R. Sekar Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

36EEAlok Tongaonkar, R. Sekar, Sreenaath Vasudevan: Fast Packet Classification Using Condition Factorization. ACNS 2009: 417-436
35EER. Sekar: An Efficient Black-box Technique for Defeating Web Application Attacks. NDSS 2009
34EEZhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar: Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Trans. Inf. Syst. Secur. 12(3): (2009)
33 R. Sekar, Arun K. Pujari: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ICISS 2008
32EEChetan Parampalli, R. Sekar, Rob Johnson: A practical mimicry attack against powerful system-call monitors. ASIACCS 2008: 156-167
31EEPrateek Saxena, R. Sekar, Varun Puranik: Efficient fine-grained binary instrumentationwith applications to taint-tracking. CGO 2008: 74-83
30EEWeiqing Sun, Varun Katta, Kumar Krishna, R. Sekar: V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments. CSET 2008
29EESandeep Bhatkar, R. Sekar: Data Space Randomization. DIMVA 2008: 1-22
28EELorenzo Cavallaro, Prateek Saxena, R. Sekar: On the Limits of Information Flow Techniques for Malware Analysis and Containment. DIMVA 2008: 143-163
27EEWeiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan: Expanding Malware Defense by Securing Software Installations. DIMVA 2008: 164-185
26EEWeiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar: Practical Proactive Integrity Preservation: A Basis for Malware Defense. IEEE Symposium on Security and Privacy 2008: 248-262
25EEAlok Tongaonkar, Sreenaath Vasudevan, R. Sekar: Fast Packet Classification for Snort by Native Compilation of Rules. LISA 2008: 159-165
24EELorenzo Cavallaro, R. Sekar: Anomalous Taint Detection. RAID 2008: 417-418
23EEAlessio Gaspar, Sarah Langevin, William D. Armitage, R. Sekar, T. Daniels: The role of virtualization in computing education. SIGCSE 2008: 131-132
22EEAlok Tongaonkar, Niranjan Inamdar, R. Sekar: Inferring Higher Level Policies from Firewall Rules. LISA 2007: 17-26
21EELixin Li, James E. Just, R. Sekar: Address-Space Randomization for Windows Systems. ACSAC 2006: 329-338
20EEV. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar: Provably Correct Runtime Enforcement of Non-interference Properties. ICICS 2006: 332-351
19EEWei Xu, V. N. Venkatakrishnan, R. Sekar, I. V. Ramakrishnan: A Framework for Building Privacy-Conscious Composite Web Services. ICWS 2006: 655-662
18EESandeep Bhatkar, Abhishek Chaturvedi, R. Sekar: Dataflow Anomaly Detection. IEEE Symposium on Security and Privacy 2006: 48-62
17EEZhenkai Liang, R. Sekar: Fast and automated generation of attack signatures: a basis for building self-protecting servers. ACM Conference on Computer and Communications Security 2005: 213-222
16EEZhenkai Liang, R. Sekar: Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. ACSAC 2005: 215-224
15EEWeiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar: One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. NDSS 2005
14EEZhenkai Liang, R. Sekar, Daniel C. DuVarney: Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems. USENIX Annual Technical Conference, General Track 2005: 375-378
13EEWei Xu, R. Sekar, I. V. Ramakrishnan, V. N. Venkatakrishnan: An approach for realizing privacy-preserving web-based services. WWW (Special interest tracks and posters) 2005: 1014-1015
12EEWei Xu, Daniel C. DuVarney, R. Sekar: An efficient and backwards-compatible transformation to ensure memory safety of C programs. SIGSOFT FSE 2004: 117-126
11EEZhenkai Liang, V. N. Venkatakrishnan, R. Sekar: Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. ACSAC 2003: 182-191
10EEAjay K. Gupta, R. Sekar: An Approach for Detecting Self-propagating Email Using Anomaly Detection. RAID 2003: 55-72
9EER. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney: Model-carrying code: a practical approach for safe execution of untrusted applications. SOSP 2003: 15-28
8EER. Sekar, Ajay K. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou: Specification-based anomaly detection: a new approach for detecting network intrusions. ACM Conference on Computer and Communications Security 2002: 265-274
7EEV. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang: An Approach for Secure Software Installation. LISA 2002: 219-226
6EER. Sekar, M. Bendre, D. Dhurjati, P. Bollineni: A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. IEEE Symposium on Security and Privacy 2001: 144-155
5EER. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka: Model-Carrying Code (MCC): a new paradigm for mobile-code security. NSPW 2001: 23-30
4EEPrem Uppuluri, R. Sekar: Experiences with Specification-Based Intrusion Detection. Recent Advances in Intrusion Detection 2001: 172-189
3EEK. Jain, R. Sekar: User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. NDSS 2000
2EER. Sekar, Y. Guang, S. Verma, T. Shanbhag: A High-Performance Network Intrusion Detection System. ACM Conference on Computer and Communications Security 1999: 8-17
1EER. Sekar, Thomas F. Bowen, Mark E. Segal: On Preventing Intrusions by Process Behavior Monitoring. Workshop on Intrusion Detection and Network Monitoring 1999: 29-40

Coauthor Index

1William D. Armitage [23]
2Samik Basu [9]
3M. Bendre [6]
4Sandeep Bhatkar [9] [18] [29]
5P. Bollineni [6]
6Thomas F. Bowen [1]
7Lorenzo Cavallaro [24] [28]
8Abhishek Chaturvedi [18]
9T. Daniels [23]
10D. Dhurjati [6]
11Daniel C. DuVarney [9] [12] [14] [20]
12J. Frullo [8]
13Alessio Gaspar [23]
14Y. Guang [2]
15Ajay K. Gupta [8] [10]
16Niranjan Inamdar [22]
17K. Jain [3]
18Rob Johnson [32]
19James E. Just [21]
20T. Kamat [7]
21Tejas Karandikar [26]
22Varun Katta [30]
23Kumar Krishna [30]
24Sarah Langevin [23]
25Lixin Li [21]
26Zhenkai Liang [7] [11] [14] [15] [16] [17] [27] [34]
27Chetan Parampalli [32]
28Gaurav Poothia [26]
29Arun K. Pujari [33]
30Varun Puranik [31]
31C. R. Ramakrishnan [5]
32I. V. Ramakrishnan [5] [13] [19]
33Prateek Saxena [28] [31]
34Mark E. Segal [1]
35T. Shanbhag [2] [8]
36Scott A. Smolka [5]
37Weiqing Sun [15] [26] [27] [30] [34]
38A. Tiwari [8]
39Alok Tongaonkar [22] [25] [36]
40S. Tsipa [7]
41Prem Uppuluri [4]
42Sreenaath Vasudevan [25] [36]
43V. N. Venkatakrishnan [7] [9] [11] [13] [15] [19] [20] [27] [34]
44S. Verma [2]
45Wei Xu [12] [13] [19] [20]
46H. Yang [8]
47S. Zhou [8]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)