Amit Vasudevan

According to our database1, Amit Vasudevan authored at least 29 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
Reviewing the role of machine learning and artificial intelligence for remote attestation in 5G+ networks.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
KalKi++: A Scalable and Extensible IoT Security Platform.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

Formal Verification of a Mixed-Trust Synchronization Protocol.
Proceedings of the RTNS'2021: 29th International Conference on Real-Time Networks and Systems, 2021

Formalizing an Architectural Model of a Trustworthy Edge IoT Security Gateway<sup>‡</sup>.
Proceedings of the 27th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2021

2020
überSpark: Practical, Provable, End-to-End Guarantees on Commodity Heterogenous Interconnected Computing Platforms.
ACM SIGOPS Oper. Syst. Rev., 2020

KalKi: A Software-Defined IoT Security Platform.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Towards an Architecture for Trusted Edge IoT Security Gateways.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Edge Computing, 2020

2019
Practical Security Properties on Commodity Computing Platforms - The uber eXtensible Micro-Hypervisor Framework
Springer Briefs in Computer Science, Springer, ISBN: 978-3-030-25048-5, 2019

Mixed-Trust Computing for Real-Time Systems.
Proceedings of the 25th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2019

2018
Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2016
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor.
Proceedings of the 25th USENIX Security Symposium, 2016

2014
Trustworthy Execution on Mobile Devices.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8190-4, 2014

2013
Towards verifiable resource accounting for outsourced computation.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013

Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Parametric Verification of Address Space Separation.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Down to the bare metal: using processor features for binary analysis.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

2009
Re-inforced stealth breakpoints.
Proceedings of the CRiSIS 2009, 2009

2008
MalTRAK: Tracking and Eliminating Unknown Malware.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2006
Cobra: Fine-grained Malware Analysis using Stealth Localized-executions.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation.
Proceedings of the Computer Science 2006, 2006

2005
A High Performance Kernel-Less Operating System Architecture.
Proceedings of the Computer Science 2005, 2005

Stealth Breakpoints.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005


  Loading...