Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Richard A. Kemmerer
2010 – today
- 2013
[c67]Richard A. Kemmerer: 20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly. NDSS 2013- 2011
[j32]Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Analysis of a Botnet Takeover. IEEE Security & Privacy 9(1): 64-72 (2011)
[j31]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita: Formal analysis of an electronic voting system: An experience report. Journal of Systems and Software 84(10): 1618-1637 (2011)
[c66]Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). DIMVA 2011: 184-193
[c65]
[c64]Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Understanding fraudulent activities in online ad exchanges. Internet Measurement Conference 2011: 279-294
[c63]Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Dymo: Tracking Dynamic Code Identity. RAID 2011: 21-40
[c62]Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald: The Underground Economy of Fake Antivirus Software. WEIS 2011- 2010
[j30]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE Trans. Software Eng. 36(4): 453-473 (2010)
[c61]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita: Formal Specification and Analysis of an E-voting System. ARES 2010: 164-171
[i1]Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmerer, Dino Mandrioli: Refinement and Verification of Real-Time Systems. CoRR abs/1002.1796 (2010)
2000 – 2009
- 2009
[j29]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Computer Science - R&D 23(1): 15-25 (2009)
[c60]Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Your botnet is my botnet: analysis of a botnet takeover. ACM Conference on Computer and Communications Security 2009: 635-647
[c59]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita: Formal analysis of attacks for e-voting system. CRiSIS 2009: 26-34
[c58]- 2008
[c57]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
[c56]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008
[c55]Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage: 08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008
[c54]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248
[e2]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel (Eds.): Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008. Dagstuhl Seminar Proceedings 08102, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008- 2007
[j28]André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Using a virtual security testbed for digital forensic reconstruction. Journal in Computer Virology 2(4): 275-289 (2007)
[c53]
[c52]Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer: Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20- 2006
[c51]André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. DIMVA 2006: 144-163
[c50]Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna: SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358
[c49]William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006
[c48]André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164- 2005
[c47]Richard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ASE 2005: 3- 2004
[j27]Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer: Past pushdown timed automata and safety verification. Theor. Comput. Sci. 313(1): 57-71 (2004)
[j26]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004)
[c46]Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer: An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. ACSAC 2004: 16-27- 2003
[j25]Zhe Dang, Pierluigi San Pietro, Richard A. Kemmerer: Presburger liveness verification of discrete timed automata. Theor. Comput. Sci. 1-3(299): 413-438 (2003)
[j24]Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer: Generalized discrete timed automata: decidable approximations for safety verificatio. Theor. Comput. Sci. 296(1): 59-74 (2003)
[c45]Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer: A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-43
[c44]Darren Mutz, Giovanni Vigna, Richard A. Kemmerer: An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ACSAC 2003: 374-383
[c43]
[c42]
[c41]Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97- 2002
[j23]Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer: STATL: An Attack Language for State-Based Intrusion Detection. Journal of Computer Security 10(1/2): 71-104 (2002)
[j22]Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer: Counter Machines and Verification Problems. Theor. Comput. Sci. 289(1): 165-189 (2002)
[c40]Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer: Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24
[c39]Richard A. Kemmerer: A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. ACSAC 2002: 109-118
[c38]Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285-293- 2001
[c37]Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer: Decidable Approximations on Generalized and Parameterized Discrete Timed Automata. COCOON 2001: 529-539
[c36]Sebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer: Evaluating the Security of Three Java-Based Mobile Agent Systems. Mobile Agents 2001: 31-41
[c35]Giovanni Vigna, Richard A. Kemmerer, Per Blix: Designing a Web of Highly-Configurable Intrusion Detection Sensors. Recent Advances in Intrusion Detection 2001: 69-84
[c34]Zhe Dang, Pierluigi San Pietro, Richard A. Kemmerer: On Presburger Liveness of Discrete Timed Automata. STACS 2001: 132-143
[c33]Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer: Past Pushdown Timed Automata. CIAA 2001: 74-86
[p1]André L. M. dos Santos, Giovanni Vigna, Richard A. Kemmerer: Security Testing of an Online Banking Service. E-Commerce Security and Privacy 2001: 3-15- 2000
[j21]
[c32]André L. M. dos Santos, Richard A. Kemmerer: Implementing Security Policies using the Safe Areas of Computation Approach. ACSAC 2000: 90-99
[c31]Zhe Dang, Oscar H. Ibarra, Tevfik Bultan, Richard A. Kemmerer, Jianwen Su: Binary Reachability Analysis of Discrete Pushdown Timed Automata. CAV 2000: 69-84
[c30]Paul Z. Kolano, Richard A. Kemmerer, Dino Mandrioli: Parallel Refinement Mechanisms for Real-Time Systems. FASE 2000: 35-50
[c29]
[c28]Paul Z. Kolano, Richard A. Kemmerer: Classification schemes to aid in the analysis of real-time systems. ISSTA 2000: 86-95
[c27]Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer: Conter Machines: Decidable Properties and Applications to Verification Problems. MFCS 2000: 426-435
1990 – 1999
- 1999
[j20]Paul Z. Kolano, Zhe Dang, Richard A. Kemmerer: The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment. Ann. Software Eng. 7: 177-210 (1999)
[j19]Giovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security 7(1): 37-71 (1999)
[j18]
[j17]
[c26]André L. M. dos Santos, Richard A. Kemmerer: Safe Areas of Computation for Secure Computing with Insecure Applications. ACSAC 1999: 35-44
[c25]
[c24]Zhe Dang, Richard A. Kemmerer: A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications. RTCSA 1999: 174-181- 1998
[c23]Giovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-Based Intrusion Detection Approach. ACSAC 1998: 25-34
[c22]Richard G. Hamlet, Richard A. Kemmerer, Edward F. Miller, Debra J. Richardson: The Most Influential Papers from the ISSTA Research Community (Panel). ISSTA 1998: 49
[c21]Flavio De Paoli, André L. M. dos Santos, Richard A. Kemmerer: Web Browsers and Security. Mobile Agents and Security 1998: 235-256
[e1]Koji Torii, Kokichi Futatsugi, Richard A. Kemmerer (Eds.): Forging New Links, Proceedings of the 1998 International Conference on Software Engineering, ICSE 98, Kyoto, Japan, April 19-25, 1998. IEEE Computer Society 1998, ISBN 0-8186-8368-6- 1997
[j16]Alberto Coen-Porisini, Carlo Ghezzi, Richard A. Kemmerer: Specification of Realtime Systems Using ASTRAL. IEEE Trans. Software Eng. 23(9): 572-598 (1997)
[c20]
[c19]- 1996
[c18]Richard A. Kemmerer, Tad Taylor: A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/. ACSAC 1996: 224-235
[c17]Richard Denney, Richard A. Kemmerer, Nancy G. Leveson, Alberto Savoia: Why State-of-the-Art is not State-of-the-Practice (Panel Abstract). ISSTA 1996: 293- 1995
[j15]Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras: State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Trans. Software Eng. 21(3): 181-199 (1995)
[c16]Alberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli: A Formal Framework for ASTRAL Inter-level Proof Obligations. ESEC 1995: 90-108- 1994
[j14]Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen: Three System for Cryptographic Protocol Analysis. J. Cryptology 7(2): 79-130 (1994)
[j13]Alberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli: A Formal Framework for ASTRAL Intralevel Proof Obligations. IEEE Trans. Software Eng. 20(8): 548-561 (1994)
[c15]Jeffrey Douglas, Richard A. Kemmerer: Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications. ISSTA 1994: 15-27- 1993
[c14]Alberto Coen-Porisini, Richard A. Kemmerer: The Composability of ASTRAL Realtime Specifications. ISSTA 1993: 128-138- 1992
[j12]Jonathan D. Reichbach, Richard A. Kemmerer: SoundWorks: An Object-Oriented Distributed System for Digital Sound. IEEE Computer 25(3): 25-37 (1992)
[j11]Richard A. Kemmerer, Carlo Ghezzi: Guest Editors' Introduction: Specification and Analysis of Real-Time Systems. IEEE Trans. Software Eng. 18(9): 766-767 (1992)- 1991
[j10]Richard A. Kemmerer, Phillip A. Porras: Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. IEEE Trans. Software Eng. 17(11): 1166-1185 (1991)
[c13]Carlo Ghezzi, Richard A. Kemmerer: ASTRAL: An Assertion Language for Specifying Realtime Systems. ESEC 1991: 122-146
[c12]Phillip A. Porras, Richard A. Kemmerer: Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. IEEE Symposium on Security and Privacy 1991: 36-51- 1990
[j9]Richard A. Kemmerer: Integrating Formal Methods into the Development Process. IEEE Software 7(5): 37-50 (1990)
[c11]Richard A. Kemmerer: A Multilevel Formal Specification of a Mental Health Care Database. DBSec 1990: 27-52
1980 – 1989
- 1989
[c10]
[c9]- 1987
[j8]J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Trans. Software Eng. 13(2): 157-168 (1987)
[c8]Richard A. Kemmerer: Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. CRYPTO 1987: 289-305
[c7]Richard A. Kemmerer: Formal Specification and Verification Techniques for Secure Database Systems. DBSec 1987: 229-240
[c6]Richard A. Kemmerer: Using Formal Verification Techniques to Analyze Encryption Protocols. IEEE Symposium on Security and Privacy 1987: 134-139- 1986
[j7]Brent Auernheimer, Richard A. Kemmerer: RT-ASLAN: A Specification Language for Real-Time Systems. IEEE Trans. Software Eng. 12(9): 879-889 (1986)
[c5]Richard A. Kemmerer: Analyzing Encryption Protocols Using Formal Verification Techniques. EUROCRYPT 1986: 48
[c4]J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Symposium on Security and Privacy 1986: 14-24- 1985
[j6]J. David Blaine, Richard A. Kemmerer: Complexity measures for assembly language programs. Journal of Systems and Software 5(3): 229-245 (1985)
[j5]Richard A. Kemmerer, Steven T. Eckman: UNISEX: A UNIX-based Symbolic EXecutor for Pascal. Softw., Pract. Exper. 15(5): 439-458 (1985)
[j4]Richard A. Kemmerer: Testing Formal Specifications to Detect Design Errors. IEEE Trans. Software Eng. 11(1): 32-43 (1985)- 1983
[j3]Richard A. Kemmerer: Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Trans. Comput. Syst. 1(3): 256-277 (1983)
[c3]Thomas H. Hinke, Jose Althouse, Richard A. Kemmerer: SDC Secure Release Terminal Project. IEEE Symposium on Security and Privacy 1983: 113-119- 1982
[c2]Richard A. Kemmerer: A Practical Approach to Identifying Storage and Timing Channels. IEEE Symposium on Security and Privacy 1982: 66-73- 1980
[j2]Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek: Specification and Verification of the UCLA Unix Security Kernel. Commun. ACM 23(2): 118-131 (1980)
[j1]Daniel M. Berry, Richard A. Kemmerer, Arndt von Staa, Shaula Yemini: Toward Modular Verifiable Exception Handling. Comput. Lang. 5(2): 77-101 (1980)
1970 – 1979
- 1979
[c1]Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek: Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract). SOSP 1979: 64-65
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:00 CEST by the dblp team



