R. Sekar

Orcid: 0009-0008-9135-3296

Affiliations:
  • Stony Brook University, Department of Computer Science, NY, USA (1986-1991, since 1999, PhD 1991)
  • Iowa State University, Department of Computer Science, Ames, IA, USA (1996-1999)


According to our database1, R. Sekar authored at least 100 papers between 1989 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection.
CoRR, 2024

eAudit: A Fast, Scalable and Deployable Audit Data Collection System.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Scalable, Sound, and Accurate Jump Table Analysis.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

2023
SAFER: Efficient and Error-Tolerant Binary Instrumentation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Accurate Disassembly of Complex Binaries Without Use of Compiler Metadata.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2020
Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

On the Impact of Exception Handling Compatibility on Binary Instrumentation.
Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation, 2020

Information Flow: A Unified Basis for Vulnerability Mitigation, Malware Defense and Attack Scenario Reconstruction.
Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation, 2020

Practical Fine-Grained Binary Code Randomization†.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Dependence-Preserving Data Compaction for Scalable Forensic Analysis.
Proceedings of the 27th USENIX Security Symposium, 2018

Code-pointer integrity.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
Proceedings of the 26th USENIX Security Symposium, 2017

Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata.
IEEE Trans. Inf. Forensics Secur., 2016

Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program.
CoRR, 2016

Extracting instruction semantics via symbolic execution of code generators.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Hardening OpenStack Cloud Platforms against Compute Node Compromises.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

2015
WebSheets: Web Applications for Non-Programmers.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

Checking correctness of code generator architecture specifications.
Proceedings of the 13th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2015

Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

JaTE: Transparent and Efficient JavaScript Confinement.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Provenance-based Integrity Protection for Windows.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

A Principled Approach for ROP Defense.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Eternal War in Memory.
IEEE Secur. Priv., 2014

A platform for secure static binary instrumentation.
Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2014

Comprehensive integrity protection for desktop linux.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Towards more usable information flow policies for contemporary operating systems.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Code-Pointer Integrity.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

2013
Control Flow Integrity for COTS Binaries.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

A portable user-level approach for system-wide integrity protection.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Light-weight bounds checking.
Proceedings of the 10th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2012

Protection, usability and improvements in reflected XSS filters.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Taint-Enhanced Anomaly Detection.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Information Flow Containment: A Practical Basis for Malware Defense.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

A server- and browser-transparent CSRF defense for web 2.0 applications.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Runtime Analysis and Instrumentation for Securing Software.
Proceedings of the Runtime Verification - First International Conference, 2010

PAriCheck: an efficient pointer arithmetic checker for C programs.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software.
ACM Trans. Inf. Syst. Secur., 2009

An Efficient Black-box Technique for Defeating Web Application Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2009

Online Signature Generation for Windows Systems.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Fast Packet Classification Using Condition Factorization.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments.
Proceedings of the Workshop on Cyber Security and Test, 2008

Practical Proactive Integrity Preservation: A Basis for Malware Defense.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

The role of virtualization in computing education.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

Anomalous Taint Detection.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Fast Packet Classification for Snort by Native Compilation of Rules.
Proceedings of the 22nd Large Installation System Administration Conference, 2008

Expanding Malware Defense by Securing Software Installations.
Proceedings of the Detection of Intrusions and Malware, 2008

On the Limits of Information Flow Techniques for Malware Analysis and Containment.
Proceedings of the Detection of Intrusions and Malware, 2008

Data Space Randomization.
Proceedings of the Detection of Intrusions and Malware, 2008

Efficient fine-grained binary instrumentationwith applications to taint-tracking.
Proceedings of the Sixth International Symposium on Code Generation and Optimization (CGO 2008), 2008

A practical mimicry attack against powerful system-call monitors.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Inferring Higher Level Policies from Firewall Rules.
Proceedings of the 21th Large Installation System Administration Conference, 2007

2006
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Dataflow Anomaly Detection.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

A Framework for Building Privacy-Conscious Composite Web Services.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Provably Correct Runtime Enforcement of Non-interference Properties.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Address-Space Randomization for Windows Systems.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
An approach for realizing privacy-preserving web-based services.
Proceedings of the 14th international conference on World Wide Web, 2005

Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
Proceedings of the Network and Distributed System Security Symposium, 2005

Fast and automated generation of attack signatures: a basis for building self-protecting servers.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
An efficient and backwards-compatible transformation to ensure memory safety of C programs.
Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2004, Newport Beach, CA, USA, October 31, 2004

2003
Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

Model-carrying code: a practical approach for safe execution of untrusted applications.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

An Approach for Detecting Self-propagating Email Using Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Model-Based Analysis of Configuration Vulnerabilities.
J. Comput. Secur., 2002

Empowering mobile code using expressive security policies.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

An Approach for Secure Software Installation.
Proceedings of the 16th Conference on Systems Administration (LISA 2002), 2002

Specification-based anomaly detection: a new approach for detecting network intrusions.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Automata-driven efficient subterm unification.
Theor. Comput. Sci., 2001

A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Experiences with Specification-Based Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

Model-Carrying Code (MCC): a new paradigm for mobile-code security.
Proceedings of the New Security Paradigms Workshop 2001, 2001

Term Indexing.
Proceedings of the Handbook of Automated Reasoning (in 2 volumes), 2001

2000
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement.
Proceedings of the Network and Distributed System Security Symposium, 2000

1999
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

On Preventing Intrusions by Process Behavior Monitoring.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999

A High-Performance Network Intrusion Detection System.
Proceedings of the CCS '99, 1999

1998
A Conservative Technique to Improve Deterministic Evaluation of Logic Programs.
Proceedings of the 1998 International Conference on Computer Languages, 1998

1997
EQUALS - A Fast Parallel Implementation of a Lazy Language.
J. Funct. Program., 1997

On the power and limitations of strictness analysis.
J. ACM, 1997

1995
Fast Strictness Analysis Based on Demand Propagation.
ACM Trans. Program. Lang. Syst., 1995

Adaptive Pattern Matching.
SIAM J. Comput., 1995

A Symbolic Constraint Solving Framework for Analysis of Logic Programs.
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, 1995

1994
A High Performance Runtime System for Parallel Evaluation of Lazy Languages.
Proceedings of the First International Symposium on Parallel Symbolic Computation, 1994

Modelling techniques for evolving distributed applications.
Proceedings of the Formal Description Techniques VII, 1994

1993
Programming in Equational Logic: Beyond Strong Sequentiality
Inf. Comput., May, 1993

The Touring Machine System.
Commun. ACM, 1993

Extracting Determinacy in Logic Programs.
Proceedings of the Logic Programming, 1993

1992
On Modelling and Reasoning About Hybrid Systems.
Proceedings of the Protocol Specification, 1992

Fast Parallel Implementation of Lazy Languages - The EQUALS Experience.
Proceedings of the Conference on Lisp and Functional Programming, 1992

Programming with Equations: A Framework for Lazy Parallel Evaluation.
Proceedings of the Automated Deduction, 1992

1991
On the Power and Limitation of Strictness Analysis Based on Abstract Interpretation.
Proceedings of the Conference Record of the Eighteenth Annual ACM Symposium on Principles of Programming Languages, 1991

1990
Small Domains Spell Fast Strictness Analysis.
Proceedings of the Conference Record of the Seventeenth Annual ACM Symposium on Principles of Programming Languages, 1990

1989
Transforming Strongly Sequential Rewrite Systems with Constructors for Efficient parallel Execution.
Proceedings of the Rewriting Techniques and Applications, 3rd International Conference, 1989


  Loading...