Ashish Gehani

Orcid: 0000-0002-3940-2467

According to our database1, Ashish Gehani authored at least 89 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Kondo: Efficient Provenance-Driven Data Debloating.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

6G-XSec: Explainable Edge Security for Emerging OpenRAN Architectures.
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, 2024

SoK: Software Debloating Landscape and Future Directions.
Proceedings of the 2024 Workshop on Forming an Ecosystem Around Software Transformation, 2024

Access-Based Carving of Data for Efficient Reproducibility of Containers.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2023
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning.
IEEE Trans. Software Eng., April, 2023

OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-Program Specialization.
Commun. ACM, 2023

IOSPReD: I/O Specialized Packaging of Reduced Datasets and Data-Intensive Applications for Efficient Reproducibility.
IEEE Access, 2023

Querying Container Provenance.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Towards Reproducible Ransomware Analysis.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

Evaluating Container Debloaters.
Proceedings of the IEEE Secure Development Conference, 2023

BLADE: Towards Scalable Source Code Debloating.
Proceedings of the IEEE Secure Development Conference, 2023

Analyzing Discrepancies in Whole-Network Provenance.
Proceedings of the Critical Infrastructure Protection XVII, 2023

SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Trimmer: An Automated System for Configuration-Based Software Debloating.
IEEE Trans. Software Eng., 2022

OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-program Specialization: Leveraging scalable pointer analysis, value analysis, and dynamic analysis.
ACM Queue, 2022

CHEX: Multiversion Replay with Ordered Checkpoints.
Proc. VLDB Endow., 2022

Trimmer: Context-Specific Code Reduction.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

PACED: Provenance-based Automated Container Escape Detection.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022

Provenance-based Workflow Diagnostics Using Program Specification.
Proceedings of the 29th IEEE International Conference on High Performance Computing, 2022

2021
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
IEEE Trans. Inf. Forensics Secur., 2021

Digging into Big Provenance (with SPADE): A user interface for querying provenance.
ACM Queue, 2021

Digging into big provenance (with SPADE).
Commun. ACM, 2021

CLARION: Sound and Clear Provenance Tracking for Microservice Deployments.
Proceedings of the 30th USENIX Security Symposium, 2021

Practical Provenance Privacy Protection.
Proceedings of the 13th International Workshop on Theory and Practice of Provenance, 2021

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Efficient Provenance Alignment in Reproduced Executions.
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020

Integrity Checking and Abnormality Detection of Provenance Records.
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020

Discrepancy Detection in Whole Network Provenance.
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020

Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

MiDas: Containerizing Data-Intensive Applications with I/O Specialization.
Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems, 2020

Xanthus: Push-button Orchestration of Host Provenance Data Collection.
Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems, 2020

2019
Mining Data Provenance to Detect Advanced Persistent Threats.
Proceedings of the 11th International Workshop on Theory and Practice of Provenance, 2019

ProvMark: A Provenance Expressiveness Benchmarking System.
Proceedings of the 20th International Middleware Conference, 2019

Data Mining-Based Ethereum Fraud Detection.
Proceedings of the IEEE International Conference on Blockchain, 2019

Longitudinal Analysis of Misuse of Bitcoin.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

TRIMMER: application specialization for code debloating.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Streaming Provenance Compression.
Proceedings of the Provenance and Annotation of Data and Processes, 2018

Wholly!: A Build System For The Modern Software Stack.
Proceedings of the Formal Methods for Industrial Critical Systems, 2018

Efficiently Validating Aggregated IoT Data Integrity.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
Engineering Academic Software (Dagstuhl Perspectives Workshop 16252).
Dagstuhl Manifestos, 2017

Expressiveness Benchmarking for System-Level Provenance.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017

Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Low-Leakage Secure Search for Boolean Expressions.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Scaling SPADE to "Big Provenance".
Proceedings of the 8th USENIX Workshop on the Theory and Practice of Provenance, 2016

To route or to secure: Tradeoffs in ICNs over MANETs.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

Trade-Offs in Automatic Provenance Capture.
Proceedings of the Provenance and Annotation of Data and Processes, 2016

Energy efficient, context-aware cache coding for mobile information-centric networks.
Proceedings of the 10th ACM International Conference on Distributed and Event-based Systems, 2016

2015
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2015

Automated software winnowing.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Provenance Integration.
Proceedings of the 6th Workshop on the Theory and Practice of Provenance, 2014

PIDGIN: privacy-preserving interest and content sharing in opportunistic networks.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Analytical models for risk-based intrusion response.
Comput. Networks, 2013

Declaratively Processing Provenance Metadata.
Proceedings of the 5th Workshop on the Theory and Practice of Provenance, 2013

Android Provenance: Diagnosing Device Disorders.
Proceedings of the 5th Workshop on the Theory and Practice of Provenance, 2013

Maximizing availability of content in disruptive environments by cross-layer optimization.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Optimized Rollback and Re-computation.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Cross-platform provenance.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
Towards Automated Collection of Application-Level Data Provenance.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012

SPADE: Support for Provenance Auditing in Distributed Environments.
Proceedings of the Middleware 2012, 2012

2011
Ensuring Security and Availability through Model-Based Cross-Layer Adaptation.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

Identifying the provenance of correlated anomalies.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Policy-Based Integration of Provenance Metadata.
Proceedings of the POLICY 2011, 2011

On the (f)utility of untrusted data sanitization.
Proceedings of the MILCOM 2011, 2011

Algorithmic Aspects of Risk Management.
Proceedings of the Formal Modeling: Actors, Open Systems, Biological Systems, 2011

2010
Performance and extension of user space file systems.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies.
Proceedings of the POLICY 2010, 2010

Efficient querying of distributed provenance stores.
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010

Mendel: efficiently verifying the lineage of data modified in multiple trust domains.
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010

Fine-grained tracking of Grid infections.
Proceedings of the 2010 11th IEEE/ACM International Conference on Grid Computing, 2010

Tracking and Sketching Distributed Data Provenance.
Proceedings of the Sixth International Conference on e-Science, 2010

2009
System Support for Forensic Inference.
Proceedings of the Advances in Digital Forensics V, 2009

Steps Toward Managing Lineage Metadata in Grid Clusters.
Proceedings of the First Workshop on the Theory and Practice of Provenance, 2009

2008
Parameterized access control: from design to prototype.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
Parameterizing access control for heterogeneous peer-to-peer applications.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

VEIL: A System for Certifying Video Provenance.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007

Super-Resolution Video Analysis for Forensic Investigations.
Proceedings of the Advances in Digital Forensics III, 2007

Automated Storage Reclamation Using Temporal Importance Annotations.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Bonsai: Balanced Lineage Authentication.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Augmenting storage with an intrusion response primitive to ensure the security of critical data.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

PAST: Probabilistic Authentication of Sensor Timestamps.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Paranoid: A Global Secure File Access Control System.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
RheoStat: Real-Time Risk Management.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

DNA-based Cryptography.
Proceedings of the Aspects of Molecular Computing, 2004


  Loading...