|
Search the dblp DataBase
Vinod Ganapathy:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Trishul M. Chilimbi, Vinod Ganapathy
HeapMD: identifying heap-based bugs using anomaly detection. [Citation Graph (0, 0)][DBLP] ASPLOS, 2006, pp:219-228 [Conf]
- Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek
Buffer overrun detection using linear programming and static analysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:345-354 [Conf]
- Vinod Ganapathy, Trent Jaeger, Somesh Jha
Automatic placement of authorization hooks in the linux security modules framework. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:330-339 [Conf]
- Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd
An auctioning reputation system based on anomaly. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:270-279 [Conf]
- Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant
Automatic discovery of API-level exploits. [Citation Graph (0, 0)][DBLP] ICSE, 2005, pp:312-321 [Conf]
- Vinod Ganapathy, David King, Trent Jaeger, Somesh Jha
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. [Citation Graph (0, 0)][DBLP] ICSE, 2007, pp:458-467 [Conf]
- Vinod Ganapathy, Trent Jaeger, Somesh Jha
Retrofitting Legacy Code for Authorization Policy Enforcement. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:214-229 [Conf]
- Vinod Ganapathy, S. Ramesh
Slicing Synchronous Reactive Programs. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2002, v:65, n:5, pp:- [Journal]
- Hao Wang, Somesh Jha, Vinod Ganapathy
NetSpy: Automatic Generation of Spyware Signatures for NIDS. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:99-108 [Conf]
OMOS: A Framework for Secure Communication in Mashup Applications. [Citation Graph (, )][DBLP]
Automatic Inference and Enforcement of Kernel Data Structure Invariants. [Citation Graph (, )][DBLP]
Analyzing Information Flow in JavaScript-Based Browser Extensions. [Citation Graph (, )][DBLP]
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers. [Citation Graph (, )][DBLP]
The design and implementation of microdrivers. [Citation Graph (, )][DBLP]
Enforcing authorization policies using transactional memory introspection. [Citation Graph (, )][DBLP]
Privacy-aware identity management for client-side mashup applications. [Citation Graph (, )][DBLP]
Microdrivers: A New Architecture for Device Drivers. [Citation Graph (, )][DBLP]
Privately querying location-based services with SybilQuery. [Citation Graph (, )][DBLP]
Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams. [Citation Graph (, )][DBLP]
Working set-based access control for network file systems. [Citation Graph (, )][DBLP]
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|