Somesh Jha

Affiliations:
  • University of Wisconsin-Madison, Madison, USA


According to our database1, Somesh Jha authored at least 292 papers between 1992 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2016, "For contributions to verification, programming languages, and software engineering".

IEEE Fellow

IEEE Fellow 2018, "For contributions to the application of formal methods to security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Do Large Code Models Understand Programming Concepts? A Black-box Approach.
CoRR, 2024

2023
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning.
IEEE Trans. Software Eng., April, 2023

Introduction to the Special Issue on Automotive CPS Safety & Security: Part 1.
ACM Trans. Cyber Phys. Syst., January, 2023

Private Multi-Winner Voting for Machine Learning.
Proc. Priv. Enhancing Technol., January, 2023

Experimenting with Zero-Knowledge Proofs of Training.
IACR Cryptol. ePrint Arch., 2023

Publicly Detectable Watermarking for Language Models.
IACR Cryptol. ePrint Arch., 2023

Identifying and Mitigating the Security Risks of Generative AI.
Found. Trends Priv. Secur., 2023

A Somewhat Robust Image Watermark against Diffusion-based Editing Models.
CoRR, 2023

Bilevel Relations and Their Applications to Data Insights.
CoRR, 2023

Robust and Actively Secure Serverless Collaborative Learning.
CoRR, 2023

Why Train More? Effective and Efficient Membership Inference via Memorization.
CoRR, 2023

slash: A Technique for Static Configuration-Logic Identification.
CoRR, 2023

Identifying and Mitigating the Security Risks of Generative AI.
CoRR, 2023

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks.
CoRR, 2023

Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems.
CoRR, 2023

Two Heads are Better than One: Towards Better Adversarial Robustness by Combining Transduction and Rejection.
CoRR, 2023

Rethink Diversity in Deep Learning Testing.
CoRR, 2023

ASPEST: Bridging the Gap Between Active Learning and Selective Prediction.
CoRR, 2023

Efficient Symbolic Reasoning for Neural-Network Verification.
CoRR, 2023

Investigating Stateful Defenses Against Black-Box Adversarial Examples.
CoRR, 2023

Formal Analysis of the API Proxy Problem.
CoRR, 2023

Holistic Cube Analysis: A Query Framework for Data Insights.
CoRR, 2023

Learning Modulo Theories.
CoRR, 2023

Fairness Properties of Face Recognition and Obfuscation Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Grounding Neural Inference with Satisfiability Modulo Theories.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Robust and Actively Secure Serverless Collaborative Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Concept-based Explanations for Out-of-Distribution Detectors.
Proceedings of the International Conference on Machine Learning, 2023

Stratified Adversarial Robustness with Rejection.
Proceedings of the International Conference on Machine Learning, 2023

The Trade-off between Universality and Label Efficiency of Representations from Contrastive Learning.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Few-Shot Domain Adaptation For End-to-End Communication.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Adaptation with Self-Evaluation to Improve Selective Prediction in LLMs.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Differentially Private Resource Allocation.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Machine Learning and Logical Reasoning: The New Frontier (Dagstuhl Seminar 22291).
Dagstuhl Reports, July, 2022

Interval universal approximation for neural networks.
Proc. ACM Program. Lang., 2022

Machine learning and logic: a new frontier in artificial intelligence.
Formal Methods Syst. Des., 2022

Overparameterized (robust) models from computational constraints.
CoRR, 2022

Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing.
CoRR, 2022

Optimal Membership Inference Bounds for Adaptive Composition of Sampled Gaussian Mechanisms.
CoRR, 2022

Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision.
CoRR, 2022

Towards Adversarially Robust Deepfake Detection: An Ensemble Approach.
CoRR, 2022

An Exploration of Multicalibration Uniform Convergence Bounds.
CoRR, 2022

Semantic Robustness of Models of Source Code.
Proceedings of the IEEE International Conference on Software Analysis, 2022

A Quantitative Geometric Approach to Neural-Network Smoothness.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Robust Learning against Relational Adversaries.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Overparameterization from Computational Constraints.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Privacy Implications of Shuffling.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Towards Evaluating the Robustness of Neural Networks Learned by Transduction.
Proceedings of the Tenth International Conference on Learning Representations, 2022

GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Lightweight, Multi-Stage, Compiler-Assisted Application Specialization.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Federated Boosted Decision Trees with Differential Privacy.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

EIFFeL: Ensuring Integrity for Federated Learning.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Strengthening Order Preserving Encryption with Differential Privacy.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
IEEE Trans. Inf. Forensics Secur., 2021

Locally Differentially Private Heavy Hitter Identification.
IEEE Trans. Dependable Secur. Comput., 2021

Face-Off: Adversarial Face Obfuscation.
Proc. Priv. Enhancing Technol., 2021

2018 CAV award.
Formal Methods Syst. Des., 2021

NeuraCrypt is not private.
CoRR, 2021

Domain Adaptation for Autoencoder-Based End-to-End Communication Over Wireless Channels.
CoRR, 2021

Towards Adversarial Robustness via Transductive Learning.
CoRR, 2021

A Shuffling Framework for Local Differential Privacy.
CoRR, 2021

Causally Constrained Data Synthesis for Private Data Release.
CoRR, 2021

Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples.
CoRR, 2021

Exploring Adversarial Robustness of Deep Metric Learning.
CoRR, 2021

Is Private Learning Possible with Instance Encoding?
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

ATOM: Robustifying Out-of-Distribution Detection Using Outlier Mining.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training Ensembles.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

A General Framework For Detecting Anomalous Inputs to DNN Classifiers.
Proceedings of the 38th International Conference on Machine Learning, 2021

Sample Complexity of Robust Linear Classification on Separated Data.
Proceedings of the 38th International Conference on Machine Learning, 2021

CaPC Learning: Confidential and Private Collaborative Learning.
Proceedings of the 9th International Conference on Learning Representations, 2021

Brittle Features of Device Authentication.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Trustworthy Machine Learning: Past, Present, and Future.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Improving Utility and Security of the Shuffler-based Differential Privacy.
Proc. VLDB Endow., 2020

Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning.
J. Comput. Secur., 2020

Semantic Adversarial Deep Learning.
IEEE Des. Test, 2020

Sample Complexity of Adversarially Robust Linear Classification on Separated Data.
CoRR, 2020

ShadowNet: A Secure and Efficient System for On-device Model Inference.
CoRR, 2020

An Attack on InstaHide: Is Private Learning Possible with Instance Encoding?
CoRR, 2020

Intertwining Order Preserving Encryption and Differential Privacy.
CoRR, 2020

Detecting Anomalous Inputs to DNN Classifiers By Joint Statistical Testing at the Layers.
CoRR, 2020

Abstract Universal Approximation for Neural Networks.
CoRR, 2020

Robust Learning against Logical Adversaries.
CoRR, 2020

Robust Out-of-distribution Detection via Informative Outlier Mining.
CoRR, 2020

Representation Bayesian Risk Decompositions and Multi-Source Domain Adaptation.
CoRR, 2020

Obliviousness Makes Poisoning Adversaries Weaker.
CoRR, 2020

Robust Out-of-distribution Detection in Neural Networks.
CoRR, 2020

Face-Off: Adversarial Face Obfuscation.
CoRR, 2020

Analyzing Accuracy Loss in Randomized Smoothing Defenses.
CoRR, 2020

Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification.
CoRR, 2020

Exploring Connections Between Active Learning and Model Extraction.
Proceedings of the 29th USENIX Security Symposium, 2020

Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

OAT: Attesting Operation Integrity of Embedded Devices.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers.
Proceedings of the 2020 International Conference on Management of Data, 2020

Concise Explanations of Neural Networks using Adversarial Training.
Proceedings of the 37th International Conference on Machine Learning, 2020

CAUSE: Learning Granger Causality from Event Sequences using Attribution Methods.
Proceedings of the 37th International Conference on Machine Learning, 2020

Data-Dependent Differentially Private Parameter Learning for Directed Graphical Models.
Proceedings of the 37th International Conference on Machine Learning, 2020

On the Need for Topology-Aware Generative Models for Manifold-Based Defenses.
Proceedings of the 8th International Conference on Learning Representations, 2020

Adversarially Robust Learning Could Leverage Computational Hardness.
Proceedings of the Algorithmic Learning Theory, 2020

2019
Generating Semantic Adversarial Examples with Differentiable Rendering.
CoRR, 2019

On Need for Topology Awareness of Generative Models.
CoRR, 2019

Practical and Robust Privacy Amplification with Multi-Party Differential Privacy.
CoRR, 2019

Enhancing ML Robustness Using Physical-World Constraints.
CoRR, 2019

Attribution-driven Causal Analysis for Detection of Adversarial Examples.
CoRR, 2019

Outis: Crypto-Assisted Differential Privacy on Untrusted Servers.
CoRR, 2019

Answering Multi-Dimensional Analytical Queries under Local Differential Privacy.
Proceedings of the 2019 International Conference on Management of Data, 2019

Attribution-Based Confidence Metric For Deep Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Robust Attribution Regularization.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Privacy-Preserving Collaborative Prediction using Random Forests.
CoRR, 2018

Model Extraction and Active Learning.
CoRR, 2018

Explainable Black-Box Attacks Against Model-based Authentication.
CoRR, 2018

Adversarial Binaries for Authorship Identification.
CoRR, 2018

Improving Adversarial Robustness by Data-Specific Discretization.
CoRR, 2018

OEI: Operation Execution Integrity for Embedded Devices.
CoRR, 2018

Malware lineage in the wild.
Comput. Secur., 2018

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Locally Differentially Private Frequent Itemset Mining.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Neural-augmented static analysis of Android communication.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Privacy at Scale: Local Differential Privacy in Practice.
Proceedings of the 2018 International Conference on Management of Data, 2018

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Detecting Adversarial Examples Using Data Manifolds.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Smart Contracts and Opportunities for Formal Methods.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

Analyzing the Robustness of Nearest Neighbors to Adversarial Examples.
Proceedings of the 35th International Conference on Machine Learning, 2018

Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training.
Proceedings of the 35th International Conference on Machine Learning, 2018

Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
Privacy-Preserving Ridge Regression on Distributed Data.
IACR Cryptol. ePrint Arch., 2017

Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2017

Program synthesis for interactive-security systems.
Formal Methods Syst. Des., 2017

Manifold Assumption and Defenses Against Adversarial Perturbations.
CoRR, 2017

The Unintended Consequences of Overfitting: Training Data Inference Attacks.
CoRR, 2017

Optimizing Locally Differentially Private Protocols.
CoRR, 2017

ROSA: R Optimizations with Static Analysis.
CoRR, 2017

Policy by Example: An Approach for Security Policy Specification.
CoRR, 2017

Locally Differentially Private Protocols for Frequency Estimation.
Proceedings of the 26th USENIX Security Symposium, 2017

Cimplifier: automatically debloating containers.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Enhancing Android Security Through App Splitting.
Proceedings of the Security and Privacy in Communication Networks, 2017

Kali: Scalable encryption fingerprinting in dynamic malware traces.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Botnet protocol inference in the presence of encrypted traffic.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

New Directions for Container Debloating.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

Practical Black-Box Attacks against Machine Learning.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Composite Constant Propagation and its Application to Android Program Analysis.
IEEE Trans. Software Eng., 2016

Towards Least Privilege Containers with Cimplifier.
CoRR, 2016

Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples.
CoRR, 2016

Differentially Private Stochastic Gradient Descent for in-RDBMS Analytics.
CoRR, 2016

Practical DIFC Enforcement on Android.
Proceedings of the 25th USENIX Security Symposium, 2016

Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

The Limitations of Deep Learning in Adversarial Settings.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

A Methodology for Formalizing Model-Inversion Attacks.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences.
CoRR, 2015

Composite Constant Propagation: Application to Android Inter-Component Communication Analysis.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Efficient runtime-enforcement techniques for policy weaving.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Deep packet inspection with DFA-trees and parametrized language overapproximation.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Satisfiability modulo counting: a new approach for analyzing privacy properties.
Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 2014

Formatted Encryption Beyond Regular Languages.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
Inf. Secur. Tech. Rep., 2013

Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Declarative, Temporal, and Practical Programming with Capabilities.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Secure programs via game-based synthesis.
Proceedings of the Formal Methods in Computer-Aided Design, 2013

Security challenges in automotive hardware/software architecture design.
Proceedings of the Design, Automation and Test in Europe, 2013

Validating Library Usage Interactively.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

2012
Guest Editorial: Special Issue on Computer and Communications Security.
ACM Trans. Inf. Syst. Secur., 2012

Retargeting Android applications to Java bytecode.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Static analysis and compiler design for idempotent processing.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012

CrowdMine: towards crowdsourced human-assisted verification.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

Secure Programming via Visibly Pushdown Safety Games.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

2011
End-to-End Software Diversification of Internet Services.
Proceedings of the Moving Target Defense, 2011

Speculative Parallel Pattern Matching.
IEEE Trans. Inf. Forensics Secur., 2011

Towards Secure Bioinformatics Services (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2011

Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms.
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011

2010
Analysis Techniques for Information Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02334-7, 2010

A Declarative Framework for Intrusion Analysis.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Semantic integrity in large-scale online simulations.
ACM Trans. Internet Techn., 2010

Secure Computations on Non-Integer Values.
IACR Cryptol. ePrint Arch., 2010

Automatic Generation of Remediation Procedures for Malware Infections.
Proceedings of the 19th USENIX Security Symposium, 2010

Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Automating Security Mediation Placement.
Proceedings of the Programming Languages and Systems, 2010

DIFC programs by automatic instrumentation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Retrofitting Legacy Code for Security.
Proceedings of the Computer Aided Verification, 22nd International Conference, 2010

Design and implementation of the PLUG architecture for programmable and efficient network lookups.
Proceedings of the 19th International Conference on Parallel Architectures and Compilation Techniques, 2010

2009
Multi-byte Regular Expression Matching with Speculation.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Verifying Information Flow Control over Unbounded Processes.
Proceedings of the FM 2009: Formal Methods, 2009

Protocol Normalization Using Attribute Grammars.
Proceedings of the Computer Security, 2009

2008
A semantics-based approach to malware detection.
ACM Trans. Program. Lang. Syst., 2008

Towards Formal Verification of Role-Based Access Control Policies.
IEEE Trans. Dependable Secur. Comput., 2008

Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
IEEE Trans. Dependable Secur. Comput., 2008

XFA: Faster Signature Matching with Extended Automata.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Towards Practical Privacy for Genomic Computation.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Effective blame for information-flow violations.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Deflating the big bang: fast and scalable deep packet inspection with extended finite automata.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

A Layered Architecture for Detecting Malicious Behaviors.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Mining specifications of malicious behavior.
Proceedings of the Proceeding of the 1st Annual India Software Engineering Conference, 2008

Fast Signature Matching Using Extended Finite Automaton (XFA).
Proceedings of the Information Systems Security, 4th International Conference, 2008

The design and implementation of microdrivers.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
Software transformations to improve malware detection.
J. Comput. Virol., 2007

Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
IACR Cryptol. ePrint Arch., 2007

Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Microdrivers: A New Architecture for Device Drivers.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

Creating Vulnerability Signatures Using Weakest Preconditions.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

OmniUnpack: Fast, Generic, and Safe Unpacking of Malware.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Weighted Pushdown Systems and Trust-Management Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2006

Retrofitting Legacy Code for Authorization Policy Enforcement.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Towards Automatic Generation of Vulnerability-Based Signatures.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Automated Discovery of Mimicry Attacks.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Reducing the Dependence of SPKI/SDSI on PKI.
Proceedings of the Computer Security, 2006

On the Completeness of Attack Mutation Algorithms.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Protomatching network traffic for high throughputnetwork intrusion detection.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Secure function evaluation with ordered binary decision diagrams.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

NetSpy: Automatic Generation of Spyware Signatures for NIDS.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

Backtracking Algorithmic Complexity Attacks against a NIDS.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Weighted pushdown systems and their application to interprocedural dataflow analysis.
Sci. Comput. Program., 2005

An Iterative Framework for Simulation Conformance.
J. Log. Comput., 2005

An Architecture for Generating Semantic Aware Signatures.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Language-Based Generation and Evaluation of NIDS Signatures.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Semantics-Aware Malware Detection.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Environment-Sensitive Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Automatic discovery of API-level exploits.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

A Logic of File Systems.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005

Privacy Preserving Clustering.
Proceedings of the Computer Security, 2005

Automatic placement of authorization hooks in the linux security modules framework.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Modular Verification of Software Components in C.
IEEE Trans. Software Eng., 2004

Model checking SPKI/SDSI.
J. Comput. Secur., 2004

Formalizing Sensitivity in Static Analysis for Intrusion Detection.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Security Policy Reconciliation in Distributed Computing Environments.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Global Intrusion Detection in the DOMINO Overlay System.
Proceedings of the Network and Distributed System Security Symposium, 2004

Efficient Context-Sensitive Intrusion Detection.
Proceedings of the Network and Distributed System Security Symposium, 2004

Testing malware detectors.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004

Automatic Generation and Analysis of NIDS Attacks.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Efficient verification of security protocols using partial-order reductions.
Int. J. Softw. Tools Technol. Transf., 2003

Counterexample-guided abstraction refinement for symbolic model checking.
J. ACM, 2003

Static Analysis of Executables to Detect Malicious Patterns.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Integrating Publish/Subscribe into a Mobile Teamwork Support Platform.
Proceedings of the Fifteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2003), 2003

Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis.
Proceedings of the Static Analysis, 10th International Symposium, 2003

On Generalized Authorization Problems.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

Buffer overrun detection using linear programming and static analysis.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Detecting Manipulated Remote Call Streams.
Proceedings of the 11th USENIX Security Symposium, 2002

Automated Generation and Analysis of Attack Graphs.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Tree-Like Counterexamples in Model Checking.
Proceedings of the 17th IEEE Symposium on Logic in Computer Science (LICS 2002), 2002

Efficient Type Matching.
Proceedings of the Foundations of Software Science and Computation Structures, 2002

Two Formal Analys s of Attack Graphs.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

Analysis of SPKI/SDSI Certificates Using Model Checking.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Survivability Analysis of Network Systems.
Proceedings of the 23rd International Conference on Software Engineering, 2001

Efficient Filtering in Publish-Subscribe Systems Using Binary Decision.
Proceedings of the 23rd International Conference on Software Engineering, 2001

Non-linear Quantification Scheduling in Image Computation.
Proceedings of the 2001 IEEE/ACM International Conference on Computer-Aided Design, 2001

Progress on the State Explosion Problem in Model Checking.
Proceedings of the Informatics - 10 Years Back. 10 Years Ahead., 2001

Markov Chains, Classifiers, and Intrusion Detection.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Using Combinatorial Optimization Methods for Quantification Scheduling.
Proceedings of the Correct Hardware Design and Verification Methods, 2001

2000
Verifying security protocols with Brutus.
ACM Trans. Softw. Eng. Methodol., 2000

Partial Order Reductions for Security Protocol Verification.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 2000

Survivability Analysis of Network Specifications.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

Counterexample-Guided Abstraction Refinement.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000

Model checking algorithms for the µ-calculus.
Proceedings of the Proof, Language, and Interaction, Essays in Honour of Robin Milner, 2000

1999
Approximate Option Pricing.
Algorithmica, 1999

Generalized Stuttering Equivalence.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Abstract BDDs: A Technique for Using Abstraction in Model Checking.
Proceedings of the Correct Hardware Design and Verification Methods, 1999

1998
Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications.
ACM Trans. Program. Lang. Syst., 1998

Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning.
Formal Aspects Comput., 1998

Agent cloning: an approach to agent mobility and resource allocation.
IEEE Commun. Mag., 1998

Reasoning about Implicit Invocation.
Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 1998

Using state space exploration and a natural deduction style message derivation engine to verify security protocols.
Proceedings of the Programming Concepts and Methods, 1998

Agent Cloning.
Proceedings of the Third International Conference on Multiagent Systems, 1998

Strategies for Querying Information Agents.
Proceedings of the Cooperative Information Agents II, 1998

Symmetry Reductions in Model Checking.
Proceedings of the Computer Aided Verification, 10th International Conference, 1998

Increasing Resource Utilization and Task Performance by Agent Cloning.
Proceedings of the Intelligent Agents V, 1998

A Formal Treatment of Distributed Matchmaking.
Proceedings of the Second International Conference on Autonomous Agents, 1998

Query Restart Strategies for Web Agent.
Proceedings of the Second International Conference on Autonomous Agents, 1998

1997
Verifying Parameterized Networks.
ACM Trans. Program. Lang. Syst., 1997

An Improved Algorithm for the Evaluation of Fixpoint Expressions.
Theor. Comput. Sci., 1997

Combining Partial Order and Symmetry Reductions.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1997

Equivalence Checking Using Abstract BDDs.
Proceedings of the Proceedings 1997 International Conference on Computer Design: VLSI in Computers & Processors, 1997

Multi-Agent Coordination through Coalition Formation.
Proceedings of the Intelligent Agents IV, 1997

1996
Exploiting Symmetry in Temporal Logic Model Checking.
Formal Methods Syst. Des., 1996

Checking Relational Specifications With Binary Decision Diagrams.
Proceedings of the Fourth ACM SIGSOFT Symposium on Foundations of Software Engineering, 1996

Faster Checking of Software Specifications by Eliminating Isomorphs.
Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996

1995
Verification of the Futurebus+ Cache Coherence Protocol.
Formal Methods Syst. Des., 1995

Veryfying Parameterized Networks using Abstraction and Regular Languages.
Proceedings of the CONCUR '95: Concurrency Theory, 1995

Symmetry and Induction in Model Checking.
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995

1993
Exploiting Symmetry In Temporal Logic Model Checking.
Proceedings of the Computer Aided Verification, 5th International Conference, 1993

1992
Complexity of uniqueness and local search in quadratic 0-1 programming.
Oper. Res. Lett., 1992


  Loading...