


Остановите войну!
for scientists:


default search action
Richard A. Kemmerer
Person information

- affiliation: University of California, Santa Barbara, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – 2019
- 2015
- [c71]Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Know Your Achilles' Heel: Automatic Detection of Network Critical Services. ACSAC 2015: 41-50 - [c70]Benjamin Caillat, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Prison: Tracking Process Interactions to Contain Malware. HPCC/CSS/ICESS 2015: 1282-1291 - 2014
- [c69]Maria B. Line, Ali Zand, Gianluca Stringhini, Richard A. Kemmerer:
Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared? SEGS@CCS 2014: 13-22 - [c68]Ali Zand, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Rippler: Delay injection for service dependency detection. INFOCOM 2014: 2157-2165 - [c67]Jane Iedemska, Gianluca Stringhini, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
The Tricks of the Trade: What Makes Spam Campaigns Successful? IEEE Symposium on Security and Privacy Workshops 2014: 77-83 - 2013
- [c66]Kyriakos G. Vamvoudakis, João P. Hespanha, Richard A. Kemmerer, Giovanni Vigna:
Formulating Cyber-Security as Convex Optimization Problems. CPSW@CISS 2013: 85-100 - [c65]Richard A. Kemmerer:
20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly. NDSS 2013 - 2011
- [j37]Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Analysis of a Botnet Takeover. IEEE Secur. Priv. 9(1): 64-72 (2011) - [j36]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita
:
Formal analysis of an electronic voting system: An experience report. J. Syst. Softw. 84(10): 1618-1637 (2011) - [c64]Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). DIMVA 2011: 184-193 - [c63]Richard A. Kemmerer:
How to steal a botnet and what can happen when you do. ICSM 2011: 1 - [c62]Brett Stone-Gross, Ryan Stevens, Apostolis Zarras
, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Understanding fraudulent activities in online ad exchanges. Internet Measurement Conference 2011: 279-294 - [c61]Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Dymo: Tracking Dynamic Code Identity. RAID 2011: 21-40 - [c60]Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald:
The Underground Economy of Fake Antivirus Software. WEIS 2011 - [c59]Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, Giovanni Vigna:
The Underground Economy of Fake Antivirus Software. WEIS (Springer Volume) 2011: 55-78 - 2010
- [j35]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE Trans. Software Eng. 36(4): 453-473 (2010) - [c58]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita
:
Formal Specification and Analysis of an E-voting System. ARES 2010: 164-171 - [i5]Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmerer, Dino Mandrioli:
Refinement and Verification of Real-Time Systems. CoRR abs/1002.1796 (2010)
2000 – 2009
- 2009
- [j34]Georg Carle, Falko Dressler
, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov:
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Comput. Sci. Res. Dev. 23(1): 15-25 (2009) - [c57]Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro
, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Your botnet is my botnet: analysis of a botnet takeover. CCS 2009: 635-647 - [c56]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita
:
Formal analysis of attacks for e-voting system. CRiSIS 2009: 26-34 - [c55]Richard A. Kemmerer:
How to Steal a Botnet and What Can Happen When You Do. ICICS 2009: 1 - 2008
- [c54]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248 - [e3]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel:
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008. Dagstuhl Seminar Proceedings 08102, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [i4]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel:
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 - [i3]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov:
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 - [i2]Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage:
08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008 - 2007
- [j33]André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer:
Using a virtual security testbed for digital forensic reconstruction. J. Comput. Virol. 2(4): 275-289 (2007) - [c53]Richard A. Kemmerer:
So You Think You Can Dance? ACSAC 2007: 3-17 - [c52]Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer:
Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20 - 2006
- [c51]André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer:
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. DIMVA 2006: 144-163 - [c50]Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna:
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358 - [c49]William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer:
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006 - [c48]André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer:
Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164 - 2005
- [j32]Richard A. Kemmerer, Giovanni Vigna:
Hi-DRA: Intrusion Detection for Internet Security. Proc. IEEE 93(10): 1848-1857 (2005) - [c47]Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems. ASE 2005: 3 - 2004
- [j31]Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer:
Past pushdown timed automata and safety verification. Theor. Comput. Sci. 313(1): 57-71 (2004) - [j30]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer:
A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Secur. Comput. 1(3): 146-169 (2004) - [c46]Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer:
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. ACSAC 2004: 16-27 - 2003
- [j29]Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer:
Generalized discrete timed automata: decidable approximations for safety verificatio. Theor. Comput. Sci. 296(1): 59-74 (2003) - [j28]Zhe Dang, Pierluigi San Pietro
, Richard A. Kemmerer:
Presburger liveness verification of discrete timed automata. Theor. Comput. Sci. 299(1-3): 413-438 (2003) - [c45]Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer:
A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-43 - [c44]Darren Mutz, Giovanni Vigna, Richard A. Kemmerer:
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ACSAC 2003: 374-383 - [c43]Richard A. Kemmerer:
Cybersecurity. ICSE 2003: 705-717 - [c42]Richard A. Kemmerer, Giovanni Vigna:
Internet Security and Intrusion Detection. ICSE 2003: 748-749 - [c41]Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97 - 2002
- [j27]Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer:
STATL: An Attack Language for State-Based Intrusion Detection. J. Comput. Secur. 10(1/2): 71-104 (2002) - [j26]Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer:
Counter Machines and Verification Problems. Theor. Comput. Sci. 289(1): 165-189 (2002) - [c40]Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer:
Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24 - [c39]Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. ACSAC 2002: 109-118 - [c38]Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer:
Stateful Intrusion Detection for High-Speed Networks. S&P 2002: 285-293 - 2001
- [c37]Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer:
Decidable Approximations on Generalized and Parameterized Discrete Timed Automata. COCOON 2001: 529-539 - [c36]Sebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer:
Evaluating the Security of Three Java-Based Mobile Agent Systems. Mobile Agents 2001: 31-41 - [c35]Giovanni Vigna, Richard A. Kemmerer, Per Blix:
Designing a Web of Highly-Configurable Intrusion Detection Sensors. Recent Advances in Intrusion Detection 2001: 69-84 - [c34]Zhe Dang, Pierluigi San Pietro, Richard A. Kemmerer:
On Presburger Liveness of Discrete Timed Automata. STACS 2001: 132-143 - [c33]Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer:
Past Pushdown Timed Automata. CIAA 2001: 74-86 - [p2]André L. M. dos Santos, Giovanni Vigna, Richard A. Kemmerer:
Security Testing of an Online Banking Service. E-Commerce Security and Privacy 2001: 3-15 - 2000
- [j25]Richard A. Kemmerer:
Editorial: New EIC Introduction. IEEE Trans. Software Eng. 26(2): 97 (2000) - [c32]André L. M. dos Santos, Richard A. Kemmerer:
Implementing Security Policies using the Safe Areas of Computation Approach. ACSAC 2000: 90-99 - [c31]Zhe Dang, Oscar H. Ibarra, Tevfik Bultan, Richard A. Kemmerer, Jianwen Su:
Binary Reachability Analysis of Discrete Pushdown Timed Automata. CAV 2000: 69-84 - [c30]Paul Z. Kolano, Richard A. Kemmerer, Dino Mandrioli:
Parallel Refinement Mechanisms for Real-Time Systems. FASE 2000: 35-50 - [c29]Zhe Dang, Richard A. Kemmerer:
Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems. ICSE 2000: 345-354 - [c28]Paul Z. Kolano, Richard A. Kemmerer:
Classification schemes to aid in the analysis of real-time systems. ISSTA 2000: 86-95 - [c27]Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer:
Conter Machines: Decidable Properties and Applications to Verification Problems. MFCS 2000: 426-435
1990 – 1999
- 1999
- [j24]Paul Z. Kolano, Zhe Dang, Richard A. Kemmerer:
The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment. Ann. Softw. Eng. 7: 177-210 (1999) - [j23]Giovanni Vigna, Richard A. Kemmerer:
NetSTAT: A Network-based Intrusion Detection System. J. Comput. Secur. 7(1): 37-71 (1999) - [j22]Richard A. Kemmerer:
Editor's Note. IEEE Trans. Software Eng. 25(4): 433-434 (1999) - [j21]Richard A. Kemmerer:
Editorial. IEEE Trans. Software Eng. 25(6): 745-746 (1999) - [c26]André L. M. dos Santos, Richard A. Kemmerer:
Safe Areas of Computation for Secure Computing with Insecure Applications. ACSAC 1999: 35-44 - [c25]Zhe Dang, Richard A. Kemmerer:
Using the ASTRAL Model Checker to Analyze Mobile IP. ICSE 1999: 132-142 - [c24]Zhe Dang, Richard A. Kemmerer:
A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications. RTCSA 1999: 174-181 - 1998
- [c23]Giovanni Vigna, Richard A. Kemmerer:
NetSTAT: A Network-Based Intrusion Detection Approach. ACSAC 1998: 25-34 - [c22]Richard G. Hamlet, Richard A. Kemmerer, Edward F. Miller, Debra J. Richardson:
The Most Influential Papers from the ISSTA Research Community (Panel). ISSTA 1998: 49 - [c21]Flavio De Paoli, André L. M. dos Santos, Richard A. Kemmerer:
Web Browsers and Security. Mobile Agents and Security 1998: 235-256 - [e2]Koji Torii, Kokichi Futatsugi, Richard A. Kemmerer:
Forging New Links, Proceedings of the 1998 International Conference on Software Engineering, ICSE 98, Kyoto, Japan, April 19-25, 1998. IEEE Computer Society 1998, ISBN 0-8186-8368-6 [contents] - 1997
- [j20]Alberto Coen-Porisini
, Carlo Ghezzi, Richard A. Kemmerer:
Specification of Realtime Systems Using ASTRAL. IEEE Trans. Software Eng. 23(9): 572-598 (1997) - [c20]Richard A. Kemmerer:
Security Issues in Distributed Software. ESEC / SIGSOFT FSE 1997: 52-59 - [c19]Richard A. Kemmerer:
Formally Specifying and Verifying Real-Time Systems. ICFEM 1997: 112-121 - 1996
- [c18]Richard A. Kemmerer, Tad Taylor:
A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. ACSAC 1996: 224-235 - [c17]Richard Denney, Richard A. Kemmerer, Nancy G. Leveson, Alberto Savoia:
Why State-of-the-Art is not State-of-the-Practice (Panel Abstract). ISSTA 1996: 293 - 1995
- [j19]Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras:
State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Trans. Software Eng. 21(3): 181-199 (1995) - [c16]Alberto Coen-Porisini
, Richard A. Kemmerer, Dino Mandrioli:
A Formal Framework for ASTRAL Inter-level Proof Obligations. ESEC 1995: 90-108 - 1994
- [j18]Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis. J. Cryptol. 7(2): 79-130 (1994) - [j17]Alberto Coen-Porisini
, Richard A. Kemmerer, Dino Mandrioli:
A Formal Framework for ASTRAL Intralevel Proof Obligations. IEEE Trans. Software Eng. 20(8): 548-561 (1994) - [c15]Jeffrey Douglas, Richard A. Kemmerer:
Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications. ISSTA 1994: 15-27 - 1993
- [c14]Alberto Coen-Porisini
, Richard A. Kemmerer:
The Composability of ASTRAL Realtime Specifications. ISSTA 1993: 128-138 - [p1]Richard A. Kemmerer:
Quality Assurance Working Group. Formal Methods in Systems Engineering 1993: 88-91 - 1992
- [j16]Jonathan D. Reichbach, Richard A. Kemmerer:
SoundWorks: An Object-Oriented Distributed System for Digital Sound. Computer 25(3): 25-37 (1992) - [j15]Richard A. Kemmerer, Carlo Ghezzi:
Guest Editors' Introduction: Specification and Analysis of Real-Time Systems. IEEE Trans. Software Eng. 18(9): 766-767 (1992) - [c13]Phillip A. Porras, Richard A. Kemmerer:
Penetration state transition analysis: A rule-based intrusion detection approach. ACSAC 1992: 220-229 - 1991
- [j14]Richard A. Kemmerer, Phillip A. Porras:
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. IEEE Trans. Software Eng. 17(11): 1166-1185 (1991) - [c12]Carlo Ghezzi, Richard A. Kemmerer:
ASTRAL: An Assertion Language for Specifying Realtime Systems. ESEC 1991: 122-146 - [c11]Phillip A. Porras, Richard A. Kemmerer:
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. S&P 1991: 36-51 - 1990
- [j13]Richard A. Kemmerer:
Integrating Formal Methods into the Development Process. IEEE Softw. 7(5): 37-50 (1990) - [c10]Richard A. Kemmerer:
A Multilevel Formal Specification of a Mental Health Care Database. DBSec 1990: 27-52
1980 – 1989
- 1989
- [j12]Richard A. Kemmerer:
Analyzing encryption protocols using formal verification techniques. IEEE J. Sel. Areas Commun. 7(4): 448-457 (1989) - [c9]Richard A. Kemmerer:
Formal Specification of a Mental Health Delivery System. DBSec 1989: 341-351 - [c8]Richard A. Kemmerer:
Completely Validated Software. ICSE 1989: 359-360 - [e1]Richard A. Kemmerer:
Proceedings of the ACM SIGSOFT '89 Third Symposium on Testing, Analysis, and Verification, TAV 1989, Key West, Florida, USA, December 13-15, 1989. ACM 1989, ISBN 0-89791-342-6 [contents] - 1987
- [j11]J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Trans. Software Eng. 13(2): 157-168 (1987) - [c7]Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. CRYPTO 1987: 289-305 - [c6]Richard A. Kemmerer:
Formal Specification and Verification Techniques for Secure Database Systems. DBSec 1987: 229-240 - [c5]Richard A. Kemmerer:
Using Formal Verification Techniques to Analyze Encryption Protocols. S&P 1987: 134-139 - 1986
- [j10]Brent Auernheimer, Richard A. Kemmerer:
RT-ASLAN: A Specification Language for Real-Time Systems. IEEE Trans. Software Eng. 12(9): 879-889 (1986) - [c4]J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. S&P 1986: 14-24 - [i1]Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Techniques. EUROCRYPT 1986: 48 - 1985
- [j9]J. David Blaine, Richard A. Kemmerer:
Complexity measures for assembly language programs. J. Syst. Softw. 5(3): 229-245 (1985) - [j8]Steven T. Eckmann, Richard A. Kemmerer:
INATEST: an interactive environment for testing formal specifications. ACM SIGSOFT Softw. Eng. Notes 10(4): 17-18 (1985) - [j7]Richard A. Kemmerer:
Overview of foundations. ACM SIGSOFT Softw. Eng. Notes 10(4): 75 (1985) - [j6]Richard A. Kemmerer, Steven T. Eckman:
UNISEX: A UNIX-based Symbolic EXecutor for Pascal. Softw. Pract. Exp. 15(5): 439-458 (1985) - [j5]Richard A. Kemmerer:
Testing Formal Specifications to Detect Design Errors. IEEE Trans. Software Eng. 11(1): 32-43 (1985) - 1983
- [j4]Richard A. Kemmerer:
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Trans. Comput. Syst. 1(3): 256-277 (1983) - [c3]Thomas H. Hinke, Jose Althouse, Richard A. Kemmerer:
SDC Secure Release Terminal Project. S&P 1983: 113-119 - 1982
- [c2]Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels. S&P 1982: 66-73 - 1981
- [j3]Richard A. Kemmerer:
Status of ongoing security-relevant projects. ACM SIGSOFT Softw. Eng. Notes 6(3): 42-43 (1981) - 1980
- [j2]Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek:
Specification and Verification of the UCLA Unix Security Kernel. Commun. ACM 23(2): 118-131 (1980) - [j1]Daniel M. Berry, Richard A. Kemmerer, Arndt von Staa, Shaula Yemini:
Toward Modular Verifiable Exception Handling. Comput. Lang. 5(2): 77-101 (1980)
1970 – 1979
- 1979
- [c1]Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek:
Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract). SOSP 1979: 64-65