The SCEAS System
Navigation Menu

Search the dblp DataBase


V. N. Venkatakrishnan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
    Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:182-191 [Conf]
  2. C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka, Yifei Dong, Xiaoqun Du, Abhik Roychoudhury, V. N. Venkatakrishnan
    XMC: A Logic-Programming-Based Verification Toolset. [Citation Graph (0, 0)][DBLP]
    CAV, 2000, pp:576-580 [Conf]
  3. V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar
    Provably Correct Runtime Enforcement of Non-interference Properties. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:332-351 [Conf]
  4. Wei Xu, V. N. Venkatakrishnan, R. Sekar, I. V. Ramakrishnan
    A Framework for Building Privacy-Conscious Composite Web Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:655-662 [Conf]
  5. V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang
    An Approach for Secure Software Installation. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:219-226 [Conf]
  6. Doo San Sim, V. N. Venkatakrishnan
    SUEZ: A Distributed Safe Execution Environment for System Administration Trials. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:161-173 [Conf]
  7. Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
    One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  8. Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep Bhatkar
    SELF: a transparent security extension for ELF binaries. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:29-38 [Conf]
  9. R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney
    Model-carrying code: a practical approach for safe execution of untrusted applications. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:15-28 [Conf]
  10. Wei Xu, R. Sekar, I. V. Ramakrishnan, V. N. Venkatakrishnan
    An approach for realizing privacy-preserving web-based services. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:1014-1015 [Conf]
  11. Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan
    Data Sandboxing: A Technique for Enforcing Confidentiality Policies. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:223-234 [Conf]
  12. Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan
    Extensible Web Browser Security. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:1-19 [Conf]

  13. Preventing Information Leaks through Shadow Executions. [Citation Graph (, )][DBLP]

  14. CANDID: preventing sql injection attacks using dynamic candidate evaluations. [Citation Graph (, )][DBLP]

  15. CMV: automatic verification of complete mediation for java virtual machines. [Citation Graph (, )][DBLP]

  16. Expanding Malware Defense by Securing Software Installations. [Citation Graph (, )][DBLP]

  17. XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. [Citation Graph (, )][DBLP]

  18. Automatically Preparing Safe SQL Queries. [Citation Graph (, )][DBLP]

  19. Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002