팔로우
VN Venkatakrishnan
제목
인용
인용
연도
Holmes: real-time apt detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019
2932019
Blueprint: Robust prevention of cross-site scripting attacks for existing browsers
M Ter Louw, VN Venkatakrishnan
2009 30th IEEE symposium on security and privacy, 331-346, 2009
2922009
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
2772003
XSS-GUARD: precise dynamic prevention of cross-site scripting attacks
P Bisht, V Venkatakrishnan
Detection of Intrusions and Malware, and Vulnerability Assessment, 23-43, 2008
2682008
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
P Bisht, P Madhusudan, VN Venkatakrishnan
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-39, 2010
2182010
Implicit solvers for unstructured meshes
V Venkatakrishnan, DJ Mavriplis
Journal of computational Physics 105 (1), 83-91, 1993
2031993
CANDID: preventing SQL injection attacks using dynamic candidate evaluations
S Bandhakavi, P Bisht, P Madhusudan, VN Venkatakrishnan
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1992007
Fast memory-efficient anomaly detection in streaming heterogeneous graphs
E Manzoor, SM Milajerdi, L Akoglu
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge …, 2016
1852016
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements.
M Ter Louw, KT Ganesh, VN Venkatakrishnan
USENIX Security Symposium, 371-388, 2010
1652010
On the role and challenges of CFD in the aerospace industry
PR Spalart, V Venkatakrishnan
The Aeronautical Journal 120 (1223), 209-232, 2016
1542016
Isolated program execution: An application transparent approach for executing untrusted programs
Z Liang, VN Venkatakrishnan, R Sekar
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
1512003
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
USENIX Security Symposium, 487-504, 2017
1472017
Notamper: automatic blackbox detection of parameter tampering opportunities in web applications
P Bisht, T Hinrichs, N Skrupsky, R Bobrowicz, VN Venkatakrishnan
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1222010
Enhancing web browser security against malware extensions
M Ter Louw, JS Lim, VN Venkatakrishnan
Journal in Computer Virology 4, 179-195, 2008
1182008
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting
SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1112019
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
W Sun, Z Liang, VN Venkatakrishnan, R Sekar
NDSS, 2005
1052005
XMC: A logic-programming-based verification toolset
CR Ramakrishnan, IV Ramakrishnan, SA Smolka, Y Dong, X Du, ...
Computer Aided Verification: 12th International Conference, CAV 2000 …, 2000
982000
A framework for building privacy-conscious composite web services
W Xu, VN Venkatakrishnan, R Sekar, IV Ramakrishnan
2006 IEEE International Conference on Web Services (ICWS'06), 655-662, 2006
972006
Waptec: whitebox analysis of web applications for parameter tampering exploit construction
P Bisht, T Hinrichs, N Skrupsky, VN Venkatakrishnan
Proceedings of the 18th ACM conference on Computer and communications …, 2011
952011
Preventing information leaks through shadow executions
R Capizzi, A Longo, VN Venkatakrishnan, AP Sistla
2008 Annual Computer Security Applications Conference (ACSAC), 322-331, 2008
922008
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20