ÆÈ·Î¿ì
R. Sekar
R. Sekar
Professor of Computer Science, Stony Brook University
cs.stonybrook.eduÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
S Bhatkar, DC DuVarney, R Sekar
12th USENIX Security Symposium (USENIX Security 03), 2003
9102003
A fast automaton-based method for detecting anomalous program behaviors
R Sekar, M Bendre, D Dhurjati, P Bollineni
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 144-155, 2000
9082000
Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks
M Zhang, R Sekar
Proceedings of the 31st Annual Computer Security Applications Conference, 91-100, 2015
7312015
Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks
M Zhang, R Sekar
Proceedings of the 31st Annual Computer Security Applications Conference, 91-100, 2015
7312015
Specification-based anomaly detection: a new approach for detecting network intrusions
R Sekar, A Gupta, J Frullo, T Shanbhag, A Tiwari, H Yang, S Zhou
Proceedings of the 9th ACM conference on Computer and communications ¡¦, 2002
6242002
Code-pointer integrity
V Kuznetzov, L Szekeres, M Payer, G Candea, R Sekar, D Song
The Continuing Arms Race: Code-Reuse Attacks and Defenses, 81-116, 2018
6172018
Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks.
W Xu, S Bhatkar, R Sekar
USENIX Security Symposium, 121-136, 2006
5302006
Efficient Techniques for Comprehensive Protection from Memory Error Exploits.
S Bhatkar, DC DuVarney, R Sekar
USENIX Security Symposium 10, 1, 2005
4412005
Holmes: real-time apt detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019
3292019
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
2812003
Fast and automated generation of attack signatures: A basis for building self-protecting servers
Z Liang, R Sekar
Proceedings of the 12th ACM conference on Computer and communications ¡¦, 2005
2642005
Experiences with specification-based intrusion detection
P Uppuluri, R Sekar
International Workshop on Recent Advances in Intrusion Detection, 172-189, 2001
2402001
Data space randomization
S Bhatkar, R Sekar
International Conference on Detection of Intrusions and Malware, and ¡¦, 2008
2302008
On the limits of information flow techniques for malware analysis and containment
L Cavallaro, P Saxena, R Sekar
International conference on Detection of Intrusions and Malware, and ¡¦, 2008
2212008
An efficient and backwards-compatible transformation to ensure memory safety of C programs
W Xu, DC DuVarney, R Sekar
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on ¡¦, 2004
2032004
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement.
K Jain, R Sekar
NDSS, 2000
1982000
An Efficient Black-box Technique for Defeating Web Application Attacks.
R Sekar
NDSS, 2009
1952009
Model-based analysis of configuration vulnerabilities
CR Ramakrishnan, R Sekar
Journal of Computer Security 10 (1-2), 189-209, 2002
1922002
A high-performance network intrusion detection system
R Sekar, Y Guang, S Verma, T Shanbhag
Proceedings of the 6th ACM Conference on Computer and Communications ¡¦, 1999
1911999
Dataflow anomaly detection
S Bhatkar, A Chaturvedi, R Sekar
Security and Privacy, 2006 IEEE Symposium on, 2006
1862006
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20