Meera Sridhar

Orcid: 0000-0002-7508-5024

According to our database1, Meera Sridhar authored at least 25 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LLM-assisted Physical Invariant Extraction for Cyber-Physical Systems Anomaly Detection.
CoRR, 2024

DAEDALUS: Defense Against Firmware ROP Exploits Using Stochastic Software Diversity.
CoRR, 2024

Breaking the Virtual Barrier of Exploit Chain Attacks in XR Systems.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality Adjunct, 2024

Poster: TAPChecker: Model Checking in Trigger-Action Rules Generation Using Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

From DDoSim to DDoSimQ: Enhancing DDoS Attack Simulations Through Full System Emulation.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023

2022
Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning.
Comput. Secur., 2022

Criminal Investigations: An Interactive Experience to Improve Student Engagement and Achievement in Cybersecurity Courses.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

2021
A fine-grained classification and security analysis of web-based virtual machine vulnerabilities.
Comput. Secur., 2021

HybriDiagnostics: Evaluating Security Issues in Hybrid SmartHome Companion Apps.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Criminal Investigations: An InteractiveExperience to Improve Student Engagement and Achievement in Cybersecurity courses.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

HIJaX: Human Intent JavaScript XSS Generator.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
A multi-party, fine-grained permission and policy enforcement framework for hybrid mobile applications.
J. Comput. Secur., 2020

Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

A Survey of In-Lined Reference Monitors: Policies, Applications and Challenges.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Inscription: Thwarting ActionScript Web Attacks From Within.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
HybridGuard: A Principal-Based Permission and Fine-Grained Policy Enforcement Framework for Web-Based Mobile Applications.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

2015
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content.
IEEE Trans. Dependable Secur. Comput., 2015

2014
Hippocratic binary instrumentation: First do no harm.
Sci. Comput. Program., 2014

2012
Aspect-Oriented Runtime Monitor Certification.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

2011
Flexible in-lined reference monitor certification: challenges and future directions.
Proceedings of the 5th ACM Workshop Programming Languages meets Program Verification, 2011

2010
Model-Checking In-Lined Reference Monitors.
Proceedings of the Verification, 2010

ActionScript In-Lined Reference Monitoring in Prolog.
Proceedings of the Practical Aspects of Declarative Languages, 2010

2009
ActionScript bytecode verification with co-logic programming.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009


  Loading...