R. Sekar - Publications

Affiliations: 
Computer Science Stony Brook University, Stony Brook, NY, United States 
Area:
Computer and Network Security, Software/Distributed Systems, Programming Languages, Software Engineering.

60 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Pelizzi R, Sekar R. Web sheets: Web applications for non-programmers Acm International Conference Proceeding Series. 8: 137-147. DOI: 10.1145/2841113.2841124  1
2015 Qiao R, Zhang M, Sekar R. A principled approach for ROP defense Acm International Conference Proceeding Series. 7: 101-110. DOI: 10.1145/2818000.2818021  1
2015 Tran T, Pelizzi R, Sekar R. JaTE: Transparent and efficient javascript confinement Acm International Conference Proceeding Series. 7: 151-160. DOI: 10.1145/2818000.2818019  1
2015 Zhang M, Sekar R. Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks Acm International Conference Proceeding Series. 7: 91-100. DOI: 10.1145/2818000.2818016  1
2015 Sze WK, Sekar R. Provenance-based integrity protection for windows Acm International Conference Proceeding Series. 7: 211-220. DOI: 10.1145/2818000.2818011  1
2015 Uppuluri P, Sekar R. Experiences with specification-based intrusion detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2212: 172-189.  1
2014 Sze WK, Sekar R. Comprehensive integrity protection for desktop Linux Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 89-92. DOI: 10.1145/2613087.2613112  1
2014 Sze WK, Mital B, Sekar R. Towards more usable information flow policies for contemporary operating systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 75-84. DOI: 10.1145/2613087.2613110  1
2014 Zhang M, Qiao R, Hasabnis N, Sekar R. A platform for secure static binary instrumentation Vee 2014 - Proceedings of the 10th Acm Sigplan/Sigops International Conference On Virtual Execution Environments. 129-140. DOI: 10.1145/2576195.2576208  1
2014 Szekeres L, Payer M, Wei LT, Sekar R. Eternal war in memory Ieee Security and Privacy. 12: 45-53. DOI: 10.1109/MSP.2014.44  1
2014 Wu Z, Sekar R, Hsieh SJ. Study of factors impacting remote diagnosis performance on a PLC based automated system Journal of Manufacturing Systems. 33: 589-603. DOI: 10.1016/j.jmsy.2014.05.007  1
2013 Sze WK, Sekar R. A portable user-level approach for system-wide integrity protection Acm International Conference Proceeding Series. 219-228. DOI: 10.1145/2523649.2523655  1
2012 Hasabnis N, Misra A, Sekar R. Light-weight bounds checking Proceedings - International Symposium On Code Generation and Optimization, Cgo 2012. 135-144. DOI: 10.1145/2259016.2259034  1
2012 Sekar R, Hsieh SJ, Wu Z. Remote diagnosis design for a PLC-based automated system: 2-evaluation of factors affecting remote diagnosis performance International Journal of Advanced Manufacturing Technology. 1-19. DOI: 10.1007/s00170-012-4242-9  1
2012 Nandi S, Sekar R. Message from the general chairs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7671: V-VI.  1
2011 Pelizzi R, Sekar R. A server- and browser-transparent CSRF defense for web 2.0 applications Acm International Conference Proceeding Series. 257-266. DOI: 10.1145/2076732.2076768  1
2011 Sekar R, Hsieh SJ, Wu Z. Remote diagnosis design for a PLC-based automated system: 1-implementation of three levels of architectures International Journal of Advanced Manufacturing Technology. 57: 683-700. DOI: 10.1007/s00170-011-3314-6  1
2011 Cavallaro L, Sekar R. Taint-enhanced anomaly detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7093: 160-174. DOI: 10.1007/978-3-642-25560-1_11  1
2011 Sekar R. Information flow containment: A practical basis for malware defense Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6818: 1-3. DOI: 10.1007/978-3-642-22348-8_1  1
2010 Younan Y, Philippaerts P, Cavallaro L, Sekar R, Piessens F, Joosen W. PAriCheck: An efficient pointer arithmetic checker for C programs Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 145-156. DOI: 10.1145/1755688.1755707  1
2009 Liang Z, Sun W, Venkatakrishnan VN, Sekar R. Alcatraz: An isolated environment for experimenting with untrusted software Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455527  1
2009 Li L, Just JE, Sekar R. Online signature generation for windows systems Proceedings - Annual Computer Security Applications Conference, Acsac. 289-298. DOI: 10.1109/ACSAC.2009.34  1
2009 Tongaonkar A, Sekar R, Vasudevan S. Fast packet classification using condition factorization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5536: 417-436. DOI: 10.1007/978-3-642-01957-9_26  1
2008 Parampalli C, Sekar R, Johnson R. A practical mimicry attack against powerful system-call monitors Proceedings of the 2008 Acm Symposium On Information, Computer and Communications Security, Asiaccs '08. 156-167. DOI: 10.1145/1368310.1368334  1
2008 Saxena P, Sekar R, Puranik V. Efficient fine-grained binary instrumentation with applications to taint-tracking Proceedings of the 2008 Cgo - Sixth International Symposium On Code Generation and Optimization. 74-83. DOI: 10.1145/1356058.1356069  1
2008 Gaspar A, Langevin S, Armitage W, Sekar R, Daniels T. The role of virtualization in computing education Sigcse'08 - Proceedings of the 39th Acm Technical Symposium On Computer Science Education. 131-132. DOI: 10.1145/1352135.1352181  1
2008 Sun W, Sekar R, Poothia G, Karandikar T. Practical proactive integrity preservation: A basis for malware defense Proceedings - Ieee Symposium On Security and Privacy. 248-262. DOI: 10.1109/SP.2008.35  1
2008 Cavallaro L, Sekar R. Anomalous taint detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 417-418. DOI: 10.1007/978-3-540-87403-4_34  1
2008 Sun W, Sekar R, Liang Z, Venkatakrishnan VN. Expanding malware defense by securing software installations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5137: 164-185. DOI: 10.1007/978-3-540-70542-0_9  1
2008 Cavallaro L, Saxena P, Sekar R. On the limits of information flow techniques for malware analysis and containment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5137: 143-163. DOI: 10.1007/978-3-540-70542-0_8  1
2008 Bhatkar S, Sekar R. Data space randomization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5137: 1-22. DOI: 10.1007/978-3-540-70542-0_1  1
2006 Bhatkar S, Chaturvedi A, Sekar R. Dataflow anomaly detection Proceedings - Ieee Symposium On Security and Privacy. 2006: 48-62. DOI: 10.1109/SP.2006.12  1
2006 Xu W, Venkatakrishnan VN, Sekar R, Ramakrishnan IV. A framework for building privacy-conscious composite web services Proceedings - Icws 2006: 2006 Ieee International Conference On Web Services. 655-662. DOI: 10.1109/ICWS.2006.4  1
2006 Li L, Just JE, Sekar R. Address-space randomization for windows systems Proceedings - Annual Computer Security Applications Conference, Acsac. 329-338. DOI: 10.1109/ACSAC.2006.10  1
2005 Xu W, Sekar R, Ramakrishnan IV, Venkatakrishnan VN. An approach for realizing privacy-preserving web-based services 14th International World Wide Web Conference, Www2005. 1014-1015. DOI: 10.1145/1062745.1062845  1
2005 Venkatakrishnan VN, Xu W, Ramakrishnan IV, Sekar R. A secure composition framework for trustworthy personal information assistants 2005 International Conference On Integration of Knowledge Intensive Multi-Agent Systems, Kimas'05: Modeling, Exploration, and Engineering. 2005: 561-566. DOI: 10.1109/KIMAS.2005.1427144  1
2005 Liang Z, Sekar R. Automatic generation of buffer overflow attack signatures: An approach based on program behavior models Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 215-224. DOI: 10.1109/CSAC.2005.12  1
2005 Liang Z, Sekar R. Fast and automated generation of attack signatures: A basis for building self-protecting servers Proceedings of the Acm Conference On Computer and Communications Security. 213-222.  1
2004 Xu W, DuVarney DC, Sekar R. An efficient and backwards-compatible transformation to ensure memory safety of C programs Proceedings of the Acm Sigsoft Symposium On the Foundations of Software Engineering. 117-126.  1
2004 Foley S, Sekar R. A note from the new security paradigms workshop 2003 program chairs Proceedings New Security Paradigms Workshop. vi.  1
2003 Liang Z, Venkatakrishnan VN, Sekar R. Isolated program execution: An application transparent approach for executing untrusted programs Proceedings - Annual Computer Security Applications Conference, Acsac. 2003: 182-191. DOI: 10.1109/CSAC.2003.1254323  1
2003 Sekar R, Venkatakrishnan VN, Basu S, Bhatkar S, Duvarney DC. Model-carrying code: A practical approach for safe execution of untrusted applications Operating Systems Review (Acm). 37: 15-28.  1
2003 Gupta A, Sekar R. An approach for detecting self-propagating email using anomaly detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2820: 55-72.  1
2002 Venkatakrishnan VN, Peri R, Sekar R. Empowering mobile code using expressive security policies Proceedings New Security Paradigms Workshop. 61-68.  1
2002 Sekar R, Gupta A, Frullo J, Shanbhag T, Tiwari A, Yang H, Zhou S. Specification-based anomaly detection: A new approach for detecting network intrusions Proceedings of the Acm Conference On Computer and Communications Security. 265-274.  1
2002 Ramakrishnan CR, Sekar R. Model-based analysis of configuration vulnerabilities Journal of Computer Security. 10: 189-209.  1
2001 Ramesh R, Ramakrishnan IV, Sekar RC. Automata-driven efficient subterm unification Theoretical Computer Science. 254: 187-223. DOI: 10.1016/S0304-3975(99)00131-0  1
2001 Sekar R, Ramakrishnan CR, Ramakrishnan IV, Smolka SA. Model-carrying code (MCC): A new paradigm for mobile-code security Proceedings New Security Paradigms Workshop. 23-30.  1
2001 Sekar R, Bendre M, Dhurjati D, Bollineni P. A fast automation-based method for detecting anomalous program behaviors Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 144-155.  1
2000 Bowen T, Chee D, Segal M, Sekar R, Shanbhag T, Uppuluri P. Building survivable systems: An integrated approach based on intrusion detection and damage containment Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 2: 84-99. DOI: 10.1109/DISCEX.2000.821511  1
1999 Sekar R, Guang Y, Verma S, Shanbhag T. High-performance network intrusion detection system Proceedings of the Acm Conference On Computer and Communications Security. 8-17.  1
1998 Roychoudhury A, Ramakrishnan CR, Ramakrishnan IV, Sekar R. Conservative technique to improve deterministic evaluation of logic programs Proceedings of the Ieee International Conference On Computer Languages. 196-205. DOI: 10.1109/ICCL.1998.674170  1
1997 Sekar R, Ramakrishnan IV, Mishra P. On the power and limitations of strictness analysis Journal of the Acm. 44: 505-525.  1
1997 Kaser O, Ramakrishnan CR, Ramakrishnan IV, Sekar RC. Equals - A fast parallel implementation of a lazy language Journal of Functional Programming. 7: 183-217.  1
1995 Sekar R, Ramakrishnan IV. Fast strictness analysis based on demand propagation Acm Transactions On Programming Languages and Systems. 17: 896-937. DOI: 10.1145/218570.218573  1
1993 Sekar RC, Ramakrishnan IV. Programming in Equational Logic: Beyond Strong Sequentiality Information and Computation. 104: 78-109. DOI: 10.1006/inco.1993.1026  1
1992 Kaser O, Pawagi S, Ramakrishnan CR, Ramakrishnan IV, Sekar RC. Fast parallel implementation of lazy languages - the EQUALS experience . 335-344.  1
1990 Sekar RC, Pawagi S, Ramakrishnan IV. Small domains spell fast strictness analysis Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 169-183.  1
1989 Sekar RC, Pawagi S, Ramakrishnan IV. Parallel execution of equational programs Tencon '89: Fourth Ieee Region 10 International Conference. 885-892.  1
1988 Umamaheswari G, Sekar RC, Jhunjhunwala A, Eswaran C. Signal processing workstation on the VME bus Iete Journal of Research. 34: 435-440.  1
Show low-probability matches.