R. Sekar

Affiliations: 
Computer Science Stony Brook University, Stony Brook, NY, United States 
Area:
Computer and Network Security, Software/Distributed Systems, Programming Languages, Software Engineering.
Google:
"R. Sekar"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Pelizzi R, Sekar R. (2015) Web sheets: Web applications for non-programmers Acm International Conference Proceeding Series. 8: 137-147
Qiao R, Zhang M, Sekar R. (2015) A principled approach for ROP defense Acm International Conference Proceeding Series. 7: 101-110
Tran T, Pelizzi R, Sekar R. (2015) JaTE: Transparent and efficient javascript confinement Acm International Conference Proceeding Series. 7: 151-160
Zhang M, Sekar R. (2015) Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks Acm International Conference Proceeding Series. 7: 91-100
Sze WK, Sekar R. (2015) Provenance-based integrity protection for windows Acm International Conference Proceeding Series. 7: 211-220
Uppuluri P, Sekar R. (2015) Experiences with specification-based intrusion detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2212: 172-189
Sze WK, Sekar R. (2014) Comprehensive integrity protection for desktop Linux Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 89-92
Sze WK, Mital B, Sekar R. (2014) Towards more usable information flow policies for contemporary operating systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 75-84
Zhang M, Qiao R, Hasabnis N, et al. (2014) A platform for secure static binary instrumentation Vee 2014 - Proceedings of the 10th Acm Sigplan/Sigops International Conference On Virtual Execution Environments. 129-140
Szekeres L, Payer M, Wei LT, et al. (2014) Eternal war in memory Ieee Security and Privacy. 12: 45-53
See more...