Richard A. Kemmerer

Affiliations:
  • University of California, Santa Barbara, USA


According to our database1, Richard A. Kemmerer authored at least 112 papers between 1979 and 2015.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 1997, "For contributions in the areas of formal specification and verification of systems, computer system security and reliability, specification language design, and software engineering.".

IEEE Fellow

IEEE Fellow 1995, "For contributions to formal methods in reliability and security of computer systems.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
Prison: Tracking Process Interactions to Contain Malware.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Know Your Achilles' Heel: Automatic Detection of Network Critical Services.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
The Tricks of the Trade: What Makes Spam Campaigns Successful?
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Rippler: Delay injection for service dependency detection.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

2013
20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Formulating Cyber-Security as Convex Optimization Problems.
Proceedings of the Control of Cyber-Physical Systems, 2013

2011
Formal analysis of an electronic voting system: An experience report.
J. Syst. Softw., 2011

Analysis of a Botnet Takeover.
IEEE Secur. Priv., 2011

The Underground Economy of Fake Antivirus Software.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

The Underground Economy of Fake Antivirus Software.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Dymo: Tracking Dynamic Code Identity.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Understanding fraudulent activities in online ad exchanges.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

How to steal a botnet and what can happen when you do.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011

MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
An Experience in Testing the Security of Real-World Electronic Voting Systems.
IEEE Trans. Software Eng., 2010

Refinement and Verification of Real-Time Systems
CoRR, 2010

Formal Specification and Analysis of an E-voting System.
Proceedings of the ARES 2010, 2010

2009
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008.
Comput. Sci. Res. Dev., 2009

Formal analysis of attacks for e-voting system.
Proceedings of the CRiSIS 2009, 2009

Your botnet is my botnet: analysis of a botnet takeover.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Are your votes <i>really</i> counted?: testing the security of real-world electronic voting systems.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

08102 Outcome Working Group -- Situational Awareness.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2007
Using a virtual security testbed for digital forensic reconstruction.
J. Comput. Virol., 2007

Exploiting Execution Context for the Detection of Anomalous System Calls.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

So You Think You Can Dance?
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Using Hidden Markov Models to Evaluate the Risks of Intrusions.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2006

SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr.
Proceedings of the Information Security, 9th International Conference, 2006

Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

2005
Hi-DRA: Intrusion Detection for Internet Security.
Proc. IEEE, 2005

Designing and implementing a family of intrusion detection systems.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

2004
A Comprehensive Approach to Intrusion Detection Alert Correlation.
IEEE Trans. Dependable Secur. Comput., 2004

Past pushdown timed automata and safety verification.
Theor. Comput. Sci., 2004

An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Presburger liveness verification of discrete timed automata.
Theor. Comput. Sci., 2003

Generalized discrete timed automata: decidable approximations for safety verificatio.
Theor. Comput. Sci., 2003

Designing and implementing a family of intrusion detection systems.
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003

Internet Security and Intrusion Detection.
Proceedings of the 25th International Conference on Software Engineering, 2003

Cybersecurity.
Proceedings of the 25th International Conference on Software Engineering, 2003

A Stateful Intrusion Detection System for World-Wide Web Servers.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Counter Machines and Verification Problems.
Theor. Comput. Sci., 2002

STATL: An Attack Language for State-Based Intrusion Detection.
J. Comput. Secur., 2002

Stateful Intrusion Detection for High-Speed Networks.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Composable Tools For Network Discovery and Security Analysis.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Security Testing of an Online Banking Service.
Proceedings of the E-Commerce Security and Privacy, 2001

Past Pushdown Timed Automata.
Proceedings of the Implementation and Application of Automata, 2001

On Presburger Liveness of Discrete Timed Automata.
Proceedings of the STACS 2001, 2001

Designing a Web of Highly-Configurable Intrusion Detection Sensors.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

Evaluating the Security of Three Java-Based Mobile Agent Systems.
Proceedings of the Mobile Agents, 5th International Conference, 2001

Decidable Approximations on Generalized and Parameterized Discrete Timed Automata.
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001

2000
Editorial: New EIC Introduction.
IEEE Trans. Software Eng., 2000

Conter Machines: Decidable Properties and Applications to Verification Problems.
Proceedings of the Mathematical Foundations of Computer Science 2000, 2000

Classification schemes to aid in the analysis of real-time systems.
Proceedings of the International Symposium on Software Testing and Analysis, 2000

Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

Parallel Refinement Mechanisms for Real-Time Systems.
Proceedings of the Fundamental Approaches to Software Engineering, 2000

Binary Reachability Analysis of Discrete Pushdown Timed Automata.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000

Implementing Security Policies using the Safe Areas of Computation Approach.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Editorial.
IEEE Trans. Software Eng., 1999

Editor's Note.
IEEE Trans. Software Eng., 1999

NetSTAT: A Network-based Intrusion Detection System.
J. Comput. Secur., 1999

The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment.
Ann. Softw. Eng., 1999

A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications.
Proceedings of the 6th International Workshop on Real-Time Computing and Applications Symposium (RTCSA '99), 1999

Using the ASTRAL Model Checker to Analyze Mobile IP.
Proceedings of the 1999 International Conference on Software Engineering, 1999

Safe Areas of Computation for Secure Computing with Insecure Applications.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Web Browsers and Security.
Proceedings of the Mobile Agents and Security, 1998

The Most Influential Papers from the ISSTA Research Community (Panel).
Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis, 1998

NetSTAT: A Network-Based Intrusion Detection Approach.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
Specification of Realtime Systems Using ASTRAL.
IEEE Trans. Software Eng., 1997

Formally Specifying and Verifying Real-Time Systems.
Proceedings of the First IEEE International Conference on Formal Engineering Methods, 1997

Security Issues in Distributed Software.
Proceedings of the Software Engineering, 1997

1996
Why State-of-the-Art is not State-of-the-Practice (Panel Abstract).
Proceedings of the 1996 International Symposium on Software Testing and Analysis, 1996

A Modular Covert Channel Analysis Methodology for Trusted DG/UX<sup>TM</sup>.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1995
State Transition Analysis: A Rule-Based Intrusion Detection Approach.
IEEE Trans. Software Eng., 1995

A Formal Framework for ASTRAL Inter-level Proof Obligations.
Proceedings of the 5th European Software Engineering Conference, 1995

1994
A Formal Framework for ASTRAL Intralevel Proof Obligations.
IEEE Trans. Software Eng., 1994

Three System for Cryptographic Protocol Analysis.
J. Cryptol., 1994

Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications.
Proceedings of the 1994 International Symposium on Software Testing and Analysis, 1994

1993
The Composability of ASTRAL Realtime Specifications.
Proceedings of the 1993 International Symposium on Software Testing and Analysis, 1993

Quality Assurance Working Group.
Proceedings of the Formal Methods in Systems Engineering, 1993

1992
Guest Editors' Introduction: Specification and Analysis of Real-Time Systems.
IEEE Trans. Software Eng., 1992

SoundWorks: An Object-Oriented Distributed System for Digital Sound.
Computer, 1992

Penetration state transition analysis: A rule-based intrusion detection approach.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels.
IEEE Trans. Software Eng., 1991

Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

ASTRAL: An Assertion Language for Specifying Realtime Systems.
Proceedings of the ESEC '91, 1991

1990
Integrating Formal Methods into the Development Process.
IEEE Softw., 1990

A Multilevel Formal Specification of a Mental Health Care Database.
Proceedings of the Database Security, 1990

1989
Analyzing encryption protocols using formal verification techniques.
IEEE J. Sel. Areas Commun., 1989

Completely Validated Software.
Proceedings of the 11th International Conference on Software Engineering, 1989

Formal Specification of a Mental Health Delivery System.
Proceedings of the Database Security, 1989

1987
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Trans. Software Eng., 1987

Using Formal Verification Techniques to Analyze Encryption Protocols.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

Formal Specification and Verification Techniques for Secure Database Systems.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987

Analyzing Encryption Protocols Using Formal Verification Authentication Schemes.
Proceedings of the Advances in Cryptology, 1987

1986
RT-ASLAN: A Specification Language for Real-Time Systems.
IEEE Trans. Software Eng., 1986

1985
Testing Formal Specifications to Detect Design Errors.
IEEE Trans. Software Eng., 1985

UNISEX: A UNIX-based Symbolic EXecutor for Pascal.
Softw. Pract. Exp., 1985

Overview of foundations.
ACM SIGSOFT Softw. Eng. Notes, 1985

INATEST: an interactive environment for testing formal specifications.
ACM SIGSOFT Softw. Eng. Notes, 1985

Complexity measures for assembly language programs.
J. Syst. Softw., 1985

1983
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
ACM Trans. Comput. Syst., 1983

SDC Secure Release Terminal Project.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

1982
A Practical Approach to Identifying Storage and Timing Channels.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982

1981
Status of ongoing security-relevant projects.
ACM SIGSOFT Softw. Eng. Notes, 1981

1980
Toward Modular Verifiable Exception Handling.
Comput. Lang., 1980

Specification and Verification of the UCLA Unix Security Kernel.
Commun. ACM, 1980

1979
Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract).
Proceedings of the Seventh Symposium on Operating System Principles, 1979


  Loading...