Address obfuscation: An efficient approach to combat a broad range of memory error exploits S Bhatkar, DC DuVarney, R Sekar 12th USENIX Security Symposium (USENIX Security 03), 2003 | 914 | 2003 |
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. W Xu, S Bhatkar, R Sekar USENIX Security Symposium, 121-136, 2006 | 536 | 2006 |
Efficient Techniques for Comprehensive Protection from Memory Error Exploits. S Bhatkar, DC DuVarney, R Sekar USENIX Security Symposium 10, 1, 2005 | 455 | 2005 |
Model-carrying code: a practical approach for safe execution of untrusted applications R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003 | 281 | 2003 |
Data space randomization S Bhatkar, R Sekar International Conference on Detection of Intrusions and Malware, and …, 2008 | 247 | 2008 |
Dataflow anomaly detection S Bhatkar, A Chaturvedi, R Sekar 2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-62, 2006 | 191 | 2006 |
{MutantX-S}: Scalable malware clustering based on static features X Hu, KG Shin, S Bhatkar, K Griffin 2013 USENIX Annual Technical Conference (USENIX ATC 13), 187-198, 2013 | 190 | 2013 |
Techniques for behavior based malware analysis SB Bhatkar, S Nanda, JS Wilhelm US Patent 8,555,385, 2013 | 155 | 2013 |
Systems and methods for using event-correlation graphs to generate remediation procedures KA Roundy, S Bhatkar US Patent 9,256,739, 2016 | 103 | 2016 |
Systems and methods for detecting security threats based on user profiles F Guo, S Bhatkar, K Roundy US Patent 9,401,925, 2016 | 99 | 2016 |
Systems and methods for using event-correlation graphs to detect attacks on computing systems K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ... US Patent 9,141,790, 2015 | 97 | 2015 |
Systems and methods for classifying security events as targeted attacks KA Roundy, S Bhatkar US Patent 9,754,106, 2017 | 81 | 2017 |
Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems F Guo, S Bhatkar, K Roundy US Patent 9,166,997, 2015 | 76 | 2015 |
Encoding machine code instructions for static feature based malware clustering X Hu, KE Griffin, SB Bhatkar US Patent 8,826,439, 2014 | 54 | 2014 |
Systems and methods for adjusting suspiciousness scores in event-correlation graphs A Tamersoy, K Roundy, S Bhatkar, E Khalil US Patent 9,148,441, 2015 | 44 | 2015 |
Practical dynamic taint analysis for countering input validation attacks on web applications W Xu, S Bhatkar, R Sekar Dept. Comput. Sci., Stony Brook Univ., Stony Brook, NY, USA, Tech. Rep …, 2005 | 33 | 2005 |
SELF: a transparent security extension for ELF binaries DC DuVarney, VN Venkatakrishnan, S Bhatkar Proceedings of the 2003 workshop on New security paradigms, 29-38, 2003 | 33 | 2003 |
Improving attack detection in host-based IDS by learning properties of system call arguments A Chaturvedi, E Bhatkar, R Sekar Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, US, 1-19, 2005 | 24 | 2005 |
Method to Detect Malicious Behavior by Computing the Likelihood of Data Accesses M Hart, C Verma, S Bhatkar, A Parker-Wood US Patent App. 14/690,171, 2016 | 22 | 2016 |
Improving scalability of personalized recommendation systems for enterprise knowledge workers C Verma, M Hart, S Bhatkar, A Parker-Wood, S Dey IEEE Access 4, 204-215, 2015 | 22 | 2015 |