Aravind Prakash

According to our database1, Aravind Prakash authored at least 28 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Lite-SeqCNN: A Light-Weight Deep CNN Architecture for Protein Function Prediction.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Cheating in eSports: Problems and Challenges.
Proceedings of the IEEE Gaming, Entertainment, and Media Conference, 2023

2022
Generic Tagging for RISC-V Binaries.
CoRR, 2022

Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage.
Proceedings of the Secure IT Systems, 2022

A Security Analysis of Labeling-Based Control-Flow Integrity Schemes.
Proceedings of the 29th IEEE International Conference on High Performance Computing, 2022

2021
Track Conventions, Not Attack Signatures: Fortifying X86 ABI and System Call Interfaces to Mitigate Code Reuse Attacks.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

Program Obfuscation via ABI Debiasing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Simplex: Repurposing Intel Memory Protection Extensions for Information Hiding.
CoRR, 2020

Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
On Design Inference from Binaries Compiled using Modern C++ Defenses.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Debloating Software through Piece-Wise Compilation and Loading.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform.
IEEE Trans. Software Eng., 2017

A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

Supplementing Modern Software Defenses with Stack-Pointer Sanity.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution.
IEEE Trans. Dependable Secur. Comput., 2015

vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Defeating ROP Through Denial of Stack Pivot.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting.
IEEE Trans. Cloud Comput., 2014

Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform.
Proceedings of the International Symposium on Software Testing and Analysis, 2014

MACE: high-coverage and robust memory analysis for commodity operating systems.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Manipulating semantic values in kernel data structures: Attack assessments and implications.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Enforcing system-wide control flow integrity for exploit detection and diagnosis.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

OS-Sommelier: memory-only operating system fingerprinting in the cloud.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012


  Loading...