Hayawardh Vijayakumar

According to our database1, Hayawardh Vijayakumar authored at least 26 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage.
CoRR, 2023

2021
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems.
CoRR, 2020

PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
FuzzFactory: domain-specific fuzzing with waypoints.
Proc. ACM Program. Lang., 2019

2018
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018

InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2015
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture.
CoRR, 2014

JIGSAW: Protecting Resource Access by Inferring Programmer Expectations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Policy models to protect resource retrieval.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

2013
Cloud Verifier: Verifiable Auditing Service for IaaS Clouds.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Process firewalls: protecting processes during resource access.
Proceedings of the Eighth Eurosys Conference 2013, 2013

2012
STING: Finding Name Resolution Vulnerabilities in Programs.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Verifying System Integrity by Proxy.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

The Right Files at the Right Time.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Integrity walls: finding attack surfaces from mandatory access control policies.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Transforming commodity security policies to enforce Clark-Wilson integrity.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

2010
Cut me some security.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Seeding clouds with trust anchors.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Analysis of virtual machine system policies.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

2007
A scalable parallelization of all-pairs shortest path algorithm for a high performance cluster environment.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

2006
Supervised Grid-of-Tries: A Novel Framework for Classifier Management.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006


  Loading...