|  | 2010 | 
|---|
| 90 |            | Paul Z. Kolano,
Carlo A. Furia,
Richard A. Kemmerer,
Dino Mandrioli:
Refinement and Verification of Real-Time Systems
CoRR abs/1002.1796:  (2010) | 
|  | 2009 | 
|---|
| 89 |            | Brett Stone-Gross,
Marco Cova,
Lorenzo Cavallaro,
Bob Gilbert,
Martin Szydlowski,
Richard A. Kemmerer,
Christopher Kruegel,
Giovanni Vigna:
Your botnet is my botnet: analysis of a botnet takeover.
ACM Conference on Computer and Communications Security 2009: 635-647 | 
| 88 |            | Richard A. Kemmerer:
How to Steal a Botnet and What Can Happen When You Do.
ICICS 2009: 1 | 
| 87 |            | Georg Carle,
Falko Dressler,
Richard A. Kemmerer,
Hartmut König,
Christopher Kruegel,
Pavel Laskov:
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008.
Computer Science - R&D 23(1): 15-25 (2009) | 
|  | 2008 | 
|---|
| 86 |            | Georg Carle,
Falko Dressler,
Richard A. Kemmerer,
Hartmut König,
Christopher Kruegel:
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 | 
| 85 |            | Davide Balzarotti,
Greg Banks,
Marco Cova,
Viktoria Felmetsger,
Richard A. Kemmerer,
William K. Robertson,
Fredrik Valeur,
Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems.
ISSTA 2008: 237-248 | 
| 84 |            | Georg Carle,
Falko Dressler,
Richard A. Kemmerer,
Hartmut König,
Christopher Kruegel:
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense.
Network Attack Detection and Defense 2008 | 
| 83 |            | Georg Carle,
Falko Dressler,
Richard A. Kemmerer,
Hartmut König,
Christopher Kruegel,
Pavel Laskov:
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense.
Network Attack Detection and Defense 2008 | 
| 82 |            | Richard A. Kemmerer,
Roland Büschkes,
Ali Fessi,
Hartmut König,
Peter Herrmann,
Stephen D. Wolthusen,
Marko Jahnke,
Hervé Debar,
Ralph Holz,
Tanja Zseby,
Dirk Haage:
08102 Outcome Working Group -- Situational Awareness.
Network Attack Detection and Defense 2008 | 
|  | 2007 | 
|---|
| 81 |            | Richard A. Kemmerer:
So You Think You Can Dance?
ACSAC 2007: 3-17 | 
| 80 |            | Darren Mutz,
William K. Robertson,
Giovanni Vigna,
Richard A. Kemmerer:
Exploiting Execution Context for the Detection of Anomalous System Calls.
RAID 2007: 1-20 | 
| 79 |            | André Årnes,
Paul Haas,
Giovanni Vigna,
Richard A. Kemmerer:
Using a virtual security testbed for digital forensic reconstruction.
Journal in Computer Virology 2(4): 275-289 (2007) | 
|  | 2006 | 
|---|
| 78 |            | André Årnes,
Paul Haas,
Giovanni Vigna,
Richard A. Kemmerer:
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.
DIMVA 2006: 144-163 | 
| 77 |            | Greg Banks,
Marco Cova,
Viktoria Felmetsger,
Kevin C. Almeroth,
Richard A. Kemmerer,
Giovanni Vigna:
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr.
ISC 2006: 343-358 | 
| 76 |            | William K. Robertson,
Giovanni Vigna,
Christopher Krügel,
Richard A. Kemmerer:
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
NDSS 2006 | 
| 75 |            | André Årnes,
Fredrik Valeur,
Giovanni Vigna,
Richard A. Kemmerer:
Using Hidden Markov Models to Evaluate the Risks of Intrusions.
RAID 2006: 145-164 | 
|  | 2005 | 
|---|
| 74 |            | Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems.
ASE 2005: 3 | 
|  | 2004 | 
|---|
| 73 |            | Giovanni Vigna,
Sumit Gwalani,
Kavitha Srinivasan,
Elizabeth M. Belding-Royer,
Richard A. Kemmerer:
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks.
ACSAC 2004: 16-27 | 
| 72 |            | Fredrik Valeur,
Giovanni Vigna,
Christopher Krügel,
Richard A. Kemmerer:
A Comprehensive Approach to Intrusion Detection Alert Correlation.
IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004) | 
| 71 |            | Zhe Dang,
Tevfik Bultan,
Oscar H. Ibarra,
Richard A. Kemmerer:
Past pushdown timed automata and safety verification.
Theor. Comput. Sci. 313(1): 57-71 (2004) | 
|  | 2003 | 
|---|
| 70 |            | Giovanni Vigna,
William K. Robertson,
Vishal Kher,
Richard A. Kemmerer:
A Stateful Intrusion Detection System for World-Wide Web Servers.
ACSAC 2003: 34-45 | 
| 69 |            | Darren Mutz,
Giovanni Vigna,
Richard A. Kemmerer:
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems.
ACSAC 2003: 374-383 | 
| 68 |            | Giovanni Vigna,
Fredrik Valeur,
Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems.
ESEC / SIGSOFT FSE 2003: 88-97 | 
| 67 |            | Richard A. Kemmerer:
Cybersecurity.
ICSE 2003: 705-717 | 
| 66 |            | Richard A. Kemmerer,
Giovanni Vigna:
Internet Security and Intrusion Detection.
ICSE 2003: 748-749 | 
| 65 |            | Zhe Dang,
Pierluigi San Pietro,
Richard A. Kemmerer:
Presburger liveness verification of discrete timed automata.
Theor. Comput. Sci. 1-3(299): 413-438 (2003) | 
| 64 |            | Zhe Dang,
Oscar H. Ibarra,
Richard A. Kemmerer:
Generalized discrete timed automata: decidable approximations for safety verificatio.
Theor. Comput. Sci. 296(1): 59-74 (2003) | 
|  | 2002 | 
|---|
| 63 |            | Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later.
ACSAC 2002: 109-118 | 
| 62 |            | Giovanni Vigna,
Fredrik Valeur,
Jingyu Zhou,
Richard A. Kemmerer:
Composable Tools For Network Discovery and Security Analysis.
ACSAC 2002: 14-24 | 
| 61 |            | Christopher Krügel,
Fredrik Valeur,
Giovanni Vigna,
Richard A. Kemmerer:
Stateful Intrusion Detection for High-Speed Networks.
IEEE Symposium on Security and Privacy 2002: 285- | 
| 60 |            | Steve T. Eckmann,
Giovanni Vigna,
Richard A. Kemmerer:
STATL: An Attack Language for State-Based Intrusion Detection.
Journal of Computer Security 10(1/2): 71-104 (2002) | 
| 59 |            | Oscar H. Ibarra,
Jianwen Su,
Zhe Dang,
Tevfik Bultan,
Richard A. Kemmerer:
Counter Machines and Verification Problems.
Theor. Comput. Sci. 289(1): 165-189 (2002) | 
|  | 2001 | 
|---|
| 58 |            | Zhe Dang,
Tevfik Bultan,
Oscar H. Ibarra,
Richard A. Kemmerer:
Past Pushdown Timed Automata.
CIAA 2001: 74-86 | 
| 57 |            | Zhe Dang,
Oscar H. Ibarra,
Richard A. Kemmerer:
Decidable Approximations on Generalized and Parameterized Discrete Timed Automata.
COCOON 2001: 529-539 | 
| 56 |            | Sebastian Fischmeister,
Giovanni Vigna,
Richard A. Kemmerer:
Evaluating the Security of Three Java-Based Mobile Agent Systems.
Mobile Agents 2001: 31-41 | 
| 55 |            | Giovanni Vigna,
Richard A. Kemmerer,
Per Blix:
Designing a Web of Highly-Configurable Intrusion Detection Sensors.
Recent Advances in Intrusion Detection 2001: 69-84 | 
| 54 |            | Zhe Dang,
Pierluigi San Pietro,
Richard A. Kemmerer:
On Presburger Liveness of Discrete Timed Automata.
STACS 2001: 132-143 | 
|  | 2000 | 
|---|
| 53 |            | André L. M. dos Santos,
Richard A. Kemmerer:
Implementing Security Policies using the Safe Areas of Computation Approach.
ACSAC 2000: 90-99 | 
| 52 |            | Zhe Dang,
Oscar H. Ibarra,
Tevfik Bultan,
Richard A. Kemmerer,
Jianwen Su:
Binary Reachability Analysis of Discrete Pushdown Timed Automata.
CAV 2000: 69-84 | 
| 51 |            | Paul Z. Kolano,
Richard A. Kemmerer,
Dino Mandrioli:
Parallel Refinement Mechanisms for Real-Time Systems.
FASE 2000: 35-50 | 
| 50 |            | Zhe Dang,
Richard A. Kemmerer:
Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems.
ICSE 2000: 345-354 | 
| 49 |            | Paul Z. Kolano,
Richard A. Kemmerer:
Classification schemes to aid in the analysis of real-time systems.
ISSTA 2000: 86-95 | 
| 48 |            | Oscar H. Ibarra,
Jianwen Su,
Zhe Dang,
Tevfik Bultan,
Richard A. Kemmerer:
Conter Machines: Decidable Properties and Applications to Verification Problems.
MFCS 2000: 426-435 | 
| 47 |            | Richard A. Kemmerer:
Editorial.
IEEE Trans. Software Eng. 26(2): 97 (2000) | 
|  | 1999 | 
|---|
| 46 |            | André L. M. dos Santos,
Richard A. Kemmerer:
Safe Areas of Computation for Secure Computing with Insecure Applications.
ACSAC 1999: 35-44 | 
| 45 |            | Zhe Dang,
Richard A. Kemmerer:
Using the ASTRAL Model Checker to Analyze Mobile IP.
ICSE 1999: 132-142 | 
| 44 |            | Zhe Dang,
Richard A. Kemmerer:
A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications.
RTCSA 1999: 174-181 | 
| 43 |            | Paul Z. Kolano,
Zhe Dang,
Richard A. Kemmerer:
The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment.
Ann. Software Eng. 7: 177-210 (1999) | 
| 42 |            | Richard A. Kemmerer:
Editor's Note.
IEEE Trans. Software Eng. 25(4): 433-434 (1999) | 
| 41 |            | Richard A. Kemmerer:
Editorial.
IEEE Trans. Software Eng. 25(6): 745-746 (1999) | 
| 40 |            | Giovanni Vigna,
Richard A. Kemmerer:
NetSTAT: A Network-based Intrusion Detection System.
Journal of Computer Security 7(1):  (1999) | 
|  | 1998 | 
|---|
| 39 |            | Giovanni Vigna,
Richard A. Kemmerer:
NetSTAT: A Network-Based Intrusion Detection Approach.
ACSAC 1998: 25- | 
| 38 |            | Richard G. Hamlet,
Richard A. Kemmerer,
Edward F. Miller,
Debra J. Richardson:
The Most Influential Papers from the ISSTA Research Community (Panel).
ISSTA 1998: 49 | 
| 37 |            | Flavio De Paoli,
André L. M. dos Santos,
Richard A. Kemmerer:
Web Browsers and Security.
Mobile Agents and Security 1998: 235-256 | 
|  | 1997 | 
|---|
| 36 |            | Richard A. Kemmerer:
Security Issues in Distributed Software.
ESEC / SIGSOFT FSE 1997: 52-59 | 
| 35 |            | Richard A. Kemmerer:
Formally Specifying and Verifying Real-Time Systems.
ICFEM 1997: 112- | 
| 34 |            | Alberto Coen-Porisini,
Carlo Ghezzi,
Richard A. Kemmerer:
Specification of Realtime Systems Using ASTRAL.
IEEE Trans. Software Eng. 23(9): 572-598 (1997) | 
|  | 1996 | 
|---|
| 33 |            | Richard A. Kemmerer,
Tad Taylor:
A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/.
ACSAC 1996: 224-235 | 
| 32 |            | Richard Denney,
Richard A. Kemmerer,
Nancy G. Leveson,
Alberto Savoia:
Why State-of-the-Art is not State-of-the-Practice (Panel Abstract).
ISSTA 1996: 293 | 
|  | 1995 | 
|---|
| 31 |            | Alberto Coen-Porisini,
Richard A. Kemmerer,
Dino Mandrioli:
A Formal Framework for ASTRAL Inter-level Proof Obligations.
ESEC 1995: 90-108 | 
| 30 |            | Koral Ilgun,
Richard A. Kemmerer,
Phillip A. Porras:
State Transition Analysis: A Rule-Based Intrusion Detection Approach.
IEEE Trans. Software Eng. 21(3): 181-199 (1995) | 
|  | 1994 | 
|---|
| 29 |            | Jeffrey Douglas,
Richard A. Kemmerer:
Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications.
ISSTA 1994: 15-27 | 
| 28 |            | Alberto Coen-Porisini,
Richard A. Kemmerer,
Dino Mandrioli:
A Formal Framework for ASTRAL Intralevel Proof Obligations.
IEEE Trans. Software Eng. 20(8): 548-561 (1994) | 
| 27 |            | Richard A. Kemmerer,
Catherine Meadows,
Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis.
J. Cryptology 7(2): 79-130 (1994) | 
|  | 1993 | 
|---|
| 26 |            | Alberto Coen-Porisini,
Richard A. Kemmerer:
The Composability of ASTRAL Realtime Specifications.
ISSTA 1993: 128-138 | 
|  | 1992 | 
|---|
| 25 |            | Jonathan D. Reichbach,
Richard A. Kemmerer:
SoundWorks: An Object-Oriented Distributed System for Digital Sound.
IEEE Computer 25(3): 25-37 (1992) | 
| 24 |            | Richard A. Kemmerer,
Carlo Ghezzi:
Guest Editors' Introduction: Specification and Analysis of Real-Time Systems.
IEEE Trans. Software Eng. 18(9): 766-767 (1992) | 
|  | 1991 | 
|---|
| 23 |            | Carlo Ghezzi,
Richard A. Kemmerer:
ASTRAL: An Assertion Language for Specifying Realtime Systems.
ESEC 1991: 122-146 | 
| 22 |            | Phillip A. Porras,
Richard A. Kemmerer:
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels.
IEEE Symposium on Security and Privacy 1991: 36-51 | 
| 21 |            | Richard A. Kemmerer,
Phillip A. Porras:
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels.
IEEE Trans. Software Eng. 17(11): 1166-1185 (1991) | 
|  | 1990 | 
|---|
| 20 |            | Richard A. Kemmerer:
A Multilevel Formal Specification of a Mental Health Care Database.
DBSec 1990: 27-52 | 
| 19 |            | Richard A. Kemmerer:
Integrating Formal Methods into the Development Process.
IEEE Software 7(5): 37-50 (1990) | 
|  | 1989 | 
|---|
| 18 |            | Richard A. Kemmerer:
Formal Specification of a Mental Health Delivery System.
DBSec 1989: 341-351 | 
| 17 |            | Richard A. Kemmerer:
Completely Validated Software.
ICSE 1989: 359-360 | 
|  | 1987 | 
|---|
| 16 |            | Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes.
CRYPTO 1987: 289-305 | 
| 15 |            | Richard A. Kemmerer:
Formal Specification and Verification Techniques for Secure Database Systems.
DBSec 1987: 229-240 | 
| 14 |            | Richard A. Kemmerer:
Using Formal Verification Techniques to Analyze Encryption Protocols.
IEEE Symposium on Security and Privacy 1987: 134-139 | 
| 13 |            | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Trans. Software Eng. 13(2): 157-168 (1987) | 
|  | 1986 | 
|---|
| 12 |            | Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Techniques.
EUROCRYPT 1986: 48 | 
| 11 |            | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Symposium on Security and Privacy 1986: 14-24 | 
| 10 |            | Brent Auernheimer,
Richard A. Kemmerer:
RT-ASLAN: A Specification Language for Real-Time Systems.
IEEE Trans. Software Eng. 12(9): 879-889 (1986) | 
|  | 1985 | 
|---|
| 9 |            | Richard A. Kemmerer:
Testing Formal Specifications to Detect Design Errors.
IEEE Trans. Software Eng. 11(1): 32-43 (1985) | 
| 8 |            | J. David Blaine,
Richard A. Kemmerer:
Complexity measures for assembly language programs.
Journal of Systems and Software 5(3): 229-245 (1985) | 
| 7 |            | Richard A. Kemmerer,
Steven T. Eckman:
UNISEX: A UNIX-based Symbolic EXecutor for Pascal.
Softw., Pract. Exper. 15(5): 439-458 (1985) | 
|  | 1983 | 
|---|
| 6 |            | Thomas H. Hinke,
Jose Althouse,
Richard A. Kemmerer:
SDC Secure Release Terminal Project.
IEEE Symposium on Security and Privacy 1983: 113-119 | 
| 5 |            | Richard A. Kemmerer:
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
ACM Trans. Comput. Syst. 1(3): 256-277 (1983) | 
|  | 1982 | 
|---|
| 4 |            | Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels.
IEEE Symposium on Security and Privacy 1982: 66-73 | 
|  | 1980 | 
|---|
| 3 |            | Bruce J. Walker,
Richard A. Kemmerer,
Gerald J. Popek:
Specification and Verification of the UCLA Unix Security Kernel.
Commun. ACM 23(2): 118-131 (1980) | 
| 2 |            | Daniel M. Berry,
Richard A. Kemmerer,
Arndt von Staa,
Shaula Yemini:
Toward Modular Verifiable Exception Handling.
Comput. Lang. 5(2): 77-101 (1980) | 
|  | 1979 | 
|---|
| 1 |            | Bruce J. Walker,
Richard A. Kemmerer,
Gerald J. Popek:
Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract).
SOSP 1979: 64-65 |