Year |
Citation |
Score |
2015 |
Pelizzi R, Sekar R. Web sheets: Web applications for non-programmers Acm International Conference Proceeding Series. 8: 137-147. DOI: 10.1145/2841113.2841124 |
1 |
|
2015 |
Qiao R, Zhang M, Sekar R. A principled approach for ROP defense Acm International Conference Proceeding Series. 7: 101-110. DOI: 10.1145/2818000.2818021 |
1 |
|
2015 |
Tran T, Pelizzi R, Sekar R. JaTE: Transparent and efficient javascript confinement Acm International Conference Proceeding Series. 7: 151-160. DOI: 10.1145/2818000.2818019 |
1 |
|
2015 |
Zhang M, Sekar R. Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks Acm International Conference Proceeding Series. 7: 91-100. DOI: 10.1145/2818000.2818016 |
1 |
|
2015 |
Sze WK, Sekar R. Provenance-based integrity protection for windows Acm International Conference Proceeding Series. 7: 211-220. DOI: 10.1145/2818000.2818011 |
1 |
|
2015 |
Uppuluri P, Sekar R. Experiences with specification-based intrusion detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2212: 172-189. |
1 |
|
2014 |
Sze WK, Sekar R. Comprehensive integrity protection for desktop Linux Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 89-92. DOI: 10.1145/2613087.2613112 |
1 |
|
2014 |
Sze WK, Mital B, Sekar R. Towards more usable information flow policies for contemporary operating systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 75-84. DOI: 10.1145/2613087.2613110 |
1 |
|
2014 |
Zhang M, Qiao R, Hasabnis N, Sekar R. A platform for secure static binary instrumentation Vee 2014 - Proceedings of the 10th Acm Sigplan/Sigops International Conference On Virtual Execution Environments. 129-140. DOI: 10.1145/2576195.2576208 |
1 |
|
2014 |
Szekeres L, Payer M, Wei LT, Sekar R. Eternal war in memory Ieee Security and Privacy. 12: 45-53. DOI: 10.1109/MSP.2014.44 |
1 |
|
2014 |
Wu Z, Sekar R, Hsieh SJ. Study of factors impacting remote diagnosis performance on a PLC based automated system Journal of Manufacturing Systems. 33: 589-603. DOI: 10.1016/j.jmsy.2014.05.007 |
1 |
|
2013 |
Sze WK, Sekar R. A portable user-level approach for system-wide integrity protection Acm International Conference Proceeding Series. 219-228. DOI: 10.1145/2523649.2523655 |
1 |
|
2012 |
Hasabnis N, Misra A, Sekar R. Light-weight bounds checking Proceedings - International Symposium On Code Generation and Optimization, Cgo 2012. 135-144. DOI: 10.1145/2259016.2259034 |
1 |
|
2012 |
Sekar R, Hsieh SJ, Wu Z. Remote diagnosis design for a PLC-based automated system: 2-evaluation of factors affecting remote diagnosis performance International Journal of Advanced Manufacturing Technology. 1-19. DOI: 10.1007/s00170-012-4242-9 |
1 |
|
2012 |
Nandi S, Sekar R. Message from the general chairs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7671: V-VI. |
1 |
|
2011 |
Pelizzi R, Sekar R. A server- and browser-transparent CSRF defense for web 2.0 applications Acm International Conference Proceeding Series. 257-266. DOI: 10.1145/2076732.2076768 |
1 |
|
2011 |
Sekar R, Hsieh SJ, Wu Z. Remote diagnosis design for a PLC-based automated system: 1-implementation of three levels of architectures International Journal of Advanced Manufacturing Technology. 57: 683-700. DOI: 10.1007/s00170-011-3314-6 |
1 |
|
2011 |
Cavallaro L, Sekar R. Taint-enhanced anomaly detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7093: 160-174. DOI: 10.1007/978-3-642-25560-1_11 |
1 |
|
2011 |
Sekar R. Information flow containment: A practical basis for malware defense Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6818: 1-3. DOI: 10.1007/978-3-642-22348-8_1 |
1 |
|
2010 |
Younan Y, Philippaerts P, Cavallaro L, Sekar R, Piessens F, Joosen W. PAriCheck: An efficient pointer arithmetic checker for C programs Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 145-156. DOI: 10.1145/1755688.1755707 |
1 |
|
2009 |
Liang Z, Sun W, Venkatakrishnan VN, Sekar R. Alcatraz: An isolated environment for experimenting with untrusted software Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455527 |
1 |
|
2009 |
Li L, Just JE, Sekar R. Online signature generation for windows systems Proceedings - Annual Computer Security Applications Conference, Acsac. 289-298. DOI: 10.1109/ACSAC.2009.34 |
1 |
|
2009 |
Tongaonkar A, Sekar R, Vasudevan S. Fast packet classification using condition factorization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5536: 417-436. DOI: 10.1007/978-3-642-01957-9_26 |
1 |
|
2008 |
Parampalli C, Sekar R, Johnson R. A practical mimicry attack against powerful system-call monitors Proceedings of the 2008 Acm Symposium On Information, Computer and Communications Security, Asiaccs '08. 156-167. DOI: 10.1145/1368310.1368334 |
1 |
|
2008 |
Saxena P, Sekar R, Puranik V. Efficient fine-grained binary instrumentation with applications to taint-tracking Proceedings of the 2008 Cgo - Sixth International Symposium On Code Generation and Optimization. 74-83. DOI: 10.1145/1356058.1356069 |
1 |
|
2008 |
Gaspar A, Langevin S, Armitage W, Sekar R, Daniels T. The role of virtualization in computing education Sigcse'08 - Proceedings of the 39th Acm Technical Symposium On Computer Science Education. 131-132. DOI: 10.1145/1352135.1352181 |
1 |
|
2008 |
Sun W, Sekar R, Poothia G, Karandikar T. Practical proactive integrity preservation: A basis for malware defense Proceedings - Ieee Symposium On Security and Privacy. 248-262. DOI: 10.1109/SP.2008.35 |
1 |
|
2008 |
Cavallaro L, Sekar R. Anomalous taint detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 417-418. DOI: 10.1007/978-3-540-87403-4_34 |
1 |
|
2008 |
Sun W, Sekar R, Liang Z, Venkatakrishnan VN. Expanding malware defense by securing software installations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5137: 164-185. DOI: 10.1007/978-3-540-70542-0_9 |
1 |
|
2008 |
Cavallaro L, Saxena P, Sekar R. On the limits of information flow techniques for malware analysis and containment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5137: 143-163. DOI: 10.1007/978-3-540-70542-0_8 |
1 |
|
2008 |
Bhatkar S, Sekar R. Data space randomization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5137: 1-22. DOI: 10.1007/978-3-540-70542-0_1 |
1 |
|
2006 |
Bhatkar S, Chaturvedi A, Sekar R. Dataflow anomaly detection Proceedings - Ieee Symposium On Security and Privacy. 2006: 48-62. DOI: 10.1109/SP.2006.12 |
1 |
|
2006 |
Xu W, Venkatakrishnan VN, Sekar R, Ramakrishnan IV. A framework for building privacy-conscious composite web services Proceedings - Icws 2006: 2006 Ieee International Conference On Web Services. 655-662. DOI: 10.1109/ICWS.2006.4 |
1 |
|
2006 |
Li L, Just JE, Sekar R. Address-space randomization for windows systems Proceedings - Annual Computer Security Applications Conference, Acsac. 329-338. DOI: 10.1109/ACSAC.2006.10 |
1 |
|
2005 |
Xu W, Sekar R, Ramakrishnan IV, Venkatakrishnan VN. An approach for realizing privacy-preserving web-based services 14th International World Wide Web Conference, Www2005. 1014-1015. DOI: 10.1145/1062745.1062845 |
1 |
|
2005 |
Venkatakrishnan VN, Xu W, Ramakrishnan IV, Sekar R. A secure composition framework for trustworthy personal information assistants 2005 International Conference On Integration of Knowledge Intensive Multi-Agent Systems, Kimas'05: Modeling, Exploration, and Engineering. 2005: 561-566. DOI: 10.1109/KIMAS.2005.1427144 |
1 |
|
2005 |
Liang Z, Sekar R. Automatic generation of buffer overflow attack signatures: An approach based on program behavior models Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 215-224. DOI: 10.1109/CSAC.2005.12 |
1 |
|
2005 |
Liang Z, Sekar R. Fast and automated generation of attack signatures: A basis for building self-protecting servers Proceedings of the Acm Conference On Computer and Communications Security. 213-222. |
1 |
|
2004 |
Xu W, DuVarney DC, Sekar R. An efficient and backwards-compatible transformation to ensure memory safety of C programs Proceedings of the Acm Sigsoft Symposium On the Foundations of Software Engineering. 117-126. |
1 |
|
2004 |
Foley S, Sekar R. A note from the new security paradigms workshop 2003 program chairs Proceedings New Security Paradigms Workshop. vi. |
1 |
|
2003 |
Liang Z, Venkatakrishnan VN, Sekar R. Isolated program execution: An application transparent approach for executing untrusted programs Proceedings - Annual Computer Security Applications Conference, Acsac. 2003: 182-191. DOI: 10.1109/CSAC.2003.1254323 |
1 |
|
2003 |
Sekar R, Venkatakrishnan VN, Basu S, Bhatkar S, Duvarney DC. Model-carrying code: A practical approach for safe execution of untrusted applications Operating Systems Review (Acm). 37: 15-28. |
1 |
|
2003 |
Gupta A, Sekar R. An approach for detecting self-propagating email using anomaly detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2820: 55-72. |
1 |
|
2002 |
Venkatakrishnan VN, Peri R, Sekar R. Empowering mobile code using expressive security policies Proceedings New Security Paradigms Workshop. 61-68. |
1 |
|
2002 |
Sekar R, Gupta A, Frullo J, Shanbhag T, Tiwari A, Yang H, Zhou S. Specification-based anomaly detection: A new approach for detecting network intrusions Proceedings of the Acm Conference On Computer and Communications Security. 265-274. |
1 |
|
2002 |
Ramakrishnan CR, Sekar R. Model-based analysis of configuration vulnerabilities Journal of Computer Security. 10: 189-209. |
1 |
|
2001 |
Ramesh R, Ramakrishnan IV, Sekar RC. Automata-driven efficient subterm unification Theoretical Computer Science. 254: 187-223. DOI: 10.1016/S0304-3975(99)00131-0 |
1 |
|
2001 |
Sekar R, Ramakrishnan CR, Ramakrishnan IV, Smolka SA. Model-carrying code (MCC): A new paradigm for mobile-code security Proceedings New Security Paradigms Workshop. 23-30. |
1 |
|
2001 |
Sekar R, Bendre M, Dhurjati D, Bollineni P. A fast automation-based method for detecting anomalous program behaviors Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 144-155. |
1 |
|
2000 |
Bowen T, Chee D, Segal M, Sekar R, Shanbhag T, Uppuluri P. Building survivable systems: An integrated approach based on intrusion detection and damage containment Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 2: 84-99. DOI: 10.1109/DISCEX.2000.821511 |
1 |
|
1999 |
Sekar R, Guang Y, Verma S, Shanbhag T. High-performance network intrusion detection system Proceedings of the Acm Conference On Computer and Communications Security. 8-17. |
1 |
|
1998 |
Roychoudhury A, Ramakrishnan CR, Ramakrishnan IV, Sekar R. Conservative technique to improve deterministic evaluation of logic programs Proceedings of the Ieee International Conference On Computer Languages. 196-205. DOI: 10.1109/ICCL.1998.674170 |
1 |
|
1997 |
Sekar R, Ramakrishnan IV, Mishra P. On the power and limitations of strictness analysis Journal of the Acm. 44: 505-525. |
1 |
|
1997 |
Kaser O, Ramakrishnan CR, Ramakrishnan IV, Sekar RC. Equals - A fast parallel implementation of a lazy language Journal of Functional Programming. 7: 183-217. |
1 |
|
1995 |
Sekar R, Ramakrishnan IV. Fast strictness analysis based on demand propagation Acm Transactions On Programming Languages and Systems. 17: 896-937. DOI: 10.1145/218570.218573 |
1 |
|
1993 |
Sekar RC, Ramakrishnan IV. Programming in Equational Logic: Beyond Strong Sequentiality Information and Computation. 104: 78-109. DOI: 10.1006/inco.1993.1026 |
1 |
|
1992 |
Kaser O, Pawagi S, Ramakrishnan CR, Ramakrishnan IV, Sekar RC. Fast parallel implementation of lazy languages - the EQUALS experience . 335-344. |
1 |
|
1990 |
Sekar RC, Pawagi S, Ramakrishnan IV. Small domains spell fast strictness analysis Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 169-183. |
1 |
|
1989 |
Sekar RC, Pawagi S, Ramakrishnan IV. Parallel execution of equational programs Tencon '89: Fourth Ieee Region 10 International Conference. 885-892. |
1 |
|
1988 |
Umamaheswari G, Sekar RC, Jhunjhunwala A, Eswaran C. Signal processing workstation on the VME bus Iete Journal of Research. 34: 435-440. |
1 |
|
Show low-probability matches. |