Siddharth Prakash Rao

Orcid: 0000-0001-8656-1877

According to our database1, Siddharth Prakash Rao authored at least 17 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analyzing Communications and Software Systems Security.
PhD thesis, 2023

Threat modeling framework for mobile communication systems.
Comput. Secur., 2023

Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

2022
Usability and Security of Trusted Platform Module (TPM) Library APIs.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

2021
Adversarial Trends in Mobile Communication Systems: From Attack Patterns to Potential Defenses Strategies.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

On Adoptability and Use Case Exploration of Threat Modeling for Mobile Communication Systems.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Threat modeling framework for mobile communication systems.
CoRR, 2020

XSS Vulnerabilities in Cloud-Application Add-Ons.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Client-Side Vulnerabilities in Commercial VPNs.
Proceedings of the Secure IT Systems, 2019

Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet.
Proceedings of the 12th European Workshop on Systems Security, 2019

2018
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer.
Proceedings of the 27th USENIX Security Symposium, 2018

2016
Studying the Indian mobile Internet networks: Chota recharge and the chota Internet.
CoRR, 2016

User location tracking attacks for LTE networks using the interworking functionality.
Proceedings of the 2016 IFIP Networking Conference, 2016

Privacy in LTE networks.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

We know where you are!
Proceedings of the 8th International Conference on Cyber Conflict, 2016

2015
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Turning Bitcoins into the Best-coins.
CoRR, 2014


  Loading...