VN Venkatakrishnan
Title
Cited by
Cited by
Year
Aerodynamic design optimization on unstructured grids with a continuous adjoint formulation
WK Anderson, V Venkatakrishnan
Computers & Fluids 28 (4-5), 443-480, 1999
5771999
Blueprint: Robust prevention of cross-site scripting attacks for existing browsers
M Ter Louw, VN Venkatakrishnan
2009 30th IEEE symposium on security and privacy, 331-346, 2009
2682009
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
2682003
XSS-GUARD: precise dynamic prevention of cross-site scripting attacks
P Bisht, V Venkatakrishnan
Detection of Intrusions and Malware, and Vulnerability Assessment, 23-43, 2008
2472008
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
P Bisht, P Madhusudan, VN Venkatakrishnan
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-39, 2010
1962010
Implicit solvers for unstructured meshes
V Venkatakrishnan, DJ Mavriplis
Journal of computational Physics 105 (1), 83-91, 1993
1911993
CANDID: preventing SQL injection attacks using dynamic candidate evaluations
S Bandhakavi, P Bisht, P Madhusudan, VN Venkatakrishnan
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1862007
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements.
M Ter Louw, KT Ganesh, VN Venkatakrishnan
USENIX Security Symposium, 371-388, 2010
1532010
Isolated program execution: An application transparent approach for executing untrusted programs
Z Liang, VN Venkatakrishnan, R Sekar
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
1422003
Enhancing web browser security against malware extensions
M Ter Louw, JS Lim, VN Venkatakrishnan
Journal in Computer Virology 4 (3), 179-195, 2008
1072008
Notamper: automatic blackbox detection of parameter tampering opportunities in web applications
P Bisht, T Hinrichs, N Skrupsky, R Bobrowicz, VN Venkatakrishnan
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1052010
Holmes: real-time apt detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019
1032019
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
W Sun, Z Liang, VN Venkatakrishnan, R Sekar
NDSS, 2005
1002005
Fast memory-efficient anomaly detection in streaming heterogeneous graphs
E Manzoor, SM Milajerdi, L Akoglu
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge …, 2016
972016
A framework for building privacy-conscious composite web services
W Xu, VN Venkatakrishnan, R Sekar, IV Ramakrishnan
2006 IEEE International Conference on Web Services (ICWS'06), 655-662, 2006
972006
XMC: A logic-programming-based verification toolset
CR Ramakrishnan, IV Ramakrishnan, SA Smolka, Y Dong, X Du, ...
International Conference on Computer Aided Verification, 576-580, 2000
932000
On the role and challenges of CFD in the aerospace industry
PR Spalart, V Venkatakrishnan
The Aeronautical Journal 120 (1223), 209, 2016
922016
Waptec: whitebox analysis of web applications for parameter tampering exploit construction
P Bisht, T Hinrichs, N Skrupsky, VN Venkatakrishnan
Proceedings of the 18th ACM conference on Computer and communications …, 2011
922011
Preventing information leaks through shadow executions
R Capizzi, A Longo, VN Venkatakrishnan, AP Sistla
2008 Annual Computer Security Applications Conference (ACSAC), 322-331, 2008
822008
Provably correct runtime enforcement of non-interference properties
VN Venkatakrishnan, W Xu, DC DuVarney, R Sekar
International Conference on Information and Communications Security, 332-351, 2006
662006
The system can't perform the operation now. Try again later.
Articles 1–20