According to our database1, Divya Muthukumaran authored at least 16 papers between 2008 and 2018.
Legend:Book In proceedings Article PhD thesis Other
LibSEAL: revealing service integrity violations using trusted execution.
Proceedings of the Thirteenth EuroSys Conference, 2018
Glamdring: Automatic Application Partitioning for Intel SGX.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the 10th European Workshop on Systems Security, 2017
Maintaining Authorization Hook Placements Across Program Versions.
Proceedings of the IEEE Cybersecurity Development, 2016
SCONE: Secure Linux Containers with Intel SGX.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016
BrowserFlow: Imprecise Data Flow Tracking to Prevent Accidental Data Disclosure.
Proceedings of the 17th International Middleware Conference, Trento, Italy, December 12, 2016
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Producing Hook Placements to Enforce Expected Access Control Policies.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
CloudSafetyNet: Detecting Data Leakage between Cloud Tenants.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Leveraging "choice" to automate authorization hook placement.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Transforming commodity security policies to enforce Clark-Wilson integrity.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Protecting the integrity of trusted applications in mobile phone systems.
Security and Communication Networks, 2011
Cut me some security.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Automating Security Mediation Placement.
Proceedings of the Programming Languages and Systems, 2010
Measuring integrity on mobile phone systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008