The SCEAS System
Navigation Menu

Search the dblp DataBase


Vinod Ganapathy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Trishul M. Chilimbi, Vinod Ganapathy
    HeapMD: identifying heap-based bugs using anomaly detection. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2006, pp:219-228 [Conf]
  2. Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek
    Buffer overrun detection using linear programming and static analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:345-354 [Conf]
  3. Vinod Ganapathy, Trent Jaeger, Somesh Jha
    Automatic placement of authorization hooks in the linux security modules framework. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:330-339 [Conf]
  4. Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd
    An auctioning reputation system based on anomaly. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:270-279 [Conf]
  5. Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant
    Automatic discovery of API-level exploits. [Citation Graph (0, 0)][DBLP]
    ICSE, 2005, pp:312-321 [Conf]
  6. Vinod Ganapathy, David King, Trent Jaeger, Somesh Jha
    Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. [Citation Graph (0, 0)][DBLP]
    ICSE, 2007, pp:458-467 [Conf]
  7. Vinod Ganapathy, Trent Jaeger, Somesh Jha
    Retrofitting Legacy Code for Authorization Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:214-229 [Conf]
  8. Vinod Ganapathy, S. Ramesh
    Slicing Synchronous Reactive Programs. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2002, v:65, n:5, pp:- [Journal]
  9. Hao Wang, Somesh Jha, Vinod Ganapathy
    NetSpy: Automatic Generation of Spyware Signatures for NIDS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:99-108 [Conf]

  10. OMOS: A Framework for Secure Communication in Mashup Applications. [Citation Graph (, )][DBLP]

  11. Automatic Inference and Enforcement of Kernel Data Structure Invariants. [Citation Graph (, )][DBLP]

  12. Analyzing Information Flow in JavaScript-Based Browser Extensions. [Citation Graph (, )][DBLP]

  13. Protecting Commodity Operating System Kernels from Vulnerable Device Drivers. [Citation Graph (, )][DBLP]

  14. The design and implementation of microdrivers. [Citation Graph (, )][DBLP]

  15. Enforcing authorization policies using transactional memory introspection. [Citation Graph (, )][DBLP]

  16. Privacy-aware identity management for client-side mashup applications. [Citation Graph (, )][DBLP]

  17. Microdrivers: A New Architecture for Device Drivers. [Citation Graph (, )][DBLP]

  18. Privately querying location-based services with SybilQuery. [Citation Graph (, )][DBLP]

  19. Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams. [Citation Graph (, )][DBLP]

  20. Working set-based access control for network file systems. [Citation Graph (, )][DBLP]

  21. Detecting Identity Spoofs in IEEE 802.11e Wireless Networks. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002