Publications in Safe execution/attack recovery
- [1] JaTE: Transparent and Efficient JavaScript Confinement
- Tung Tran, Riccardo Pelizzi and R. Sekar
Annual Computer Security Applications Conference (ACSAC) December, 2015.
- [2] Provenance-based Integrity Protection for Windows
- Wai-Kit Sze and R. Sekar
Annual Computer Security Applications Conference (ACSAC) December, 2015.
- [3] WebSheets: Web Applications for Non-Programmers
- Riccardo Pelizzi and R. Sekar
New Security Paradigms Workshop (NSPW) September, 2015.
- [4] Towards More Usable Information Flow Policies for Contemporary Operating Systems
- Wai-Kit Sze, Bhuvan Mital and R. Sekar
ACM Symposium on Access Control Models and Technologies (SACMAT) June, 2014. Honorable mention for Best paper.
- [5] Comprehensive Integrity Protection for Desktop Linux (Demo)
- Wai-Kit Sze and R. Sekar
ACM Symposium on Access Control Models and Technologies (SACMAT) June, 2014.
- [6] A Portable User-Level Approach for System-wide Integrity Protection
- Wai-Kit Sze and R. Sekar
Annual Computer Security Applications Conference (ACSAC) December, 2013.
- [7] Alcatraz: An Isolated Environment for Experimenting with Untrusted Software
- Zhenkai Liang, Weiqing Sun, V.N. Venkatakrishnan and R. Sekar
ACM Transactions on Information and System Security (TISSEC) January, 2009.
- [8] Expanding Malware Defense by Securing Software Installations
- Weiqing Sun, R. Sekar, Zhenkai Liang and V.N. Venkatakrishnan
Detection of Intrusions, Malware and Vulnerability Analysis (DIMVA) July, 2008.
- [9] V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments
- Weiqing Sun, Varun Katta, Kumar Krishna and R. Sekar
Workshop on Cyber Security Experimentation and Test (in conjunction with USENIX Security) (CSET) July, 2008.
- [10] V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer Security
- Kumar Krishna, Weiqing Sun, Pratik Rana, Tianning Li and R. Sekar
Annual Colloquium for Information Systems Security Education (CISSE) June, 2005.
- [11] One-way Isolation: An Effective Approach for Realizing Safe Execution Environments
- Weiqing Sun, Zhenkai Liang, V.N. Venkatakrishnan and R. Sekar
ISOC Network and Distributed Systems Symposium (NDSS) February, 2005. (Revised version of conference paper).
- [12] Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
- Zhenkai Liang, V.N. Venkatakrishnan and R. Sekar
Annual Computer Security Applications Conference (ACSAC) December, 2003. Best paper award.
- [13] An approach for Secure Software Installation
- V.N. Venkatakrishnan, R. Sekar, Sofia Tsipa, Tapan Kamat and Zhenkai Liang
USENIX Large Installation System Administration Conference (LISA) November, 2002.
- [14] Building Survivable Systems: An Integrated Approach based on Intrusion Detection and Damage Containment
- Thomas Bowen, Dana Chee, Mark Segal, R. Sekar, Tushar Shanbhag and Prem Uppuluri
DISCEX (DISCEX) February, 2000.
|
|