Prithvi Bisht
According to our database1,
Prithvi Bisht
authored at least 14 papers
between 2007 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
Automated detection of parameter tampering opportunities and vulnerabilities in web applications.
J. Comput. Secur., 2014
2013
TamperProof: a server-agnostic defense for parameter tampering attacks on web applications.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
Don't Repeat Yourself: Automatically Synthesizing Client-side Validation Code for Web Applications.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks.
ACM Trans. Inf. Syst. Secur., 2010
Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation.
Proceedings of the Information Systems Security - 6th International Conference, 2010
WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper).
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2008
Proceedings of the Detection of Intrusions and Malware, 2008
2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007