Vinod Ganapathy

According to our database1, Vinod Ganapathy authored at least 54 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A framework for the extraction of Deep Neural Networks by leveraging public data.
CoRR, 2019

Regulating Drones in Restricted Spaces.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

2018
Secure, Consistent, and High-Performance Memory Snapshotting.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
EnGarde: Mutually-Trusted Inspection of SGX Enclaves.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Compiler Optimizations with Retrofitting Transformations: Is there a Semantic Mismatch?
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

2016
Exploring infrastructure support for app-based services on cloud platforms.
Computers & Security, 2016

Detecting plagiarized mobile apps using API birthmarks.
Autom. Softw. Eng., 2016

Regulating ARM TrustZone Devices in Restricted Spaces.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

2015
Testing Cross-Platform Mobile App Development Frameworks (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

A novel algorithm for pattern matching with back references.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Reflections on the Self-service Cloud Computing Project.
Proceedings of the Information Systems Security - 11th International Conference, 2015

2014
Efficient runtime-enforcement techniques for policy weaving.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Retargetting Legacy Browser Extensions to Modern Extension Frameworks.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

On the Control Plane of a Self-service Cloud Platform.
Proceedings of the ACM Symposium on Cloud Computing, 2014

2013
Monitoring Integrity Using Limited Local Memory.
IEEE Trans. Information Forensics and Security, 2013

Inferring likely mappings between APIs.
Proceedings of the 35th International Conference on Software Engineering, 2013

2012
An Analysis of the Mozilla Jetpack Extension Framework.
Proceedings of the ECOOP 2012 - Object-Oriented Programming, 2012

Enhancing JavaScript with Transactions.
Proceedings of the ECOOP 2012 - Object-Oriented Programming, 2012

Short paper: enhancing users' comprehension of android permissions.
Proceedings of the SPSM'12, 2012

Towards a richer model of cloud app markets.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

Leveraging "choice" to automate authorization hook placement.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Self-service cloud computing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Fast submatch extraction using OBDDs.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2012

2011
Dynamic Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Detecting Kernel-Level Rootkits Using Data Structure Invariants.
IEEE Trans. Dependable Sec. Comput., 2011

Fast, memory-efficient regular expression matching with NFA-OBDDs.
Computer Networks, 2011

Enhancing Mobile Malware Detection with Social Collaboration.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access.
Proceedings of the Security and Privacy in Communication Networks, 2011

Monitoring Data Structures Using Hardware Transactional Memory.
Proceedings of the Runtime Verification - Second International Conference, 2011

Security versus energy tradeoffs in host-based mobile malware detection.
Proceedings of the 9th International Conference on Mobile Systems, 2011

2010
Rootkits on smart phones: attacks, implications and opportunities.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Core-Local Memory Assisted Protection.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

The case for JavaScript transactions: position paper.
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010

2009
Working set-based access control for network file systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Privately querying location-based services with SybilQuery.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

Detecting Identity Spoofs in IEEE 802.11e Wireless Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Privacy-aware identity management for client-side mashup applications.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

Analyzing Information Flow in JavaScript-Based Browser Extensions.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Protecting Commodity Operating System Kernels from Vulnerable Device Drivers.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Enforcing authorization policies using transactional memory introspection.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

The design and implementation of microdrivers.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

OMOS: A Framework for Secure Communication in Mashup Applications.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Automatic Inference and Enforcement of Kernel Data Structure Invariants.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Microdrivers: A New Architecture for Device Drivers.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
Retrofitting Legacy Code for Authorization Policy Enforcement.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

HeapMD: identifying heap-based bugs using anomaly detection.
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006

NetSpy: Automatic Generation of Spyware Signatures for NIDS.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Automatic discovery of API-level exploits.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

An auctioning reputation system based on anomaly.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Automatic placement of authorization hooks in the linux security modules framework.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2003
Buffer overrun detection using linear programming and static analysis.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Slicing Synchronous Reactive Programs.
Electr. Notes Theor. Comput. Sci., 2002


  Loading...