Somesh Jha
Somesh Jha
Lubar Chair of Computer Science, University of Wisconsin
Verified email at cs.wisc.edu
Title
Cited by
Cited by
Year
Counterexample-guided abstraction refinement
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
International Conference on Computer Aided Verification, 154-169, 2000
21062000
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
16262016
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
15392002
Distillation as a defense to adversarial perturbations against deep neural networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
2016 IEEE Symposium on Security and Privacy (SP), 582-597, 2016
13162016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
12702017
Counterexample-guided abstraction refinement for symbolic model checking
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
Journal of the ACM (JACM) 50 (5), 752-794, 2003
10252003
Semantics-aware malware detection
M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant
2005 IEEE Symposium on Security and Privacy (S&P'05), 32-46, 2005
9512005
Static analysis of executables to detect malicious patterns
M Christodorescu, S Jha
WISCONSIN UNIV-MADISON DEPT OF COMPUTER SCIENCES, 2006
8702006
Two formal analyses of attack graphs
S Jha, O Sheyner, J Wing
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 49-63, 2002
6592002
Modular verification of software components in C
S Chaki, EM Clarke, A Groce, S Jha, H Veith
IEEE Transactions on Software Engineering 30 (6), 388-402, 2004
6332004
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
6272015
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
5312007
Effective inter-component communication mapping in android: An essential step towards holistic security analysis
D Octeau, P McDaniel, S Jha, A Bartel, E Bodden, J Klein, Y Le Traon
22nd {USENIX} Security Symposium ({USENIX} Security 13), 543-558, 2013
4432013
Testing malware detectors
M Christodorescu, S Jha
ACM SIGSOFT Software Engineering Notes 29 (4), 34-44, 2004
4012004
Global intrusion detection in the domino overlay system
V Yegneswaran, P Barford, S Jha
University of Wisconsin-Madison Department of Computer Sciences, 2003
3932003
Exploiting symmetry in temporal logic model checking
EM Clarke, R Enders, T Filkorn, S Jha
Formal methods in system design 9 (1-2), 77-104, 1996
3761996
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
3712006
Practical black-box attacks against deep learning systems using adversarial examples
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
arXiv preprint arXiv:1602.02697 1 (2), 3, 2016
3212016
Deflating the big bang: fast and scalable deep packet inspection with extended finite automata
R Smith, C Estan, S Jha, S Kong
Proceedings of the ACM SIGCOMM 2008 conference on Data communication, 207-218, 2008
3172008
Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
23rd {USENIX} Security Symposium ({USENIX} Security 14), 17-32, 2014
3042014
The system can't perform the operation now. Try again later.
Articles 1–20