R. Sekar

Google Scholar
45 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection.
2023
conf/uss
SAFER: Efficient and Error-Tolerant Binary Instrumentation.
2018
conf/uss
Dependence-Preserving Data Compaction for Scalable Forensic Analysis.
2017
conf/uss
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
2013
conf/uss
Control Flow Integrity for COTS Binaries.
Mingwei Zhang R. Sekar
2009
conf/ndss
An Efficient Black-box Technique for Defeating Web Application Attacks.
R. Sekar
2008
conf/uss
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments.
2006
conf/uss
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks.
2005
conf/ndss
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
2003
conf/uss
Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits.
2000
conf/ndss
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement.
K. Jain R. Sekar
1999
conf/uss
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications.
R. Sekar Prem Uppuluri
Filters
Years:  to