Meera Sridhar

Orcid: 0000-0002-7508-5024

According to our database1, Meera Sridhar authored at least 22 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DAEDALUS: Defense Against Firmware ROP Exploits Using Stochastic Software Diversity.
CoRR, 2024

2023
Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

From DDoSim to DDoSimQ: Enhancing DDoS Attack Simulations Through Full System Emulation.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023

2022
Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning.
Comput. Secur., 2022

Criminal Investigations: An Interactive Experience to Improve Student Engagement and Achievement in Cybersecurity Courses.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

2021
A fine-grained classification and security analysis of web-based virtual machine vulnerabilities.
Comput. Secur., 2021

HybriDiagnostics: Evaluating Security Issues in Hybrid SmartHome Companion Apps.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Criminal Investigations: An InteractiveExperience to Improve Student Engagement and Achievement in Cybersecurity courses.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

HIJaX: Human Intent JavaScript XSS Generator.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
A multi-party, fine-grained permission and policy enforcement framework for hybrid mobile applications.
J. Comput. Secur., 2020

Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

A Survey of In-Lined Reference Monitors: Policies, Applications and Challenges.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Inscription: Thwarting ActionScript Web Attacks From Within.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
HybridGuard: A Principal-Based Permission and Fine-Grained Policy Enforcement Framework for Web-Based Mobile Applications.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

2015
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content.
IEEE Trans. Dependable Secur. Comput., 2015

2014
Hippocratic binary instrumentation: First do no harm.
Sci. Comput. Program., 2014

2012
Aspect-Oriented Runtime Monitor Certification.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

2011
Flexible in-lined reference monitor certification: challenges and future directions.
Proceedings of the 5th ACM Workshop Programming Languages meets Program Verification, 2011

2010
Model-Checking In-Lined Reference Monitors.
Proceedings of the Verification, 2010

ActionScript In-Lined Reference Monitoring in Prolog.
Proceedings of the Practical Aspects of Declarative Languages, 2010

2009
ActionScript bytecode verification with co-logic programming.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009


  Loading...