|
Search the dblp DataBase
V. N. Venkatakrishnan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:182-191 [Conf]
- C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka, Yifei Dong, Xiaoqun Du, Abhik Roychoudhury, V. N. Venkatakrishnan
XMC: A Logic-Programming-Based Verification Toolset. [Citation Graph (0, 0)][DBLP] CAV, 2000, pp:576-580 [Conf]
- V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar
Provably Correct Runtime Enforcement of Non-interference Properties. [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:332-351 [Conf]
- Wei Xu, V. N. Venkatakrishnan, R. Sekar, I. V. Ramakrishnan
A Framework for Building Privacy-Conscious Composite Web Services. [Citation Graph (0, 0)][DBLP] ICWS, 2006, pp:655-662 [Conf]
- V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang
An Approach for Secure Software Installation. [Citation Graph (0, 0)][DBLP] LISA, 2002, pp:219-226 [Conf]
- Doo San Sim, V. N. Venkatakrishnan
SUEZ: A Distributed Safe Execution Environment for System Administration Trials. [Citation Graph (0, 0)][DBLP] LISA, 2006, pp:161-173 [Conf]
- Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep Bhatkar
SELF: a transparent security extension for ELF binaries. [Citation Graph (0, 0)][DBLP] NSPW, 2003, pp:29-38 [Conf]
- R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney
Model-carrying code: a practical approach for safe execution of untrusted applications. [Citation Graph (0, 0)][DBLP] SOSP, 2003, pp:15-28 [Conf]
- Wei Xu, R. Sekar, I. V. Ramakrishnan, V. N. Venkatakrishnan
An approach for realizing privacy-preserving web-based services. [Citation Graph (0, 0)][DBLP] WWW (Special interest tracks and posters), 2005, pp:1014-1015 [Conf]
- Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan
Data Sandboxing: A Technique for Enforcing Confidentiality Policies. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:223-234 [Conf]
- Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan
Extensible Web Browser Security. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:1-19 [Conf]
Preventing Information Leaks through Shadow Executions. [Citation Graph (, )][DBLP]
CANDID: preventing sql injection attacks using dynamic candidate evaluations. [Citation Graph (, )][DBLP]
CMV: automatic verification of complete mediation for java virtual machines. [Citation Graph (, )][DBLP]
Expanding Malware Defense by Securing Software Installations. [Citation Graph (, )][DBLP]
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. [Citation Graph (, )][DBLP]
Automatically Preparing Safe SQL Queries. [Citation Graph (, )][DBLP]
Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|