Journal of Computer Security 7(1): (1999) |
1998 |
39 | EE | Giovanni Vigna,
Richard A. Kemmerer:
NetSTAT: A Network-Based Intrusion Detection Approach.
ACSAC 1998: 25- |
38 | EE | Richard G. Hamlet,
Richard A. Kemmerer,
Edward F. Miller,
Debra J. Richardson:
The Most Influential Papers from the ISSTA Research Community (Panel).
ISSTA 1998: 49 |
37 | EE | Flavio De Paoli,
André L. M. dos Santos,
Richard A. Kemmerer:
Web Browsers and Security.
Mobile Agents and Security 1998: 235-256 |
1997 |
36 | EE | Richard A. Kemmerer:
Security Issues in Distributed Software.
ESEC / SIGSOFT FSE 1997: 52-59 |
35 | | Richard A. Kemmerer:
Formally Specifying and Verifying Real-Time Systems.
ICFEM 1997: 112- |
34 | EE | Alberto Coen-Porisini,
Carlo Ghezzi,
Richard A. Kemmerer:
Specification of Realtime Systems Using ASTRAL.
IEEE Trans. Software Eng. 23(9): 572-598 (1997) |
1996 |
33 | EE | Richard A. Kemmerer,
Tad Taylor:
A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/.
ACSAC 1996: 224-235 |
32 | EE | Richard Denney,
Richard A. Kemmerer,
Nancy G. Leveson,
Alberto Savoia:
Why State-of-the-Art is not State-of-the-Practice (Panel Abstract).
ISSTA 1996: 293 |
1995 |
31 | | Alberto Coen-Porisini,
Richard A. Kemmerer,
Dino Mandrioli:
A Formal Framework for ASTRAL Inter-level Proof Obligations.
ESEC 1995: 90-108 |
30 | EE | Koral Ilgun,
Richard A. Kemmerer,
Phillip A. Porras:
State Transition Analysis: A Rule-Based Intrusion Detection Approach.
IEEE Trans. Software Eng. 21(3): 181-199 (1995) |
1994 |
29 | EE | Jeffrey Douglas,
Richard A. Kemmerer:
Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications.
ISSTA 1994: 15-27 |
28 | EE | Alberto Coen-Porisini,
Richard A. Kemmerer,
Dino Mandrioli:
A Formal Framework for ASTRAL Intralevel Proof Obligations.
IEEE Trans. Software Eng. 20(8): 548-561 (1994) |
27 | | Richard A. Kemmerer,
Catherine Meadows,
Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis.
J. Cryptology 7(2): 79-130 (1994) |
1993 |
26 | EE | Alberto Coen-Porisini,
Richard A. Kemmerer:
The Composability of ASTRAL Realtime Specifications.
ISSTA 1993: 128-138 |
1992 |
25 | | Jonathan D. Reichbach,
Richard A. Kemmerer:
SoundWorks: An Object-Oriented Distributed System for Digital Sound.
IEEE Computer 25(3): 25-37 (1992) |
24 | EE | Richard A. Kemmerer,
Carlo Ghezzi:
Guest Editors' Introduction: Specification and Analysis of Real-Time Systems.
IEEE Trans. Software Eng. 18(9): 766-767 (1992) |
1991 |
23 | | Carlo Ghezzi,
Richard A. Kemmerer:
ASTRAL: An Assertion Language for Specifying Realtime Systems.
ESEC 1991: 122-146 |
22 | | Phillip A. Porras,
Richard A. Kemmerer:
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels.
IEEE Symposium on Security and Privacy 1991: 36-51 |
21 | EE | Richard A. Kemmerer,
Phillip A. Porras:
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels.
IEEE Trans. Software Eng. 17(11): 1166-1185 (1991) |
1990 |
20 | | Richard A. Kemmerer:
A Multilevel Formal Specification of a Mental Health Care Database.
DBSec 1990: 27-52 |
19 | | Richard A. Kemmerer:
Integrating Formal Methods into the Development Process.
IEEE Software 7(5): 37-50 (1990) |
1989 |
18 | | Richard A. Kemmerer:
Formal Specification of a Mental Health Delivery System.
DBSec 1989: 341-351 |
17 | | Richard A. Kemmerer:
Completely Validated Software.
ICSE 1989: 359-360 |
1987 |
16 | EE | Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes.
CRYPTO 1987: 289-305 |
15 | | Richard A. Kemmerer:
Formal Specification and Verification Techniques for Secure Database Systems.
DBSec 1987: 229-240 |
14 | | Richard A. Kemmerer:
Using Formal Verification Techniques to Analyze Encryption Protocols.
IEEE Symposium on Security and Privacy 1987: 134-139 |
13 | | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Trans. Software Eng. 13(2): 157-168 (1987) |
1986 |
12 | | Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Techniques.
EUROCRYPT 1986: 48 |
11 | | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Symposium on Security and Privacy 1986: 14-24 |
10 | | Brent Auernheimer,
Richard A. Kemmerer:
RT-ASLAN: A Specification Language for Real-Time Systems.
IEEE Trans. Software Eng. 12(9): 879-889 (1986) |
1985 |
9 | | Richard A. Kemmerer:
Testing Formal Specifications to Detect Design Errors.
IEEE Trans. Software Eng. 11(1): 32-43 (1985) |
8 | EE | J. David Blaine,
Richard A. Kemmerer:
Complexity measures for assembly language programs.
Journal of Systems and Software 5(3): 229-245 (1985) |
7 | | Richard A. Kemmerer,
Steven T. Eckman:
UNISEX: A UNIX-based Symbolic EXecutor for Pascal.
Softw., Pract. Exper. 15(5): 439-458 (1985) |
1983 |
6 | | Thomas H. Hinke,
Jose Althouse,
Richard A. Kemmerer:
SDC Secure Release Terminal Project.
IEEE Symposium on Security and Privacy 1983: 113-119 |
5 | EE | Richard A. Kemmerer:
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
ACM Trans. Comput. Syst. 1(3): 256-277 (1983) |
1982 |
4 | | Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels.
IEEE Symposium on Security and Privacy 1982: 66-73 |
1980 |
3 | | Bruce J. Walker,
Richard A. Kemmerer,
Gerald J. Popek:
Specification and Verification of the UCLA Unix Security Kernel.
Commun. ACM 23(2): 118-131 (1980) |
2 | | Daniel M. Berry,
Richard A. Kemmerer,
Arndt von Staa,
Shaula Yemini:
Toward Modular Verifiable Exception Handling.
Comput. Lang. 5(2): 77-101 (1980) |
1979 |
1 | | Bruce J. Walker,
Richard A. Kemmerer,
Gerald J. Popek:
Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract).
SOSP 1979: 64-65 |