Aditi Gupta

Affiliations:
  • Purdue University


According to our database1, Aditi Gupta authored at least 12 papers between 2010 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Marlin: Mitigating Code Reuse Attacks Using Code Randomization.
IEEE Trans. Dependable Secur. Comput., 2015

DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices.
Proceedings of the Network and System Security - 9th International Conference, 2015

MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Detecting mobile malware threats to homeland security through static analysis.
J. Netw. Comput. Appl., 2014

A formal proximity model for RBAC systems.
Comput. Secur., 2014

2013
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.
Proceedings of the Network and System Security - 7th International Conference, 2013

A secure architecture design based on application isolation, code minimization and randomization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
Proceedings of the 2012 International Conference on Privacy, 2012

PeerSense: Who is near you?
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Marlin: making it harder to fish for gadgets.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Using context-profiling to aid access control decisions in mobile devices.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

2010
A selective encryption approach to fine-grained access control for P2P file sharing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010


  Loading...