Vinod Ganapathy
Vinod Ganapathy
Professor of Computer Science, Indian Institute of Science Bangalore
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Automatic inference and enforcement of kernel data structure invariants
A Baliga, V Ganapathy, L Iftode
2008 Annual Computer Security Applications Conference (ACSAC), 77-86, 2008
Rootkits on smart phones: attacks, implications and opportunities
J Bickford, R O'Hare, A Baliga, V Ganapathy, L Iftode
Proceedings of the eleventh workshop on mobile computing systems …, 2010
Analyzing information flow in JavaScript-based browser extensions
M Dhawan, V Ganapathy
2009 Annual Computer Security Applications Conference, 382-391, 2009
Privately querying location-based services with sybilquery
P Shankar, V Ganapathy, L Iftode
Proceedings of the 11th international conference on Ubiquitous computing, 31-40, 2009
Self-service cloud computing
S Butt, HA Lagar-Cavilla, A Srivastava, V Ganapathy
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
The design and implementation of microdrivers
V Ganapathy, MJ Renzelmann, A Balakrishnan, MM Swift, S Jha
ACM Sigplan Notices 43 (3), 168-178, 2008
Buffer overrun detection using linear programming and static analysis
V Ganapathy, S Jha, D Chandler, D Melski, D Vitek
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Activethief: Model extraction using active learning and unannotated public data
S Pal, Y Gupta, A Shukla, A Kanade, S Shevade, V Ganapathy
Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 865-872, 2020
K2C: Cryptographic cloud storage with lazy revocation and anonymous access
S Zarandioon, D Yao, V Ganapathy
International Conference on Security and Privacy in Communication Systems, 59-76, 2011
Automatic placement of authorization hooks in the Linux security modules framework
V Ganapathy, T Jaeger, S Jha
Proceedings of the 12th ACM conference on Computer and communications …, 2005
NetSpy: Automatic generation of spyware signatures for NIDS
H Wang, S Jha, V Ganapathy
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 99-108, 2006
Retrofitting legacy code for authorization policy enforcement
V Ganapathy, T Jaeger, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-229, 2006
An auctioning reputation system based on anomaly
S Rubin, M Christodorescu, V Ganapathy, JT Giffin, L Kruger, H Wang, ...
Proceedings of the 12th ACM conference on computer and communications …, 2005
Improving NFA-based signature matching using ordered binary decision diagrams
L Yang, R Karim, V Ganapathy, R Smith
International Workshop on Recent Advances in Intrusion Detection, 58-78, 2010
Faastlane: Accelerating {Function-as-a-Service} Workflows
S Kotni, A Nayak, V Ganapathy, A Basu
2021 USENIX Annual Technical Conference (USENIX ATC 21), 805-820, 2021
Inferring likely mappings between APIs
A Gokhale, V Ganapathy, Y Padmanaban
2013 35th International Conference on Software Engineering (ICSE), 82-91, 2013
Security versus energy tradeoffs in host-based mobile malware detection
J Bickford, HA Lagar-Cavilla, A Varshavsky, V Ganapathy, L Iftode
Proceedings of the 9th international conference on Mobile systems …, 2011
Automatic discovery of API-level exploits
V Ganapathy, SA Seshia, S Jha, TW Reps, RE Bryant
Proceedings of the 27th international conference on Software engineering …, 2005
An analysis of the mozilla jetpack extension framework
R Karim, M Dhawan, V Ganapathy, C Shan
ECOOP 2012–Object-Oriented Programming: 26th European Conference, Beijing …, 2012
Regulating arm trustzone devices in restricted spaces
F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20