R. Sekar
R. Sekar
Professor of Computer Science, Stony Brook University
Email verificata su seclab.cs.sunysb.edu - Home page
TitoloCitata daAnno
A fast automaton-based method for detecting anomalous program behaviors
R Sekar, M Bendre, D Dhurjati, P Bollineni
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 144-155, 2000
7822000
Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits.
S Bhatkar, DC DuVarney, R Sekar
USENIX Security Symposium 12 (2), 291-301, 2003
7252003
Specification-based anomaly detection: a new approach for detecting network intrusions
R Sekar, A Gupta, J Frullo, T Shanbhag, A Tiwari, H Yang, S Zhou
Proceedings of the 9th ACM conference on Computer and communications …, 2002
5132002
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks.
W Xu, S Bhatkar, R Sekar
USENIX Security Symposium, 121-136, 2006
4332006
Control Flow Integrity for {COTS} Binaries
M Zhang, R Sekar
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
4032013
Control Flow Integrity for {COTS} Binaries
M Zhang, R Sekar
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
4032013
Efficient Techniques for Comprehensive Protection from Memory Error Exploits.
S Bhatkar, DC DuVarney, R Sekar
USENIX Security Symposium, 17-17, 2005
3642005
Code-pointer integrity
V Kuznetsov, L Szekeres, M Payer, G Candea, R Sekar, D Song
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
3322014
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
2552003
Fast and automated generation of attack signatures: A basis for building self-protecting servers
Z Liang, R Sekar
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2422005
Experiences with specification-based intrusion detection
P Uppuluri, R Sekar
International Workshop on Recent Advances in Intrusion Detection, 172-189, 2001
1952001
SYNTHESIZINGFASTINTRU SION PREVENTION/DETECTIONSYSTEMSFROM HIGH-LEVELSPECIFICATIONS
R Sekar, P Uppuluri
Proceedings of USENIX 99, 1999
1881999
On the limits of information flow techniques for malware analysis and containment
L Cavallaro, P Saxena, R Sekar
International conference on Detection of Intrusions and Malware, and …, 2008
1862008
Dataflow anomaly detection
S Bhatkar, A Chaturvedi, R Sekar
Security and Privacy, 2006 IEEE Symposium on, 2006
175*2006
A high-performance network intrusion detection system
R Sekar, Y Guang, S Verma, T Shanbhag
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
1741999
Model-based analysis of configuration vulnerabilities
CR Ramakrishnan, R Sekar
Journal of Computer Security 10 (1-2), 189-209, 2002
1682002
An Efficient Black-box Technique for Defeating Web Application Attacks.
R Sekar
NDSS, 2009
1622009
An efficient and backwards-compatible transformation to ensure memory safety of C programs
W Xu, DC DuVarney, R Sekar
ACM SIGSOFT Software Engineering Notes 29 (6), 117-126, 2004
1592004
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement.
K Jain, R Sekar
NDSS, 2000
1562000
Data space randomization
S Bhatkar, R Sekar
International Conference on Detection of Intrusions and Malware, and …, 2008
1512008
Il sistema al momento non puň eseguire l'operazione. Riprova piů tardi.
Articoli 1–20