R. Sekar
Affiliations: | Computer Science | Stony Brook University, Stony Brook, NY, United States |
Area:
Computer and Network Security, Software/Distributed Systems, Programming Languages, Software Engineering.Google:
"R. Sekar"Children
Sign in to add traineePremchand Uppuluri | grad student | 2003 | SUNY Stony Brook |
Ajay K. Gupta | grad student | 2004 | SUNY Stony Brook |
Venkatakrishnan Venkatesan Natarajan | grad student | 2004 | SUNY Stony Brook |
Zhenkai Liang | grad student | 2006 | SUNY Stony Brook |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Pelizzi R, Sekar R. (2015) Web sheets: Web applications for non-programmers Acm International Conference Proceeding Series. 8: 137-147 |
Qiao R, Zhang M, Sekar R. (2015) A principled approach for ROP defense Acm International Conference Proceeding Series. 7: 101-110 |
Tran T, Pelizzi R, Sekar R. (2015) JaTE: Transparent and efficient javascript confinement Acm International Conference Proceeding Series. 7: 151-160 |
Zhang M, Sekar R. (2015) Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks Acm International Conference Proceeding Series. 7: 91-100 |
Sze WK, Sekar R. (2015) Provenance-based integrity protection for windows Acm International Conference Proceeding Series. 7: 211-220 |
Uppuluri P, Sekar R. (2015) Experiences with specification-based intrusion detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2212: 172-189 |
Sze WK, Sekar R. (2014) Comprehensive integrity protection for desktop Linux Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 89-92 |
Sze WK, Mital B, Sekar R. (2014) Towards more usable information flow policies for contemporary operating systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 75-84 |
Zhang M, Qiao R, Hasabnis N, et al. (2014) A platform for secure static binary instrumentation Vee 2014 - Proceedings of the 10th Acm Sigplan/Sigops International Conference On Virtual Execution Environments. 129-140 |
Szekeres L, Payer M, Wei LT, et al. (2014) Eternal war in memory Ieee Security and Privacy. 12: 45-53 |