Biblio

Export 13 results:
Filters: Author is R. Sekar  [Clear All Filters]
2018
Hossain MNahid, Wang J, Sekar R., Stoller SD.  2018.  Dependence-Preserving Data Compaction for Scalable Forensic Analysis. 27th USENIX Security Symposium (USENIX Security 18). :1723--1740.
2014
Kuznetsov V, Szekeres L, Payer M, Candea G, Sekar R., Song D.  2014.  Code-Pointer Integrity. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :147--163.
2013
Zhang M, Sekar R..  2013.  Control Flow Integrity for COTS Binaries. 22nd USENIX Security Symposium (USENIX Security 13). :337--352.
2008
Tongaonkar A, Vasudevan S, Sekar R..  2008.  Fast Packet Classification for Snort by Native Compilation of Rules. 22nd Large Installation System Administration Conference (LISA 08).
Sun W, Katta V, Krishna K, Sekar R..  2008.  V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments. Workshop on Cyber Security Experimentation and Test (CSET 08).
2007
Tongaonkar A, Inamdar N, Sekar R..  2007.  Inferring Higher Level Policies from Firewall Rules. 21st Large Installation System Administration Conference (LISA 07).
2002
Venkatakrishnan V.N., Sekar R., Kamat T., Tsipa S., Liang Z..  2002.  An Approach for Secure Software Installation. 16th Systems Administration Conference (LISA 02).
1999
Sekar R., Bowen T.  1999.  On Preventing Intrusions by Process Behavior Monitoring. 1st Workshop on Intrusion Detection and Network Monitoring (ID 99).
Sekar R., Sekar PUppuluriR.  1999.  Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications. 8th USENIX Security Symposium (USENIX Security 99).