Anil Somayaji

According to our database1, Anil Somayaji authored at least 43 papers between 1996 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
BPFContain: Fixing the Soft Underbelly of Container Security.
CoRR, 2021

2020
Towards In-Band Non-Cryptographic Authentication.
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020

bpfbox: Simple Precise Process Confinement with eBPF.
Proceedings of the CCSW'20, 2020

2019
Thread Homeostasis: Real-Time Anomalous Behavior Detection for Safety-Critical Software.
CoRR, 2019

2018
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach.
ACM Trans. Priv. Secur., 2018

Learning over subconcepts: Strategies for 1-class classification.
Comput. Intell., 2018

After the BlockCLoud Apocalypse.
Proceedings of the New Security Paradigms Workshop, 2018

2017
Can I believe you?: Establishing Trust in Computer Mediated Introductions.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

2015
Measuring the health of antivirus ecosystems.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

2014
Risk prediction of malware victimization based on user behavior.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

2013
Towards narrative authentication: or, against boring authentication.
Proceedings of the New Security Paradigms Workshop, 2013

A clinical study of risk factors related to malware infections.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Software Diversity: Security, Entropy and Game Theory.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

Methodology for a Field Study of Anti-malware Software.
Proceedings of the Financial Cryptography and Data Security, 2012

2010
Customer Appeasement Scheduling
CoRR, 2010

Visual Security Policy for the Web.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Object-level recombination of commodity applications.
Proceedings of the Genetic and Evolutionary Computation Conference, 2010

A methodology for empirical analysis of permission-based security models and its application to android.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Evaluating Security Products with Clinical Trials.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICT.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

2008
Discovering Packet Structure through Lightweight Hierarchical Clustering.
Proceedings of IEEE International Conference on Communications, 2008

SOMA: mutual approval for included content in web pages.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

The Evolution of System-Call Monitoring.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses.
Inf. Secur. Tech. Rep., 2007

Learning DFA representations of HTTP for protecting web applications.
Comput. Networks, 2007

The future of biologically-inspired security: is there anything left to learn?
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007

NetADHICT: A Tool for Understanding Network Traffic.
Proceedings of the 21th Large Installation System Administration Conference, 2007

A methodology for designing accurate anomaly detection systems.
Proceedings of the 4th International IFIP/ACM Latin American Networking Conference, 2007

2005
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance.
IEEE Trans. Dependable Secur. Comput., 2005

Pass-thoughts: Authenticating With Our Minds.
IACR Cryptol. ePrint Arch., 2005

A Generic Attack on Checksumming-Based Software Tamper Resistance.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Towards Network Awareness.
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005

Securing Email Archives through User Modeling.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

Highlights from the 2005 New Security Paradigms Workshop.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
How to Win and Evolutionary Arms Race.
IEEE Secur. Priv., 2004

2000
Automated Response Using System-Call Delay.
Proceedings of the 9th USENIX Security Symposium, 2000

1998
Intrusion Detection Using Sequences of System Calls.
J. Comput. Secur., 1998

1997
Computer Immunology.
Commun. ACM, 1997

Principles of a computer immune system.
Proceedings of the 1997 Workshop on New Security Paradigms, 1997

Building Diverse Computer Systems.
Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, 1997

1996
A Sense of Self for Unix Processes.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996


  Loading...