Export 13 results:
Filters: Author is R. Sekar  [Clear All Filters]
Hossain MNahid, Wang J, Sekar R., Stoller SD.  2018.  Dependence-Preserving Data Compaction for Scalable Forensic Analysis. 27th USENIX Security Symposium (USENIX Security 18). :1723--1740.
Kuznetsov V, Szekeres L, Payer M, Candea G, Sekar R., Song D.  2014.  Code-Pointer Integrity. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :147--163.
Zhang M, Sekar R..  2013.  Control Flow Integrity for COTS Binaries. 22nd USENIX Security Symposium (USENIX Security 13). :337--352.
Tongaonkar A, Vasudevan S, Sekar R..  2008.  Fast Packet Classification for Snort by Native Compilation of Rules. 22nd Large Installation System Administration Conference (LISA 08).
Sun W, Katta V, Krishna K, Sekar R..  2008.  V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments. Workshop on Cyber Security Experimentation and Test (CSET 08).
Tongaonkar A, Inamdar N, Sekar R..  2007.  Inferring Higher Level Policies from Firewall Rules. 21st Large Installation System Administration Conference (LISA 07).
Venkatakrishnan V.N., Sekar R., Kamat T., Tsipa S., Liang Z..  2002.  An Approach for Secure Software Installation. 16th Systems Administration Conference (LISA 02).
Sekar R., Bowen T.  1999.  On Preventing Intrusions by Process Behavior Monitoring. 1st Workshop on Intrusion Detection and Network Monitoring (ID 99).
Sekar R., Sekar PUppuluriR.  1999.  Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications. 8th USENIX Security Symposium (USENIX Security 99).