Aravind Prakash
According to our database1,
Aravind Prakash
authored at least 28 papers
between 2012 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the IEEE Gaming, Entertainment, and Media Conference, 2023
2022
Proceedings of the Secure IT Systems, 2022
Proceedings of the 29th IEEE International Conference on High Performance Computing, 2022
2021
Track Conventions, Not Attack Signatures: Fortifying X86 ABI and System Call Interfaces to Mitigate Code Reuse Attacks.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
CoRR, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
2017
IEEE Trans. Software Eng., 2017
A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution.
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
IEEE Trans. Cloud Comput., 2014
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform.
Proceedings of the International Symposium on Software Testing and Analysis, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Manipulating semantic values in kernel data structures: Attack assessments and implications.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012