Follow
Sandeep Bhatkar
Sandeep Bhatkar
Researcher
Verified email at talasecurity.io
Title
Cited by
Cited by
Year
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
S Bhatkar, DC DuVarney, R Sekar
12th USENIX Security Symposium (USENIX Security 03), 2003
9012003
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks.
W Xu, S Bhatkar, R Sekar
USENIX Security Symposium, 121-136, 2006
5332006
Efficient Techniques for Comprehensive Protection from Memory Error Exploits.
S Bhatkar, DC DuVarney, R Sekar
USENIX Security Symposium 10, 1, 2005
4472005
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
2802003
Data space randomization
S Bhatkar, R Sekar
International Conference on Detection of Intrusions and Malware, and …, 2008
2412008
Dataflow anomaly detection
S Bhatkar, A Chaturvedi, R Sekar
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-62, 2006
1892006
{MutantX-S}: Scalable malware clustering based on static features
X Hu, KG Shin, S Bhatkar, K Griffin
2013 USENIX Annual Technical Conference (USENIX ATC 13), 187-198, 2013
1832013
Techniques for behavior based malware analysis
SB Bhatkar, S Nanda, JS Wilhelm
US Patent 8,555,385, 2013
1522013
Systems and methods for using event-correlation graphs to generate remediation procedures
KA Roundy, S Bhatkar
US Patent 9,256,739, 2016
992016
Systems and methods for detecting security threats based on user profiles
F Guo, S Bhatkar, K Roundy
US Patent 9,401,925, 2016
922016
Systems and methods for using event-correlation graphs to detect attacks on computing systems
K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ...
US Patent 9,141,790, 2015
902015
Systems and methods for classifying security events as targeted attacks
KA Roundy, S Bhatkar
US Patent 9,754,106, 2017
802017
Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems
F Guo, S Bhatkar, K Roundy
US Patent 9,166,997, 2015
712015
Encoding machine code instructions for static feature based malware clustering
X Hu, KE Griffin, SB Bhatkar
US Patent 8,826,439, 2014
522014
Systems and methods for adjusting suspiciousness scores in event-correlation graphs
A Tamersoy, K Roundy, S Bhatkar, E Khalil
US Patent 9,148,441, 2015
412015
Practical dynamic taint analysis for countering input validation attacks on web applications
W Xu, S Bhatkar, R Sekar
Dept. Comput. Sci., Stony Brook Univ., Stony Brook, NY, USA, Tech. Rep …, 2005
322005
SELF: a transparent security extension for ELF binaries
DC DuVarney, VN Venkatakrishnan, S Bhatkar
Proceedings of the 2003 workshop on New security paradigms, 29-38, 2003
312003
Improving attack detection in host-based IDS by learning properties of system call arguments
A Chaturvedi, E Bhatkar, R Sekar
Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, US, 1-19, 2005
242005
Method to Detect Malicious Behavior by Computing the Likelihood of Data Accesses
M Hart, C Verma, S Bhatkar, A Parker-Wood
US Patent App. 14/690,171, 2016
222016
Improving scalability of personalized recommendation systems for enterprise knowledge workers
C Verma, M Hart, S Bhatkar, A Parker-Wood, S Dey
IEEE Access 4, 204-215, 2015
212015
The system can't perform the operation now. Try again later.
Articles 1–20