Divya Muthukumaran

According to our database1, Divya Muthukumaran authored at least 17 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
SGX-LKL: Securing the Host OS Interface for Trusted Execution.
CoRR, 2019

2018
LibSEAL: revealing service integrity violations using trusted execution.
Proceedings of the Thirteenth EuroSys Conference, 2018

2017
Glamdring: Automatic Application Partitioning for Intel SGX.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

TrustJS: Trusted Client-side Execution of JavaScript.
Proceedings of the 10th European Workshop on Systems Security, 2017

2016
Maintaining Authorization Hook Placements Across Program Versions.
Proceedings of the IEEE Cybersecurity Development, 2016

SCONE: Secure Linux Containers with Intel SGX.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

BrowserFlow: Imprecise Data Flow Tracking to Prevent Accidental Data Disclosure.
Proceedings of the 17th International Middleware Conference, Trento, Italy, December 12, 2016

2015
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Producing Hook Placements to Enforce Expected Access Control Policies.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
CloudSafetyNet: Detecting Data Leakage between Cloud Tenants.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2012
Leveraging "choice" to automate authorization hook placement.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Transforming commodity security policies to enforce Clark-Wilson integrity.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Protecting the integrity of trusted applications in mobile phone systems.
Secur. Commun. Networks, 2011

2010
Cut me some security.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Automating Security Mediation Placement.
Proceedings of the Programming Languages and Systems, 2010

2008
Measuring integrity on mobile phone systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008


  Loading...