Prateek Saxena
Orcid: 0000-0002-1875-8675
According to our database1,
Prateek Saxena
authored at least 102 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Proc. ACM Program. Lang., April, 2023
Capstone: A Capability-based Foundation for Trustless Secure Memory Access (Extended Version).
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation.
Proceedings of the 31st USENIX Security Symposium, 2022
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the Text, Speech, and Dialogue - 24th International Conference, 2021
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
IEEE/ACM Trans. Netw., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Text, Speech, and Dialogue, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution.
CoRR, 2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
IEEE Internet Comput., 2015
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining.
IACR Cryptol. ePrint Arch., 2015
Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks.
CoRR, 2015
Comput. Secur., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
2013
Proceedings of the Tenth International Conference on Wireless and Optical Communications Networks, 2013
Hardware-software Scalable Architectures for Gaussian Elimination over GF(2) and Higher Galois Fields.
Proceedings of the PECCS 2013, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
The curse of 140 characters: evaluating the efficacy of SMS spam detection on android.
Proceedings of the SPSM'13, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
PhD thesis, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Context-sensitive auto-sanitization in web templating languages using type qualifiers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009
2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Sixth International Symposium on Code Generation and Optimization (CGO 2008), 2008