2009 |
34 | EE | Zhenkai Liang,
Weiqing Sun,
V. N. Venkatakrishnan,
R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2008 |
33 | | R. Sekar,
Arun K. Pujari:
Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings
ICISS 2008 |
32 | EE | Chetan Parampalli,
R. Sekar,
Rob Johnson:
A practical mimicry attack against powerful system-call monitors.
ASIACCS 2008: 156-167 |
31 | EE | Prateek Saxena,
R. Sekar,
Varun Puranik:
Efficient fine-grained binary instrumentationwith applications to taint-tracking.
CGO 2008: 74-83 |
30 | EE | Weiqing Sun,
Varun Katta,
Kumar Krishna,
R. Sekar:
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments.
CSET 2008 |
29 | EE | Sandeep Bhatkar,
R. Sekar:
Data Space Randomization.
DIMVA 2008: 1-22 |
28 | EE | Lorenzo Cavallaro,
Prateek Saxena,
R. Sekar:
On the Limits of Information Flow Techniques for Malware Analysis and Containment.
DIMVA 2008: 143-163 |
27 | EE | Weiqing Sun,
R. Sekar,
Zhenkai Liang,
V. N. Venkatakrishnan:
Expanding Malware Defense by Securing Software Installations.
DIMVA 2008: 164-185 |
26 | EE | Weiqing Sun,
R. Sekar,
Gaurav Poothia,
Tejas Karandikar:
Practical Proactive Integrity Preservation: A Basis for Malware Defense.
IEEE Symposium on Security and Privacy 2008: 248-262 |
25 | EE | Alok Tongaonkar,
Sreenaath Vasudevan,
R. Sekar:
Fast Packet Classification for Snort by Native Compilation of Rules.
LISA 2008: 159-165 |
24 | EE | Lorenzo Cavallaro,
R. Sekar:
Anomalous Taint Detection.
RAID 2008: 417-418 |
23 | EE | Alessio Gaspar,
Sarah Langevin,
William D. Armitage,
R. Sekar,
T. Daniels:
The role of virtualization in computing education.
SIGCSE 2008: 131-132 |
2007 |
22 | EE | Alok Tongaonkar,
Niranjan Inamdar,
R. Sekar:
Inferring Higher Level Policies from Firewall Rules.
LISA 2007: 17-26 |
2006 |
21 | EE | Lixin Li,
James E. Just,
R. Sekar:
Address-Space Randomization for Windows Systems.
ACSAC 2006: 329-338 |
20 | EE | V. N. Venkatakrishnan,
Wei Xu,
Daniel C. DuVarney,
R. Sekar:
Provably Correct Runtime Enforcement of Non-interference Properties.
ICICS 2006: 332-351 |
19 | EE | Wei Xu,
V. N. Venkatakrishnan,
R. Sekar,
I. V. Ramakrishnan:
A Framework for Building Privacy-Conscious Composite Web Services.
ICWS 2006: 655-662 |
18 | EE | Sandeep Bhatkar,
Abhishek Chaturvedi,
R. Sekar:
Dataflow Anomaly Detection.
IEEE Symposium on Security and Privacy 2006: 48-62 |
2005 |
17 | EE | Zhenkai Liang,
R. Sekar:
Fast and automated generation of attack signatures: a basis for building self-protecting servers.
ACM Conference on Computer and Communications Security 2005: 213-222 |
16 | EE | Zhenkai Liang,
R. Sekar:
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models.
ACSAC 2005: 215-224 |
15 | EE | Weiqing Sun,
Zhenkai Liang,
V. N. Venkatakrishnan,
R. Sekar:
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
NDSS 2005 |
14 | EE | Zhenkai Liang,
R. Sekar,
Daniel C. DuVarney:
Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems.
USENIX Annual Technical Conference, General Track 2005: 375-378 |
13 | EE | Wei Xu,
R. Sekar,
I. V. Ramakrishnan,
V. N. Venkatakrishnan:
An approach for realizing privacy-preserving web-based services.
WWW (Special interest tracks and posters) 2005: 1014-1015 |
2004 |
12 | EE | Wei Xu,
Daniel C. DuVarney,
R. Sekar:
An efficient and backwards-compatible transformation to ensure memory safety of C programs.
SIGSOFT FSE 2004: 117-126 |
2003 |
11 | EE | Zhenkai Liang,
V. N. Venkatakrishnan,
R. Sekar:
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs.
ACSAC 2003: 182-191 |
10 | EE | Ajay K. Gupta,
R. Sekar:
An Approach for Detecting Self-propagating Email Using Anomaly Detection.
RAID 2003: 55-72 |
9 | EE | R. Sekar,
V. N. Venkatakrishnan,
Samik Basu,
Sandeep Bhatkar,
Daniel C. DuVarney:
Model-carrying code: a practical approach for safe execution of untrusted applications.
SOSP 2003: 15-28 |
2002 |
8 | EE | R. Sekar,
Ajay K. Gupta,
J. Frullo,
T. Shanbhag,
A. Tiwari,
H. Yang,
S. Zhou:
Specification-based anomaly detection: a new approach for detecting network intrusions.
ACM Conference on Computer and Communications Security 2002: 265-274 |
7 | EE | V. N. Venkatakrishnan,
R. Sekar,
T. Kamat,
S. Tsipa,
Zhenkai Liang:
An Approach for Secure Software Installation.
LISA 2002: 219-226 |
2001 |
6 | EE | R. Sekar,
M. Bendre,
D. Dhurjati,
P. Bollineni:
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors.
IEEE Symposium on Security and Privacy 2001: 144-155 |
5 | EE | R. Sekar,
C. R. Ramakrishnan,
I. V. Ramakrishnan,
Scott A. Smolka:
Model-Carrying Code (MCC): a new paradigm for mobile-code security.
NSPW 2001: 23-30 |
4 | EE | Prem Uppuluri,
R. Sekar:
Experiences with Specification-Based Intrusion Detection.
Recent Advances in Intrusion Detection 2001: 172-189 |
2000 |
3 | EE | K. Jain,
R. Sekar:
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement.
NDSS 2000 |
1999 |
2 | EE | R. Sekar,
Y. Guang,
S. Verma,
T. Shanbhag:
A High-Performance Network Intrusion Detection System.
ACM Conference on Computer and Communications Security 1999: 8-17 |
1 | EE | R. Sekar,
Thomas F. Bowen,
Mark E. Segal:
On Preventing Intrusions by Process Behavior Monitoring.
Workshop on Intrusion Detection and Network Monitoring 1999: 29-40 |