R. Sekar
Orcid: 0009-0008-9135-3296Affiliations:
- Stony Brook University, Department of Computer Science, NY, USA (1986-1991, since 1999, PhD 1991)
- Iowa State University, Department of Computer Science, Ames, IA, USA (1996-1999)
According to our database1,
R. Sekar
authored at least 98 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection.
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
2020
Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata.
IEEE Trans. Inf. Forensics Secur., 2016
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program.
CoRR, 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016
2015
Proceedings of the 2015 New Security Paradigms Workshop, 2015
Proceedings of the 13th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2015
Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the 10th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Runtime Verification - First International Conference, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments.
Proceedings of the Workshop on Cyber Security and Test, 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the 22nd Large Installation System Administration Conference, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Sixth International Symposium on Code Generation and Optimization (CGO 2008), 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Proceedings of the 21th Large Installation System Administration Conference, 2007
2006
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the 14th international conference on World Wide Web, 2005
Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Fast and automated generation of attack signatures: a basis for building self-protecting servers.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
An efficient and backwards-compatible transformation to ensure memory safety of C programs.
Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2004, Newport Beach, CA, USA, October 31, 2004
2003
Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
Model-carrying code: a practical approach for safe execution of untrusted applications.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Proceedings of the 16th Conference on Systems Administration (LISA 2002), 2002
Specification-based anomaly detection: a new approach for detecting network intrusions.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001
Proceedings of the New Security Paradigms Workshop 2001, 2001
Proceedings of the Handbook of Automated Reasoning (in 2 volumes), 2001
2000
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement.
Proceedings of the Network and Distributed System Security Symposium, 2000
1999
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999
Proceedings of the CCS '99, 1999
1998
Proceedings of the 1998 International Conference on Computer Languages, 1998
1997
1995
ACM Trans. Program. Lang. Syst., 1995
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, 1995
1994
A High Performance Runtime System for Parallel Evaluation of Lazy Languages.
Proceedings of the First International Symposium on Parallel Symbolic Computation, 1994
Modelling techniques for evolving distributed applications.
Proceedings of the Formal Description Techniques VII, 1994
1993
Extracting Determinacy in Logic Programs.
Proceedings of the Logic Programming, 1993
1992
On Modelling and Reasoning About Hybrid Systems.
Proceedings of the Protocol Specification, 1992
Proceedings of the Conference on Lisp and Functional Programming, 1992
Proceedings of the Automated Deduction, 1992
1991
Proceedings of the Conference Record of the Eighteenth Annual ACM Symposium on Principles of Programming Languages, 1991
1990
Proceedings of the Conference Record of the Seventeenth Annual ACM Symposium on Principles of Programming Languages, 1990
1989
Transforming Strongly Sequential Rewrite Systems with Constructors for Efficient parallel Execution.
Proceedings of the Rewriting Techniques and Applications, 3rd International Conference, 1989