Stony Brook University Logo Department of Computer Science Stony Brook Search Button
Secure Systems Lab

Publications By Year

    2024

  1. eAudit: A Fast, Scalable and Deployable Audit Data Collection System
    R. Sekar, Hanke Kimm and Rohit Aich
    IEEE Symposium on Security and Privacy (IEEE S&P) May, 2024.
    (Software release).
  2. Accurate Disassembly of Complex Binaries Without Use of Compiler Metadata
    Soumyakant Priyadarshan, Huan Nguyen and R. Sekar
    ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS) February, 2024.

    2023

  3. SAFER: Efficient and Error-Tolerant Binary Instrumentation
    Soumyakant Priyadarshan, Huan Nguyen, Rohit Chouhan and R. Sekar
    USENIX Security Symposium (USENIX Security) August, 2023.

    2022

  4. A New Tag-Based Approach for Real-Time Detection of Advanced Cyber Attacks
    Md Nahid Hossain
    PhD Dissertation (Stony Brook University) January, 2022.

    2021

  5. Efficient Audit Data Collection for Linux
    Rohit Aich
    Master's Thesis (Stony Brook University) August, 2021.
  6. On the Effectiveness of Cyber-Attack Campaign Investigation with Reduced Audit Logs
    Maggie Zhou
    Undergraduate (Honors) Thesis (Stony Brook University) January, 2021.

    2020

  7. Practical Fine-Grained Binary Code Randomization
    Soumyakant Priyadarshan, Huan Nguyen and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2020.
    (Talk on YouTube).
  8. On the Impact of Exception Handling Compatibility on Binary Instrumentation
    Soumyakant Priyadarshan, Huan Nguyen and R. Sekar
    Workshop on Forming an Ecosystem Around Software Transformation (FEAST) November, 2020.
  9. Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics
    Md Nahid Hossain, Sanaz Sheikhi and R. Sekar
    IEEE Symposium on Security and Privacy (IEEE S&P) May, 2020.

    (A 2-minute demo and the conference presentation are also available.).

    2019

  10. A Study of Binary Instrumentation Techniques
    Soumyakant Priyadarshan
    Research Proficiency Report (Stony Brook University) August, 2019.
  11. HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
    Sadegh Milajerdi, Rigel Gjomemo, Birhanu Eshete, R. Sekar and V.N. Venkatakrishnan
    IEEE Symposium on Security and Privacy (IEEE S&P) May, 2019.

    2018

  12. Dependence-Preserving Data Compaction for Scalable Forensic Analysis
    Md Nahid Hossain, Junao Wang, R. Sekar and Scott D. Stoller
    USENIX Security Symposium (USENIX Security) August, 2018.
    (Talk).
  13. Code-Pointer Integrity
    Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar and Dawn Song
    The Continuing Arms Race: Code-Reuse Attacks and Defenses (Morgan-Claypool and ACM Press) January, 2018.

    2017

  14. Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks
    Mingwei Zhang, Michalis Polychronakis and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2017.
  15. SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
    Md Nahid Hossain, Sadegh Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller and V.N. Venkatakrishnan
    USENIX Security Symposium (USENIX Security) August, 2017.
    (Talk).
  16. Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries
    Rui Qiao and R. Sekar
    Dependable Systems and Networks (DSN) June, 2017.
    (Supercedes SECLAB16-05, May 2016).
  17. NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64
    Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed Azab, Long Lu, Hayawardh Vijayakumar and Wenbo Shen
    IEEE Symposium on Security and Privacy (IEEE S&P) May, 2017.
  18. Function Recovery for COTS Binaries
    Rui Qiao
    PhD Dissertation (Stony Brook University) May, 2017.
  19. Memory corruption mitigation via hardening and testing
    Laszlo Szekeres
    PhD Dissertation (Stony Brook University) May, 2017.

    2016

  20. Extracting Instruction Semantics Via Symbolic Execution of Code Generators
    Niranjan Hasabnis and R. Sekar
    ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE) November, 2016.
  21. Hardening OpenStack Cloud Platforms against Compute Node Compromises
    Wai-Kit Sze, Abhinav Srivastava and R. Sekar
    ACM Symposium on Information, Computer and Communications Security (ASIACCS) May, 2016.
  22. A New Approach for Rowhammer Attacks
    Rui Qiao and Mark Seaborn
    IEEE International Symposium on Hardware Oriented Security and Trust (HOST) May, 2016.
  23. Enhancing Multi-user OS with Network Provenance for Systematic Malware Defense
    Wai-Kit Sze
    PhD Dissertation (Stony Brook University) May, 2016.
  24. Securing Web Applications
    Riccardo Pelizzi
    PhD Dissertation (Stony Brook University) May, 2016.
  25. Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers
    Niranjan Hasabnis and R. Sekar
    ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS) April, 2016.
  26. ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks
    Zelalem Aweke, Salessawi Yitbarek, Rui Qiao, Reetuparna Das, Matthew Hicks, Yossi Oren and Todd Austin
    ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS) April, 2016.
  27. Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata
    Alok Tongaonkar and R. Sekar
    IEEE Transactions on Information Forensics and Security (IEEE TIFS) March, 2016.

    2015

  28. A Principled Approach for ROP Defense
    Rui Qiao, Mingwei Zhang and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2015.
  29. Provenance-based Integrity Protection for Windows
    Wai-Kit Sze and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2015.
  30. JaTE: Transparent and Efficient JavaScript Confinement
    Tung Tran, Riccardo Pelizzi and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2015.
  31. Code and Control Flow Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks
    Mingwei Zhang and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2015.
  32. Squeezing the Dynamic Loader For Fun And Profit
    Mingwei Zhang and R. Sekar
    Technical Report (TR) December, 2015.
  33. Harbormaster: Policy Enforcement for Containers
    Mingwei Zhang, Daniel Marino and Petros Efstathopoulos
    IEEE CloudCom (CloudCom) November, 2015.
  34. WebSheets: Web Applications for Non-Programmers
    Riccardo Pelizzi and R. Sekar
    New Security Paradigms Workshop (NSPW) September, 2015.
  35. Static Binary Instrumentation with Applications to COTS Software Security
    Mingwei Zhang
    PhD Dissertation (Stony Brook University) August, 2015.
  36. Automatic Synthesis of Instruction Set Semantics
    Niranjan Hasabnis
    PhD Dissertation (Stony Brook University) July, 2015.
  37. Automatic Generation of Assembly to IR Translators Using Compilers
    Niranjan Hasabnis and R. Sekar
    Workshop on Architectural and Microarchitectural Support for Binary Translation (AMAS-BT) February, 2015.
  38. Checking Correctness of Code Generator Architecture Specifications
    Niranjan Hasabnis, Rui Qiao and R. Sekar
    ACM/IEEE International Symposium on Code Generation and Optimization (CGO) February, 2015.

    2014

  39. Code-Pointer Integrity
    Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar and Dawn Song
    USENIX Operating System Design and Implementation (OSDI) October, 2014.
  40. Comprehensive Integrity Protection for Desktop Linux (Demo)
    Wai-Kit Sze and R. Sekar
    ACM Symposium on Access Control Models and Technologies (SACMAT) June, 2014.
  41. Towards More Usable Information Flow Policies for Contemporary Operating Systems
    Wai-Kit Sze, Bhuvan Mital and R. Sekar
    ACM Symposium on Access Control Models and Technologies (SACMAT) June, 2014.

    Honorable mention for Best paper.
  42. Eternal War in Memory
    Laszlo Szekeres, Mathias Payer, Tao Wei and R. Sekar
    IEEE Security and Privacy Magazine (S&P Magazine) May, 2014.
  43. A Platform for Secure Static Binary Instrumentation
    Mingwei Zhang, Rui Qiao, Niranjan Hasabnis and R. Sekar
    Virtual Execution Environments (VEE) March, 2014.

    2013

  44. A Portable User-Level Approach for System-wide Integrity Protection
    Wai-Kit Sze and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2013.
  45. Control Flow Integrity for COTS Binaries
    Mingwei Zhang and R. Sekar
    USENIX Security Symposium (USENIX Security) August, 2013.

    Best paper award!.
  46. SoK: Eternal War in Memory
    Laszlo Szekeres, Mathias Payer, Tao Wei and Dawn Song
    IEEE Symposium on Security and Privacy (IEEE S&P) May, 2013.
  47. Practical Control Flow Integrity and Randomization for Binary Executables
    Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song and Wei Zou
    IEEE Symposium on Security and Privacy (IEEE S&P) May, 2013.
  48. Protecting Function Pointers in Binary
    Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant and Laszlo Szekeres
    ACM Symposium on Information, Computer and Communications Security (ASIACCS) May, 2013.

    2012

  49. Protection, Usability and Improvements in Reflected XSS Filters
    Riccardo Pelizzi and R. Sekar
    ACM Symposium on Information, Computer and Communications Security (ASIACCS) May, 2012.
  50. Light-weight Bounds Checking
    Niranjan Hasabnis, Ashish Misra and R. Sekar
    ACM/IEEE International Symposium on Code Generation and Optimization (CGO) April, 2012.

    2011

  51. A Server- and Browser-Transparent CSRF Defense for Web 2.0 Applications
    Riccardo Pelizzi and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2011.
  52. Taint-Enhanced Anomaly Detection
    Lorenzo Cavallaro and R. Sekar
    International Conference on Information Systems Security (ICISS) December, 2011.

    2010

  53. PAriCheck: An Efficient Pointer Arithmetic Checker for C Programs
    Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar, Frank Piessens and Wouter Joosen
    ACM Symposium on Information, Computer and Communications Security (ASIACCS) March, 2010.

    2009

  54. Online Signature Generation for Windows Systems
    Lixin Li, Jim Just and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2009.
  55. Efficient Techniques for Fast Packet Classification
    Alok Tongaonkar
    PhD Dissertation (Stony Brook University) August, 2009.
  56. Practical Techniques for Regeneration and Immunization of COTS Applications
    Lixin Li, Mark R. Cornwell, E. Hultman, Jim Just and R. Sekar
    Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS) June, 2009.
  57. Fast Packet Classification using Condition Factorization
    Alok Tongaonkar, R. Sekar and Sreenaath Vasudevan
    Applied Cryptography and Network Security (ACNS) June, 2009.
  58. An Efficient Black-box Technique for Defeating Web Application Attacks
    R. Sekar
    ISOC Network and Distributed Systems Symposium (NDSS) February, 2009.
  59. Alcatraz: An Isolated Environment for Experimenting with Untrusted Software
    Zhenkai Liang, Weiqing Sun, V.N. Venkatakrishnan and R. Sekar
    ACM Transactions on Information and System Security (TISSEC) January, 2009.

    2008

  60. Fast Packet Classification for Snort
    Alok Tongaonkar, Sreenaath Vasudevan and R. Sekar
    USENIX Large Installation System Administration Conference (LISA) November, 2008.
  61. Anomalous Taint Detection (Extended Abstract)
    Lorenzo Cavallaro and R. Sekar
    Recent Advances in Intrusion Detection (RAID) September, 2008.
    (Full version available as Technical Report SECLAB08-06).
  62. A Practical Technique for Containment of Untrusted Plug-ins
    Prateek Saxena, R. Sekar, Mithun Iyer and Varun Puranik
    Technical Report (TR) August, 2008.
  63. V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments
    Weiqing Sun, Varun Katta, Kumar Krishna and R. Sekar
    Workshop on Cyber Security Experimentation and Test (in conjunction with USENIX Security) (CSET) July, 2008.
  64. Expanding Malware Defense by Securing Software Installations
    Weiqing Sun, R. Sekar, Zhenkai Liang and V.N. Venkatakrishnan
    Detection of Intrusions, Malware and Vulnerability Analysis (DIMVA) July, 2008.
  65. Data Space Randomization
    Sandeep Bhatkar and R. Sekar
    Detection of Intrusions, Malware and Vulnerability Analysis (DIMVA) July, 2008.
  66. On the Limits of Information Flow Techniques for Malware Analysis and Containment
    Lorenzo Cavallaro, Prateek Saxena and R. Sekar
    Detection of Intrusions, Malware and Vulnerability Analysis (DIMVA) July, 2008.
    (Supercedes SECLAB07-03, November 2007).
  67. Practical Proactive Integrity Preservation: A Basis for Malware Defense
    Weiqing Sun, R. Sekar, Gaurav Poothia and Tejas Karandikar
    IEEE Symposium on Security and Privacy (IEEE S&P) May, 2008.
  68. Efficient Fine-Grained Binary Instrumentation with Applications to Taint-Tracking
    Prateek Saxena, R. Sekar and Varun Puranik
    ACM/IEEE International Symposium on Code Generation and Optimization (CGO) April, 2008.
  69. A Practical Mimicry Attack Against Powerful System-Call Monitors
    Chetan Parampalli, R. Sekar and Rob Johnson
    ACM Symposium on Information, Computer and Communications Security (ASIACCS) March, 2008.
    (Supercedes Technical Report SECLAB07-01).
  70. Comprehensive Memory Error Protection via Diversity and Taint-Tracking
    Lorenzo Cavallaro
    PhD Dissertation (Stony Brook University) February, 2008.

    2007

  71. Inferring Higher Level Policies from Firewall Rules
    Alok Tongaonkar, Niranjan Inamdar and R. Sekar
    USENIX Large Installation System Administration Conference (LISA) November, 2007.
  72. Static Binary Analysis And Transformation For Sandboxing Untrusted Plugins
    Prateek Saxena
    Master's Thesis (Stony Brook University) August, 2007.
  73. Safe Execution of Mobile and Untrusted Code: The Model-Carrying Code Project
    R. Sekar, C.R. Ramakrishnan, I.V. Ramakrishnan, Scott Smolka, Samik Basu, Sandeep Bhatkar, Abhishek Chaturvedi, Daniel DuVarney, Zhenkai Liang, Yow-Jian Lin, Diptikalyan Saha, Karthik Sreenivasa Murthy, Weiqing Sun, Alok Tongaonkar, Prem Uppuluri, V.N. Venkatakrishnan, Wei Xu, Mohan Channa, Yogesh Chauhan, Kumar Krishna, Shruthi Murthy, Vishwas Nagaraja and Divya Padmanabhan
    Information Security Research: New Methods for Protecting Against Cyber Threats (Wiley Publishing) January, 2007.

    2006

  74. Address-Space Randomization for Windows Systems
    Lixin Li, Jim Just and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2006.
  75. Provably Correct Runtime Enforcement of Non-Interference Properties
    V.N. Venkatakrishnan, Wei Xu, Daniel DuVarney and R. Sekar
    International Conference on Information and Communications Security (ICICS) December, 2006.
    (Supercedes Technical Report SECLAB-04-01, Stony Brook University, March, 2004.).
  76. On Supporting Active User Feedback in P3P
    V.N. Venkatakrishnan, Wei Xu and Rishi Kant Sharda
    Secure Knowledge Management Workshop (SKM) September, 2006.
  77. A Framework for Building Privacy-Conscious Composite Web Services
    Wei Xu, V.N. Venkatakrishnan, R. Sekar and I.V. Ramakrishnan
    IEEE International Conference on Web Services (ICWS) September, 2006.
    (Application Services and Industry Track).
  78. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
    Wei Xu, Sandeep Bhatkar and R. Sekar
    USENIX Security Symposium (USENIX Security) August, 2006.
    (An earlier version appeared as Technical Report SECLAB-05-06, November 2005. Also supercedes Technical Report SECLAB-05-05 A Unified Approach for Preventing Attacks Exploiting a Range of Software Vulnerabilities, August 2005, and Technical Report SECLAB-05-04 Practical dynamic taint analysis for countering input validation attacks on web applications, May 2005, [PDF]).
  79. MCC End-User Management Framework
    Secure Systems Lab
    Technical Report (TR) August, 2006.
    Technical Report SECLAB06-01, Secure Systems Laboratory, Stony Brook University.
  80. Dataflow Anomaly Detection
    Sandeep Bhatkar, Abhishek Chaturvedi and R. Sekar
    IEEE Symposium on Security and Privacy (IEEE S&P) May, 2006.
    (Supercedes Technical Report SECLAB-05-03 Improving Attack Detection in Host-Based IDS by Learning Properties of System Call Arguments, July 2005.).

    2005

  81. Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models
    Zhenkai Liang and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2005.
    (Supercedes Technical Report SECLAB-05-01 An Immune System Inspired Approach for Protection from Repetitive Attacks, March 2005.).
  82. Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers
    Zhenkai Liang and R. Sekar
    ACM Conference on Computer and Communications Security (CCS) November, 2005.
    (Supercedes Technical Report SECLAB-05-02 Automated, Sub-second Attack Signature Generation: A Basis for Building Self-Protecting Servers, May 2005.).
  83. Efficient Techniques for Comprehensive Protection from Memory Error Exploits
    Sandeep Bhatkar, R. Sekar and Daniel DuVarney
    USENIX Security Symposium (USENIX Security) August, 2005.
  84. V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer Security
    Kumar Krishna, Weiqing Sun, Pratik Rana, Tianning Li and R. Sekar
    Annual Colloquium for Information Systems Security Education (CISSE) June, 2005.
  85. An Approach for Realizing Privacy-Preserving Web-Based Services (Poster)
    Wei Xu, R. Sekar, I.V. Ramakrishnan and V.N. Venkatakrishnan
    14th International World Wide Web Conference (WWW) May, 2005.
  86. A Secure Composition Framework for Trustworthy Personal Information Assistants
    V.N. Venkatakrishnan, Wei Xu, I.V. Ramakrishnan and R. Sekar
    IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS) April, 2005.
  87. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems (Short Paper)
    Zhenkai Liang, R. Sekar and Daniel DuVarney
    USENIX Annual Technical Conference (USENIX) April, 2005.
  88. One-way Isolation: An Effective Approach for Realizing Safe Execution Environments
    Weiqing Sun, Zhenkai Liang, V.N. Venkatakrishnan and R. Sekar
    ISOC Network and Distributed Systems Symposium (NDSS) February, 2005.
    (Revised version of conference paper).

    2004

  89. Using Predators to Combat Worms and Viruses: A Simulation-Based Study
    Ajay Gupta and Daniel DuVarney
    Annual Computer Security Applications Conference (ACSAC) December, 2004.
  90. An Efficient and Backwards-Compatible Transformation to Ensure Memory Safety of C Programs
    Wei Xu, Daniel DuVarney and R. Sekar
    ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE) November, 2004.

    2003

  91. Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
    Zhenkai Liang, V.N. Venkatakrishnan and R. Sekar
    Annual Computer Security Applications Conference (ACSAC) December, 2003.
    Best paper award.
  92. Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications
    R. Sekar, V.N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar and Daniel DuVarney
    ACM Symposium on Operating Systems Principles (SOSP) October, 2003.
  93. An Approach for Detecting Self-Propagating Email Using Anomaly Detection
    Ajay Gupta and R. Sekar
    Recent Advances in Intrusion Detection (RAID) September, 2003.
  94. SELF: a Transparent Security Extension for ELF Binaries
    Daniel DuVarney, V.N. Venkatakrishnan and Sandeep Bhatkar
    New Security Paradigms Workshop (NSPW) August, 2003.
  95. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits
    Sandeep Bhatkar, Daniel DuVarney and R. Sekar
    USENIX Security Symposium (USENIX Security) August, 2003.
  96. Generation of All Counter-Examples for Push-Down Systems
    Samik Basu, Diptikalyan Saha, Yow-Jian Lin and Scott Smolka
    Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE) June, 2003.

    2002

  97. An approach for Secure Software Installation
    V.N. Venkatakrishnan, R. Sekar, Sofia Tsipa, Tapan Kamat and Zhenkai Liang
    USENIX Large Installation System Administration Conference (LISA) November, 2002.
  98. Specification-based anomaly detection: a new approach for detecting network intrusions
    R. Sekar, Ajay Gupta, James Frullo, Tushar Shanbhag, Abhishek Tiwari, Henglin Yang and Sheng Zhou
    ACM Conference on Computer and Communications Security (CCS) October, 2002.
  99. Empowering mobile code using expressive security policies
    V.N. Venkatakrishnan, Ram Peri and R. Sekar
    New Security Paradigms Workshop (NSPW) September, 2002.
  100. Model-Based Analysis of Configuration Vulnerabilities
    C.R. Ramakrishnan and R. Sekar
    Journal of Computer Security (JCS) January, 2002.

    2001

  101. Experiences with Specification Based Intrusion Detection System
    Prem Uppuluri and R. Sekar
    Recent Advances in Intrusion Detection (RAID) October, 2001.
  102. Model-Carrying Code (MCC): A New Paradigm for Mobile-Code Security
    R. Sekar, C.R. Ramakrishnan, I.V. Ramakrishnan and Scott Smolka
    New Security Paradigms Workshop (NSPW) September, 2001.
  103. A Fast Automaton-Based~Method for Detecting Anomalous Program Behaviors
    R. Sekar, Mugdha Bendre, Pradeep Bollineni and Dinakar Dhurjati
    IEEE Symposium on Security and Privacy (IEEE S&P) May, 2001.

    2000

  104. Model-Based Analysis of Configuration Vulnerabilities
    C.R. Ramakrishnan and R. Sekar
    ACM CCS Workshop on Intrusion Detection Systems (WIDS) October, 2000.
  105. User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
    Kapil Jain and R. Sekar
    ISOC Network and Distributed Systems Symposium (NDSS) February, 2000.
  106. Building Survivable Systems: An Integrated Approach based on Intrusion Detection and Damage Containment
    Thomas Bowen, Dana Chee, Mark Segal, R. Sekar, Tushar Shanbhag and Prem Uppuluri
    DISCEX (DISCEX) February, 2000.

    1999

  107. A High-Performance Network Intrusion Detection System
    R. Sekar, Guang Yang, Shobhit Verma and Tushar Shanbhag
    ACM Conference on Computer and Communications Security (CCS) November, 1999.
  108. Synthesizing Fast Intrusion Detection/Prevention Systems from High-Level Specifications
    R. Sekar and Prem Uppuluri
    USENIX Security Symposium (USENIX Security) August, 1999.
  109. On Preventing Intrusions by Process Behavior Monitoring
    R. Sekar, Thomas Bowen and Mark Segal
    USENIX Intrusion Detection Workshop () April, 1999.

    1998

  110. A Specification-Based Approach for Building Survivable Systems
    R. Sekar, Yong Cai and Mark Segal
    National Information Systems Security Conference (NISSC) October, 1998.
  111. Model-Based Vulnerability Analysis of Computer Systems
    C.R. Ramakrishnan and R. Sekar
    Verification, Model Checking, and Abstract Interpretation (VMCAI) September, 1998.
All Publications
By Year

By Area

Source-code analysis/transformation
Binary analysis/rewriting
Policy/Specification Languages
OS and Virtualization Techniques
Algorithms
Learning/anomaly detection
Formal methods/Foundations


By Problem

Randomization/Memory Errors
Information flow analysis
Automated Exploit Defenses
Virtual Network Lab
Safe execution/attack recovery
Automated signature generation
Malware/Untrusted code defense
Intrusion/Anomaly detection
Fast packet matching
Policy generation tools


Local Search



Home Contact NSI Computer Science Stony Brook University

Copyright © 1999-2013 Secure Systems Laboratory, Stony Brook University. All rights reserved.