Aravind Machiry

Orcid: 0000-0001-5124-6818

According to our database1, Aravind Machiry authored at least 46 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TYGR: Type Inference on Stripped Binaries using Graph Neural Networks.
Proceedings of the 33rd USENIX Security Symposium, 2024

Aunor: Converting Rust crates to [no_std] at scale.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

Rust for Embedded Systems: Current State and Open Problems.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Fuzzing API Error Handling Behaviors using Coverage Guided Fault Injection.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

On the Effectiveness of Large Language Models for GitHub Workflows.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Rust for Embedded Systems: Current State, Challenges and Open Problems.
CoRR, 2023

An Empirical Study on the Use of Static Analysis Tools in Open Source Embedded Software.
CoRR, 2023

CheckedCBox: Type Directed Program Partitioning with Checked C for Incremental Spatial Memory Safety.
CoRR, 2023

ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions.
Proceedings of the 32nd USENIX Security Symposium, 2023

TEEzz: Fuzzing Trusted Applications on COTS Android Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Towards Automated Identification of Layering Violations in Embedded Applications (WIP).
Proceedings of the 24th ACM SIGPLAN/SIGBED International Conference on Languages, 2023

Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Towards Rehosting Embedded Applications as Linux Applications.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Security Properties of Virtual Remotes and SPOOKing their violations.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
C to checked C by 3c.
Proc. ACM Program. Lang., 2022

Characterizing the Security of Github CI Workflows.
Proceedings of the 31st USENIX Security Symposium, 2022

Cornucopia : A Framework for Feedback Guided Generation of Binaries.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Hybrid Pruning: Towards Precise Pointer and Taint Analysis.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

PacJam: Securing Dependencies Continuously via Package-Oriented Debloating.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Toward a secure crowdsourced location tracking system.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

ARBITRAR: User-Guided API Misuse Detection.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
Proceedings of the Checkmate@CCS 2021, 2021

Conware: Automated Modeling of Hardware Peripherals.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Protecting Smart Devices from the Bottom-up.
PhD thesis, 2020

Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

SPIDER: Enabling Fast Patch Propagation In Related Software Repositories.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Exploring Abstraction Functions in Fuzzing.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Toward the Analysis of Embedded Firmware through Automated Re-hosting.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Mechanical Phish: Resilient Autonomous Hacking.
IEEE Secur. Priv., 2018

Detecting Deceptive Reviews Using Generative Adversarial Networks.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Broken Fingers: On the Usage of the Fingerprint API in Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
BootStomp: On the Security of Bootloaders in Mobile Devices.
Proceedings of the 26th USENIX Security Symposium, 2017

DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers.
Proceedings of the 26th USENIX Security Symposium, 2017

Ramblr: Making Reassembly Great Again.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
CLAPP: characterizing loops in Android applications (invited talk).
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015

CLAPP: characterizing loops in Android applications.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

2013
Dynodroid: an input generation system for Android apps.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013


  Loading...