default search action
R. Sekar 0001
Person information
- affiliation (1986-1991, since 1999, PhD 1991): Stony Brook University, Department of Computer Science, NY, USA
- affiliation (1996-1999): Iowa State University, Department of Computer Science, Ames, IA, USA
Other persons with the same name
- R. Sekar 0002 — Koneru Lakshmaiah Education Foundation, Guntur, India
- R. Sekar 0003 — Sri Venkateshwara Institute of Science and Technology, Thiruvallur, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c86]Huan Nguyen, Soumyakant Priyadarshan, R. Sekar:
Scalable, Sound, and Accurate Jump Table Analysis. ISSTA 2024: 541-552 - [c85]R. Sekar, Hanke Kimm, Rohit Aich:
eAudit: A Fast, Scalable and Deployable Audit Data Collection System. SP 2024: 3571-3589 - [i4]Lingzhi Wang, Xiangmin Shen, Weijian Li, Zhenyuan Li, R. Sekar, Han Liu, Yan Chen:
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection. CoRR abs/2404.14720 (2024) - 2023
- [c84]Soumyakant Priyadarshan, Huan Nguyen, R. Sekar:
Accurate Disassembly of Complex Binaries Without Use of Compiler Metadata. ASPLOS (4) 2023: 1-18 - [c83]Soumyakant Priyadarshan, Huan Nguyen, Rohit Chouhan, R. Sekar:
SAFER: Efficient and Error-Tolerant Binary Instrumentation. USENIX Security Symposium 2023: 1451-1468 - 2020
- [c82]Soumyakant Priyadarshan, Huan Nguyen, R. Sekar:
Practical Fine-Grained Binary Code Randomization†. ACSAC 2020: 401-414 - [c81]Md Nahid Hossain, Sanaz Sheikhi, R. Sekar:
Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics. SP 2020: 1139-1155
2010 – 2019
- 2019
- [c80]Sadegh Momeni Milajerdi, Rigel Gjomemo, Birhanu Eshete, R. Sekar, V. N. Venkatakrishnan:
HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows. IEEE Symposium on Security and Privacy 2019: 1137-1152 - 2018
- [c79]Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller:
Dependence-Preserving Data Compaction for Scalable Forensic Analysis. USENIX Security Symposium 2018: 1723-1740 - [p2]Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song:
Code-pointer integrity. The Continuing Arms Race 2018: 81-116 - [i3]Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan:
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. CoRR abs/1801.02062 (2018) - [i2]Sadegh M. Milajerdi, Rigel Gjomemo, Birhanu Eshete, R. Sekar, V. N. Venkatakrishnan:
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows. CoRR abs/1810.01594 (2018) - 2017
- [c78]Mingwei Zhang, Michalis Polychronakis, R. Sekar:
Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks. ACSAC 2017: 128-140 - [c77]Rui Qiao, R. Sekar:
Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries. DSN 2017: 201-212 - [c76]Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan:
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. USENIX Security Symposium 2017: 487-504 - 2016
- [j11]Alok Tongaonkar, R. Sekar:
Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata. IEEE Trans. Inf. Forensics Secur. 11(3): 468-483 (2016) - [c75]Niranjan Hasabnis, R. Sekar:
Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers. ASPLOS 2016: 311-324 - [c74]Wai-Kit Sze, Abhinav Srivastava, R. Sekar:
Hardening OpenStack Cloud Platforms against Compute Node Compromises. AsiaCCS 2016: 341-352 - [c73]Niranjan Hasabnis, R. Sekar:
Extracting instruction semantics via symbolic execution of code generators. SIGSOFT FSE 2016: 301-313 - [i1]Birhanu Eshete, Rigel Gjomemo, Md Nahid Hossain, Sadegh Momeni, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan, Junao Wang:
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program. CoRR abs/1610.06936 (2016) - 2015
- [c72]Mingwei Zhang, R. Sekar:
Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks. ACSAC 2015: 91-100 - [c71]Rui Qiao, Mingwei Zhang, R. Sekar:
A Principled Approach for ROP Defense. ACSAC 2015: 101-110 - [c70]Tung Tran, Riccardo Pelizzi, R. Sekar:
JaTE: Transparent and Efficient JavaScript Confinement. ACSAC 2015: 151-160 - [c69]Wai-Kit Sze, R. Sekar:
Provenance-based Integrity Protection for Windows. ACSAC 2015: 211-220 - [c68]Niranjan Hasabnis, Rui Qiao, R. Sekar:
Checking correctness of code generator architecture specifications. CGO 2015: 167-178 - [c67]Riccardo Pelizzi, R. Sekar:
WebSheets: Web Applications for Non-Programmers. NSPW 2015: 137-147 - 2014
- [j10]Laszlo Szekeres, Mathias Payer, Tao Wei, R. Sekar:
Eternal War in Memory. IEEE Secur. Priv. 12(3): 45-53 (2014) - [c66]Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song:
Code-Pointer Integrity. OSDI 2014: 147-163 - [c65]Wai-Kit Sze, Bhuvan Mital, R. Sekar:
Towards more usable information flow policies for contemporary operating systems. SACMAT 2014: 75-84 - [c64]Wai-Kit Sze, R. Sekar:
Comprehensive integrity protection for desktop linux. SACMAT 2014: 89-92 - [c63]Mingwei Zhang, Rui Qiao, Niranjan Hasabnis, R. Sekar:
A platform for secure static binary instrumentation. VEE 2014: 129-140 - 2013
- [c62]Wai-Kit Sze, R. Sekar:
A portable user-level approach for system-wide integrity protection. ACSAC 2013: 219-228 - [c61]Mingwei Zhang, R. Sekar:
Control Flow Integrity for COTS Binaries. USENIX Security Symposium 2013: 337-352 - 2012
- [c60]Riccardo Pelizzi, R. Sekar:
Protection, usability and improvements in reflected XSS filters. AsiaCCS 2012: 5 - [c59]Niranjan Hasabnis, Ashish Misra, R. Sekar:
Light-weight bounds checking. CGO 2012: 135-144 - 2011
- [c58]Riccardo Pelizzi, R. Sekar:
A server- and browser-transparent CSRF defense for web 2.0 applications. ACSAC 2011: 257-266 - [c57]R. Sekar:
Information Flow Containment: A Practical Basis for Malware Defense. DBSec 2011: 1-3 - [c56]Lorenzo Cavallaro, R. Sekar:
Taint-Enhanced Anomaly Detection. ICISS 2011: 160-174 - 2010
- [c55]Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar, Frank Piessens, Wouter Joosen:
PAriCheck: an efficient pointer arithmetic checker for C programs. AsiaCCS 2010: 145-156 - [c54]R. Sekar:
Runtime Analysis and Instrumentation for Securing Software. RV 2010: 58
2000 – 2009
- 2009
- [j9]Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Trans. Inf. Syst. Secur. 12(3): 14:1-14:37 (2009) - [c53]Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan:
Fast Packet Classification Using Condition Factorization. ACNS 2009: 417-436 - [c52]Lixin Li, James E. Just, R. Sekar:
Online Signature Generation for Windows Systems. ACSAC 2009: 289-298 - [c51]R. Sekar:
An Efficient Black-box Technique for Defeating Web Application Attacks. NDSS 2009 - 2008
- [c50]Chetan Parampalli, R. Sekar, Rob Johnson:
A practical mimicry attack against powerful system-call monitors. AsiaCCS 2008: 156-167 - [c49]Prateek Saxena, R. Sekar, Varun Puranik:
Efficient fine-grained binary instrumentationwith applications to taint-tracking. CGO 2008: 74-83 - [c48]Sandeep Bhatkar, R. Sekar:
Data Space Randomization. DIMVA 2008: 1-22 - [c47]Lorenzo Cavallaro, Prateek Saxena, R. Sekar:
On the Limits of Information Flow Techniques for Malware Analysis and Containment. DIMVA 2008: 143-163 - [c46]Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan:
Expanding Malware Defense by Securing Software Installations. DIMVA 2008: 164-185 - [c45]Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar:
Fast Packet Classification for Snort by Native Compilation of Rules. LISA 2008: 159-165 - [c44]Lorenzo Cavallaro, R. Sekar:
Anomalous Taint Detection. RAID 2008: 417-418 - [c43]Alessio Gaspar, Sarah Langevin, William D. Armitage, R. Sekar, Thomas E. Daniels:
The role of virtualization in computing education. SIGCSE 2008: 131-132 - [c42]Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar:
Practical Proactive Integrity Preservation: A Basis for Malware Defense. SP 2008: 248-262 - [c41]Weiqing Sun, Varun Katta, Kumar Krishna, R. Sekar:
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments. CSET 2008 - [e1]R. Sekar, Arun K. Pujari:
Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings. Lecture Notes in Computer Science 5352, Springer 2008, ISBN 978-3-540-89861-0 [contents] - 2007
- [c40]Alok Tongaonkar, Niranjan Inamdar, R. Sekar:
Inferring Higher Level Policies from Firewall Rules. LISA 2007: 17-26 - 2006
- [c39]Lixin Li, James E. Just, R. Sekar:
Address-Space Randomization for Windows Systems. ACSAC 2006: 329-338 - [c38]V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar:
Provably Correct Runtime Enforcement of Non-interference Properties. ICICS 2006: 332-351 - [c37]Wei Xu, V. N. Venkatakrishnan, R. Sekar, I. V. Ramakrishnan:
A Framework for Building Privacy-Conscious Composite Web Services. ICWS 2006: 655-662 - [c36]Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar:
Dataflow Anomaly Detection. S&P 2006: 48-62 - [c35]Wei Xu, Sandeep Bhatkar, R. Sekar:
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. USENIX Security Symposium 2006 - 2005
- [c34]Zhenkai Liang, R. Sekar:
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. ACSAC 2005: 215-224 - [c33]Zhenkai Liang, R. Sekar:
Fast and automated generation of attack signatures: a basis for building self-protecting servers. CCS 2005: 213-222 - [c32]Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar:
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. NDSS 2005 - [c31]Zhenkai Liang, R. Sekar, Daniel C. DuVarney:
Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems. USENIX ATC, General Track 2005: 375-378 - [c30]Wei Xu, R. Sekar, I. V. Ramakrishnan, V. N. Venkatakrishnan:
An approach for realizing privacy-preserving web-based services. WWW (Special interest tracks and posters) 2005: 1014-1015 - 2004
- [c29]Wei Xu, Daniel C. DuVarney, R. Sekar:
An efficient and backwards-compatible transformation to ensure memory safety of C programs. SIGSOFT FSE 2004: 117-126 - 2003
- [c28]Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar:
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. ACSAC 2003: 182-191 - [c27]Ajay Gupta, R. Sekar:
An Approach for Detecting Self-propagating Email Using Anomaly Detection. RAID 2003: 55-72 - [c26]R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney:
Model-carrying code: a practical approach for safe execution of untrusted applications. SOSP 2003: 15-28 - [c25]Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar:
Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. USENIX Security Symposium 2003 - 2002
- [j8]C. R. Ramakrishnan, R. Sekar:
Model-Based Analysis of Configuration Vulnerabilities. J. Comput. Secur. 10(1/2): 189-209 (2002) - [c24]R. Sekar, Ajay Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou:
Specification-based anomaly detection: a new approach for detecting network intrusions. CCS 2002: 265-274 - [c23]V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang:
An Approach for Secure Software Installation. LISA 2002: 219-226 - [c22]V. N. Venkatakrishnan, Ram Peri, R. Sekar:
Empowering mobile code using expressive security policies. NSPW 2002: 61-68 - 2001
- [j7]R. Ramesh, I. V. Ramakrishnan, R. C. Sekar:
Automata-driven efficient subterm unification. Theor. Comput. Sci. 254(1-2): 187-223 (2001) - [c21]R. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka:
Model-Carrying Code (MCC): a new paradigm for mobile-code security. NSPW 2001: 23-30 - [c20]Prem Uppuluri, R. Sekar:
Experiences with Specification-Based Intrusion Detection. Recent Advances in Intrusion Detection 2001: 172-189 - [c19]R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni:
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. S&P 2001: 144-155 - [p1]I. V. Ramakrishnan, R. Sekar, Andrei Voronkov:
Term Indexing. Handbook of Automated Reasoning 2001: 1853-1964 - 2000
- [c18]K. Jain, R. Sekar:
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. NDSS 2000
1990 – 1999
- 1999
- [c17]R. Sekar, Y. Guang, S. Verma, T. Shanbhag:
A High-Performance Network Intrusion Detection System. CCS 1999: 8-17 - [c16]R. Sekar, Thomas F. Bowen, Mark E. Segal:
On Preventing Intrusions by Process Behavior Monitoring. Workshop on Intrusion Detection and Network Monitoring 1999: 29-40 - [c15]R. Sekar, Prem Uppuluri:
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications. USENIX Security Symposium 1999 - 1998
- [c14]Abhik Roychoudhury, C. R. Ramakrishnan, I. V. Ramakrishnan, R. Sekar:
A Conservative Technique to Improve Deterministic Evaluation of Logic Programs. ICCL 1998: 196-205 - 1997
- [j6]R. Sekar, I. V. Ramakrishnan, Prateek Mishra:
On the power and limitations of strictness analysis. J. ACM 44(3): 505-525 (1997) - [j5]Owen Kaser, C. R. Ramakrishnan, I. V. Ramakrishnan, R. C. Sekar:
EQUALS - A Fast Parallel Implementation of a Lazy Language. J. Funct. Program. 7(2): 183-217 (1997) - 1995
- [j4]R. C. Sekar, R. Ramesh, I. V. Ramakrishnan:
Adaptive Pattern Matching. SIAM J. Comput. 24(6): 1207-1234 (1995) - [j3]R. Sekar, I. V. Ramakrishnan:
Fast Strictness Analysis Based on Demand Propagation. ACM Trans. Program. Lang. Syst. 17(6): 896-937 (1995) - [c13]C. R. Ramakrishnan, I. V. Ramakrishnan, R. C. Sekar:
A Symbolic Constraint Solving Framework for Analysis of Logic Programs. PEPM 1995: 12-23 - 1994
- [c12]R. Sekar, Yow-Jian Lin, C. R. Ramakrishnan:
Modelling techniques for evolving distributed applications. FORTE 1994: 461-476 - [c11]R. Ramesh, I. V. Ramakrishnan, R. C. Sekar:
Automata-Driven Efficient Subterm Unification. FSTTCS 1994: 288-299 - [c10]Owen Kaser, C. R. Ramakrishnan, R. C. Sekar:
A High Performance Runtime System for Parallel Evaluation of Lazy Languages. PASCO 1994: 234-243 - 1993
- [j2]Mauricio Arango, Lisa Bahler, Peter Bates, Munir Cochinwala, David Cohrs, Robert Fish, Gita Gopal, Nancy D. Griffeth, Gary E. Herman, Takako M. Hickey, Kuo Chi Lee, Will E. Leland, Carlyn Lowery, Victor Mak, John F. Patterson, Lillian Ruston, Mark Segal, R. C. Sekar, Mario P. Vecchi, Abel Weinrib, Sze-Ying Wuu:
The Touring Machine System. Commun. ACM 36(1): 68-77 (1993) - [j1]R. C. Sekar, I. V. Ramakrishnan:
Programming in Equational Logic: Beyond Strong Sequentiality. Inf. Comput. 104(1): 78-109 (1993) - [c9]Steven Dawson, C. R. Ramakrishnan, I. V. Ramakrishnan, R. C. Sekar:
Extracting Determinacy in Logic Programs. ICLP 1993: 424-438 - 1992
- [c8]R. C. Sekar, I. V. Ramakrishnan:
Programming with Equations: A Framework for Lazy Parallel Evaluation. CADE 1992: 618-632 - [c7]R. C. Sekar, R. Ramesh, I. V. Ramakrishnan:
Adaptive Pattern Matching. ICALP 1992: 247-260 - [c6]Owen Kaser, Shaunak Pawagi, C. R. Ramakrishnan, I. V. Ramakrishnan, R. C. Sekar:
Fast Parallel Implementation of Lazy Languages - The EQUALS Experience. LISP and Functional Programming 1992: 335-344 - [c5]R. C. Sekar, Yow-Jian Lin, Sanjai Narain:
On Modelling and Reasoning About Hybrid Systems. PSTV 1992: 115-129 - 1991
- [c4]R. C. Sekar, Prateek Mishra, I. V. Ramakrishnan:
On the Power and Limitation of Strictness Analysis Based on Abstract Interpretation. POPL 1991: 37-48 - 1990
- [c3]R. C. Sekar, I. V. Ramakrishnan:
Programming in Equational Logic: Beyond Strong Sequentiality. LICS 1990: 230-241 - [c2]R. C. Sekar, Shaunak Pawagi, I. V. Ramakrishnan:
Small Domains Spell Fast Strictness Analysis. POPL 1990: 169-183
1980 – 1989
- 1989
- [c1]R. C. Sekar, Shaunak Pawagi, I. V. Ramakrishnan:
Transforming Strongly Sequential Rewrite Systems with Constructors for Efficient parallel Execution. RTA 1989: 404-418
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint