Folgen
Sandeep Bhatkar
Sandeep Bhatkar
Researcher
Bestätigte E-Mail-Adresse bei talasecurity.io
Titel
Zitiert von
Zitiert von
Jahr
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
S Bhatkar, DC DuVarney, R Sekar
12th USENIX Security Symposium (USENIX Security 03), 2003
9142003
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks.
W Xu, S Bhatkar, R Sekar
USENIX Security Symposium, 121-136, 2006
5362006
Efficient Techniques for Comprehensive Protection from Memory Error Exploits.
S Bhatkar, DC DuVarney, R Sekar
USENIX Security Symposium 10, 1, 2005
4552005
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
2812003
Data space randomization
S Bhatkar, R Sekar
International Conference on Detection of Intrusions and Malware, and …, 2008
2472008
Dataflow anomaly detection
S Bhatkar, A Chaturvedi, R Sekar
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-62, 2006
1912006
{MutantX-S}: Scalable malware clustering based on static features
X Hu, KG Shin, S Bhatkar, K Griffin
2013 USENIX Annual Technical Conference (USENIX ATC 13), 187-198, 2013
1902013
Techniques for behavior based malware analysis
SB Bhatkar, S Nanda, JS Wilhelm
US Patent 8,555,385, 2013
1552013
Systems and methods for using event-correlation graphs to generate remediation procedures
KA Roundy, S Bhatkar
US Patent 9,256,739, 2016
1032016
Systems and methods for detecting security threats based on user profiles
F Guo, S Bhatkar, K Roundy
US Patent 9,401,925, 2016
992016
Systems and methods for using event-correlation graphs to detect attacks on computing systems
K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ...
US Patent 9,141,790, 2015
972015
Systems and methods for classifying security events as targeted attacks
KA Roundy, S Bhatkar
US Patent 9,754,106, 2017
812017
Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems
F Guo, S Bhatkar, K Roundy
US Patent 9,166,997, 2015
762015
Encoding machine code instructions for static feature based malware clustering
X Hu, KE Griffin, SB Bhatkar
US Patent 8,826,439, 2014
542014
Systems and methods for adjusting suspiciousness scores in event-correlation graphs
A Tamersoy, K Roundy, S Bhatkar, E Khalil
US Patent 9,148,441, 2015
442015
Practical dynamic taint analysis for countering input validation attacks on web applications
W Xu, S Bhatkar, R Sekar
Dept. Comput. Sci., Stony Brook Univ., Stony Brook, NY, USA, Tech. Rep …, 2005
332005
SELF: a transparent security extension for ELF binaries
DC DuVarney, VN Venkatakrishnan, S Bhatkar
Proceedings of the 2003 workshop on New security paradigms, 29-38, 2003
332003
Improving attack detection in host-based IDS by learning properties of system call arguments
A Chaturvedi, E Bhatkar, R Sekar
Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, US, 1-19, 2005
242005
Method to Detect Malicious Behavior by Computing the Likelihood of Data Accesses
M Hart, C Verma, S Bhatkar, A Parker-Wood
US Patent App. 14/690,171, 2016
222016
Improving scalability of personalized recommendation systems for enterprise knowledge workers
C Verma, M Hart, S Bhatkar, A Parker-Wood, S Dey
IEEE Access 4, 204-215, 2015
222015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20