V. N. Venkatakrishnan
Orcid: 0000-0002-1690-9185
According to our database1,
V. N. Venkatakrishnan
authored at least 67 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection.
Proceedings of the Information Systems Security - 18th International Conference, 2022
2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
IEEE Access, 2020
2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
CoRR, 2016
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program.
CoRR, 2016
Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Automated detection of parameter tampering opportunities and vulnerabilities in web applications.
J. Comput. Secur., 2014
Int. J. Heal. Inf. Syst. Informatics, 2014
PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification.
EURASIP J. Inf. Secur., 2014
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 2013 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, 2013
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
TamperProof: a server-agnostic defense for parameter tampering attacks on web applications.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
Don't Repeat Yourself: Automatically Synthesizing Client-side Validation Code for Web Applications.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks.
ACM Trans. Inf. Syst. Secur., 2010
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements.
Proceedings of the 19th USENIX Security Symposium, 2010
Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation.
Proceedings of the Information Systems Security - 6th International Conference, 2010
WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper).
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the Detection of Intrusions and Malware, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the 14th international conference on World Wide Web, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
2003
Model-carrying code: a practical approach for safe execution of untrusted applications.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003
Proceedings of the New Security Paradigms Workshop 2003, 2003
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Proceedings of the 16th Conference on Systems Administration (LISA 2002), 2002
2000
Proceedings of the Computer Aided Verification, 12th International Conference, 2000