Somesh Jha
Somesh Jha
Lubar Chair of Computer Science, University of Wisconsin
Verified email at
TitleCited byYear
Counterexample-guided abstraction refinement
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
International Conference on Computer Aided Verification, 154-169, 2000
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 372-387, 2016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
Counterexample-guided abstraction refinement for symbolic model checking
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
Journal of the ACM (JACM) 50 (5), 752-794, 2003
Distillation as a defense to adversarial perturbations against deep neural networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
2016 IEEE Symposium on Security and Privacy (SP), 582-597, 2016
Semantics-aware malware detection
M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant
2005 IEEE Symposium on Security and Privacy (S&P'05), 32-46, 2005
Static analysis of executables to detect malicious patterns
M Christodorescu, S Jha
Two formal analyses of attack graphs
S Jha, O Sheyner, J Wing
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 49-63, 2002
Modular verification of software components in C
S Chaki, EM Clarke, A Groce, S Jha, H Veith
IEEE Transactions on Software Engineering 30 (6), 388-402, 2004
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
Effective inter-component communication mapping in android: An essential step towards holistic security analysis
D Octeau, P McDaniel, S Jha, A Bartel, E Bodden, J Klein, Y Le Traon
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Global intrusion detection in the domino overlay system
V Yegneswaran, P Barford, S Jha
University of Wisconsin-Madison Department of Computer Sciences, 2003
Testing malware detectors
M Christodorescu, S Jha
ACM SIGSOFT Software Engineering Notes 29 (4), 34-44, 2004
Exploiting symmetry in temporal logic model checking
EM Clarke, R Enders, T Filkorn, S Jha
Formal methods in system design 9 (1-2), 77-104, 1996
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
Deflating the big bang: fast and scalable deep packet inspection with extended finite automata
R Smith, C Estan, S Jha, S Kong
ACM SIGCOMM Computer Communication Review 38 (4), 207-218, 2008
Exploiting symmetry in temporal logic model checking
EM Clarke, T Filkorn, S Jha
International Conference on Computer Aided Verification, 450-462, 1993
A semantics-based approach to malware detection
MD Preda, M Christodorescu, S Jha, S Debray
ACM SIGPLAN Notices 42 (1), 377-388, 2007
The system can't perform the operation now. Try again later.
Articles 1–20