Mahesh Tripunitara

Orcid: 0000-0002-3615-9393

Affiliations:
  • The University of Waterloo, Waterloo, ON, Canada


According to our database1, Mahesh Tripunitara authored at least 63 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The poor usability of OpenLDAP Access Control Lists.
IET Inf. Secur., January, 2023

A Comparison of Four Notions of Isomorphism-Based Security for Graphs.
IEEE Trans. Dependable Secur. Comput., 2023

Least-Privilege Calls to Amazon Web Services.
IEEE Trans. Dependable Secur. Comput., 2023

The Hardness of Learning Access Control Policies.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

2022
The Secrecy Resilience of Access Control Policies and Its Application to Role Mining.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Locked Circuit Indistinguishability: A Notion of Security for Logic Locking.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies.
IEEE Trans. Dependable Secur. Comput., 2021

Granularity and Usability in Authorization Policies.
Proceedings of the Emerging Information Security and Applications, 2021

2020
The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling.
IEEE Trans. Dependable Secur. Comput., 2020

A computational complexity analysis of tunable type inference for Generic Universe Types.
Theor. Comput. Sci., 2020

The SAT Attack on IC Camouflaging: Impact and Potential Countermeasures.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Forensic Analysis in Access Control: Foundations and a Case-Study from Practice.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Constructing cascade bloom filters for efficient access enforcement.
Comput. Secur., 2019

Strengthening PUFs using Composition.
Proceedings of the International Conference on Computer-Aided Design, 2019

2017
Reverse Engineering Camouflaged Sequential Integrated Circuits Without Scan Access.
CoRR, 2017

Logic Locking for Secure Outsourced Chip Fabrication: A New Attack and Provably Secure Defense Mechanism.
CoRR, 2017

Reverse engineering camouflaged sequential circuits without scan access.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

The Need for Declarative Properties in Digital IC Security.
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017

Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF).
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way).
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

2015
Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Hard Instances for Verification Problems in Access Control.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Robust Shared Objects for Non-Volatile Main Memory.
Proceedings of the 19th International Conference on Principles of Distributed Systems, 2015

Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.
IEEE Trans. Parallel Distributed Syst., 2014

The use of mTags for mandatory security: a case study.
Softw. Pract. Exp., 2014

Reliable Computing with Ultra-Reduced Instruction Set Coprocessors.
IEEE Micro, 2014

The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies.
ACM Trans. Inf. Syst. Secur., 2013

The Foundational Work of Harrison-Ruzzo-Ullman Revisited.
IEEE Trans. Dependable Secur. Comput., 2013

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Least-restrictive enforcement of the Chinese wall security policy.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Property-testing real-world authorization systems.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Panel on granularity in access control.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
Payments for Outsourced Computations.
IEEE Trans. Parallel Distributed Syst., 2012

Relating declarative semantics and usability in access control.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC).
Proceedings of the Network and System Security - 6th International Conference, 2012

Reliable computing with ultra-reduced instruction set co-processors.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

2011
ARBAC Policy for a Large Multi-National Bank
CoRR, 2011

An authorization scheme for version control systems.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC).
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Automatic error finding in access-control policies.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Fair Payments for Outsourced Computations.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Role-based access control (RBAC) in Java via proxy objects using annotations.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Access control in practice: pain points.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

2009
Resiliency Policies in Access Control.
ACM Trans. Inf. Syst. Secur., 2009

Efficient access enforcement in distributed role-based access control (RBAC) deployments.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Method-Specific Java Access Control via RMI Proxy Objects Using Annotations.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Social Learning Applications in Resource Constrained Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Towards Formal Verification of Role-Based Access Control Policies.
IEEE Trans. Dependable Secur. Comput., 2008

A Correctness Proof of a Mesh Security Architecture.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

Conditional Payments for Computing Markets.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
On mutually exclusive roles and separation-of-duty.
ACM Trans. Inf. Syst. Secur., 2007

A theory for comparing the expressive power of access control models.
J. Comput. Secur., 2007

A Proof of Security of a Mesh Security Architecture.
IACR Cryptol. ePrint Arch., 2007

Resolving the Micropayment Problem.
Computer, 2007

2006
Security analysis in role-based access control.
ACM Trans. Inf. Syst. Secur., 2006

2005
On Safety in Discretionary Access Control.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

2004
Comparing the expressive power of access control models.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2001
Connectivity provisioning with security attributes.
Softw. Focus, 2001

1999
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999


  Loading...