2009 | ||
---|---|---|
34 | EE | Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar: Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2008 | ||
33 | R. Sekar, Arun K. Pujari: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ICISS 2008 | |
32 | EE | Chetan Parampalli, R. Sekar, Rob Johnson: A practical mimicry attack against powerful system-call monitors. ASIACCS 2008: 156-167 |
31 | EE | Prateek Saxena, R. Sekar, Varun Puranik: Efficient fine-grained binary instrumentationwith applications to taint-tracking. CGO 2008: 74-83 |
30 | EE | Weiqing Sun, Varun Katta, Kumar Krishna, R. Sekar: V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments. CSET 2008 |
29 | EE | Sandeep Bhatkar, R. Sekar: Data Space Randomization. DIMVA 2008: 1-22 |
28 | EE | Lorenzo Cavallaro, Prateek Saxena, R. Sekar: On the Limits of Information Flow Techniques for Malware Analysis and Containment. DIMVA 2008: 143-163 |
27 | EE | Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan: Expanding Malware Defense by Securing Software Installations. DIMVA 2008: 164-185 |
26 | EE | Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar: Practical Proactive Integrity Preservation: A Basis for Malware Defense. IEEE Symposium on Security and Privacy 2008: 248-262 |
25 | EE | Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar: Fast Packet Classification for Snort by Native Compilation of Rules. LISA 2008: 159-165 |
24 | EE | Lorenzo Cavallaro, R. Sekar: Anomalous Taint Detection. RAID 2008: 417-418 |
23 | EE | Alessio Gaspar, Sarah Langevin, William D. Armitage, R. Sekar, T. Daniels: The role of virtualization in computing education. SIGCSE 2008: 131-132 |
2007 | ||
22 | EE | Alok Tongaonkar, Niranjan Inamdar, R. Sekar: Inferring Higher Level Policies from Firewall Rules. LISA 2007: 17-26 |
2006 | ||
21 | EE | Lixin Li, James E. Just, R. Sekar: Address-Space Randomization for Windows Systems. ACSAC 2006: 329-338 |
20 | EE | V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar: Provably Correct Runtime Enforcement of Non-interference Properties. ICICS 2006: 332-351 |
19 | EE | Wei Xu, V. N. Venkatakrishnan, R. Sekar, I. V. Ramakrishnan: A Framework for Building Privacy-Conscious Composite Web Services. ICWS 2006: 655-662 |
18 | EE | Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar: Dataflow Anomaly Detection. IEEE Symposium on Security and Privacy 2006: 48-62 |
2005 | ||
17 | EE | Zhenkai Liang, R. Sekar: Fast and automated generation of attack signatures: a basis for building self-protecting servers. ACM Conference on Computer and Communications Security 2005: 213-222 |
16 | EE | Zhenkai Liang, R. Sekar: Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. ACSAC 2005: 215-224 |
15 | EE | Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar: One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. NDSS 2005 |
14 | EE | Zhenkai Liang, R. Sekar, Daniel C. DuVarney: Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems. USENIX Annual Technical Conference, General Track 2005: 375-378 |
13 | EE | Wei Xu, R. Sekar, I. V. Ramakrishnan, V. N. Venkatakrishnan: An approach for realizing privacy-preserving web-based services. WWW (Special interest tracks and posters) 2005: 1014-1015 |
2004 | ||
12 | EE | Wei Xu, Daniel C. DuVarney, R. Sekar: An efficient and backwards-compatible transformation to ensure memory safety of C programs. SIGSOFT FSE 2004: 117-126 |
2003 | ||
11 | EE | Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar: Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. ACSAC 2003: 182-191 |
10 | EE | Ajay K. Gupta, R. Sekar: An Approach for Detecting Self-propagating Email Using Anomaly Detection. RAID 2003: 55-72 |
9 | EE | R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney: Model-carrying code: a practical approach for safe execution of untrusted applications. SOSP 2003: 15-28 |
2002 | ||
8 | EE | R. Sekar, Ajay K. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou: Specification-based anomaly detection: a new approach for detecting network intrusions. ACM Conference on Computer and Communications Security 2002: 265-274 |
7 | EE | V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang: An Approach for Secure Software Installation. LISA 2002: 219-226 |
2001 | ||
6 | EE | R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni: A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. IEEE Symposium on Security and Privacy 2001: 144-155 |
5 | EE | R. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka: Model-Carrying Code (MCC): a new paradigm for mobile-code security. NSPW 2001: 23-30 |
4 | EE | Prem Uppuluri, R. Sekar: Experiences with Specification-Based Intrusion Detection. Recent Advances in Intrusion Detection 2001: 172-189 |
2000 | ||
3 | EE | K. Jain, R. Sekar: User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. NDSS 2000 |
1999 | ||
2 | EE | R. Sekar, Y. Guang, S. Verma, T. Shanbhag: A High-Performance Network Intrusion Detection System. ACM Conference on Computer and Communications Security 1999: 8-17 |
1 | EE | R. Sekar, Thomas F. Bowen, Mark E. Segal: On Preventing Intrusions by Process Behavior Monitoring. Workshop on Intrusion Detection and Network Monitoring 1999: 29-40 |