Seguir
R. Sekar
R. Sekar
Professor of Computer Science, Stony Brook University
Dirección de correo verificada de cs.stonybrook.edu - Página principal
Título
Citado por
Citado por
Año
A fast automaton-based method for detecting anomalous program behaviors
R Sekar, M Bendre, D Dhurjati, P Bollineni
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 144-155, 2000
9262000
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
S Bhatkar, DC DuVarney, R Sekar
12th USENIX Security Symposium (USENIX Security 03), 2003
9182003
Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks
M Zhang, R Sekar
Proceedings of the 31st Annual Computer Security Applications Conference, 91-100, 2015
7672015
Code-pointer integrity
V Kuznetzov, L Szekeres, M Payer, G Candea, R Sekar, D Song
The Continuing Arms Race: Code-Reuse Attacks and Defenses, 81-116, 2018
6552018
Specification-based anomaly detection: a new approach for detecting network intrusions
R Sekar, A Gupta, J Frullo, T Shanbhag, A Tiwari, H Yang, S Zhou
Proceedings of the 9th ACM conference on Computer and communications …, 2002
6452002
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks.
W Xu, S Bhatkar, R Sekar
USENIX Security Symposium, 121-136, 2006
5372006
Efficient Techniques for Comprehensive Protection from Memory Error Exploits.
S Bhatkar, DC DuVarney, R Sekar
USENIX Security Symposium 10, 1, 2005
4452005
Holmes: real-time apt detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019
4132019
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
2842003
Fast and automated generation of attack signatures: A basis for building self-protecting servers
Z Liang, R Sekar
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2652005
Experiences with specification-based intrusion detection
P Uppuluri, R Sekar
International Workshop on Recent Advances in Intrusion Detection, 172-189, 2001
2442001
Data space randomization
S Bhatkar, R Sekar
International Conference on Detection of Intrusions and Malware, and …, 2008
2402008
On the limits of information flow techniques for malware analysis and containment
L Cavallaro, P Saxena, R Sekar
International conference on Detection of Intrusions and Malware, and …, 2008
2242008
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017
2162017
Synthesizing Fast Intrusion {Prevention/Detection} Systems from {High-Level} Specifications
R Sekar, PUR Sekar
8th USENIX Security Symposium (USENIX Security 99), 1999
2141999
An efficient and backwards-compatible transformation to ensure memory safety of C programs
W Xu, DC DuVarney, R Sekar
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004
2062004
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement.
K Jain, R Sekar
NDSS, 2000
2022000
An Efficient Black-box Technique for Defeating Web Application Attacks.
R Sekar
NDSS, 2009
2012009
Model-based analysis of configuration vulnerabilities
CR Ramakrishnan, R Sekar
Journal of Computer Security 10 (1-2), 189-209, 2002
1942002
A high-performance network intrusion detection system
R Sekar, Y Guang, S Verma, T Shanbhag
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
1941999
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20