Aravind Machiry
Orcid: 0000-0001-5124-6818
According to our database1,
Aravind Machiry
authored at least 58 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
CoRR, May, 2025
CoRR, March, 2025
Do Unit Proofs Work? An Empirical Study of Compositional Bounded Model Checking for Memory Safety Verification.
CoRR, March, 2025
Finding 709 Defects in 258 Projects: An Experience Report on Applying CodeQL to Open-Source Embedded Software (Experience Paper).
Proc. ACM Softw. Eng., 2025
Proc. ACM Softw. Eng., 2025
Detection of Device Triggerable Vulnerabilities in Android Companion Apps through Interactive Triaging.
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
$ZTD_{\text{JAVA}}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, 2025
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Information Systems Security - 20th International Conference, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
An Empirical Study on the Use of Static Analysis Tools in Open Source Embedded Software.
CoRR, 2023
CheckedCBox: Type Directed Program Partitioning with Checked C for Incremental Spatial Memory Safety.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Towards Automated Identification of Layering Violations in Embedded Applications (WIP).
Proceedings of the 24th ACM SIGPLAN/SIGBED International Conference on Languages, 2023
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Proceedings of the Checkmate@CCS 2021, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2015
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
2013
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013