Vinod Ganapathy

Orcid: 0000-0003-3001-0800

According to our database1, Vinod Ganapathy authored at least 67 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privadome: Delivery Drones and Citizen Privacy.
Proc. Priv. Enhancing Technol., 2024

Decentralized Information-Flow Control for ROS2.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
A Contributory Public-Event Recording and Querying System.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2023

Data Protection in Permissioned Blockchains using Privilege Separation.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

Whole-Program Control-Flow Path Attestation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Privadome: Protecting Citizen Privacy from Delivery Drones.
CoRR, 2022

2021
SG<sup>XL</sup>: Security and Performance for Enclaves Using Large Pages.
ACM Trans. Archit. Code Optim., 2021

Faastlane: Accelerating Function-as-a-Service Workflows.
Proceedings of the 2021 USENIX Annual Technical Conference, 2021

(Mis)managed: A Novel TLB-based Covert Channel on GPUs.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Privaros: A Framework for Privacy-Compliant Drones.
CoRR, 2020

An evaluation of methods to port legacy code to SGX enclaves.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Privaros: A Framework for Privacy-Compliant Delivery Drones.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

ActiveThief: Model Extraction Using Active Learning and Unannotated Public Data.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A framework for the extraction of Deep Neural Networks by leveraging public data.
CoRR, 2019

Regulating Drones in Restricted Spaces.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

2018
Secure, Consistent, and High-Performance Memory Snapshotting.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
EnGarde: Mutually-Trusted Inspection of SGX Enclaves.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Compiler Optimizations with Retrofitting Transformations: Is there a Semantic Mismatch?
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

2016
Exploring infrastructure support for app-based services on cloud platforms.
Comput. Secur., 2016

Detecting plagiarized mobile apps using API birthmarks.
Autom. Softw. Eng., 2016

Regulating ARM TrustZone Devices in Restricted Spaces.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

2015
Testing Cross-Platform Mobile App Development Frameworks (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

A novel algorithm for pattern matching with back references.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Reflections on the Self-service Cloud Computing Project.
Proceedings of the Information Systems Security - 11th International Conference, 2015

2014
Efficient runtime-enforcement techniques for policy weaving.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Retargetting Legacy Browser Extensions to Modern Extension Frameworks.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

On the Control Plane of a Self-service Cloud Platform.
Proceedings of the ACM Symposium on Cloud Computing, 2014

2013
Monitoring Integrity Using Limited Local Memory.
IEEE Trans. Inf. Forensics Secur., 2013

Inferring likely mappings between APIs.
Proceedings of the 35th International Conference on Software Engineering, 2013

2012
An Analysis of the Mozilla Jetpack Extension Framework.
Proceedings of the ECOOP 2012 - Object-Oriented Programming, 2012

Enhancing JavaScript with Transactions.
Proceedings of the ECOOP 2012 - Object-Oriented Programming, 2012

Short paper: enhancing users' comprehension of android permissions.
Proceedings of the SPSM'12, 2012

Towards a richer model of cloud app markets.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

Leveraging "choice" to automate authorization hook placement.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Self-service cloud computing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Fast submatch extraction using OBDDs.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2012

2011
Dynamic Analysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Detecting Kernel-Level Rootkits Using Data Structure Invariants.
IEEE Trans. Dependable Secur. Comput., 2011

Fast, memory-efficient regular expression matching with NFA-OBDDs.
Comput. Networks, 2011

Enhancing Mobile Malware Detection with Social Collaboration.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access.
Proceedings of the Security and Privacy in Communication Networks, 2011

Monitoring Data Structures Using Hardware Transactional Memory.
Proceedings of the Runtime Verification - Second International Conference, 2011

Security versus energy tradeoffs in host-based mobile malware detection.
Proceedings of the 9th International Conference on Mobile Systems, 2011

2010
Rootkits on smart phones: attacks, implications and opportunities.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Core-Local Memory Assisted Protection.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

The case for JavaScript transactions: position paper.
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010

2009
Working set-based access control for network file systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Privately querying location-based services with SybilQuery.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

Detecting Identity Spoofs in IEEE 802.11e Wireless Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Privacy-aware identity management for client-side mashup applications.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

Analyzing Information Flow in JavaScript-Based Browser Extensions.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Protecting Commodity Operating System Kernels from Vulnerable Device Drivers.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Enforcing authorization policies using transactional memory introspection.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

The design and implementation of microdrivers.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

OMOS: A Framework for Secure Communication in Mashup Applications.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Automatic Inference and Enforcement of Kernel Data Structure Invariants.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Microdrivers: A New Architecture for Device Drivers.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
Retrofitting Legacy Code for Authorization Policy Enforcement.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

HeapMD: identifying heap-based bugs using anomaly detection.
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006

NetSpy: Automatic Generation of Spyware Signatures for NIDS.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Automatic discovery of API-level exploits.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

An auctioning reputation system based on anomaly.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Automatic placement of authorization hooks in the linux security modules framework.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2003
Buffer overrun detection using linear programming and static analysis.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Slicing Synchronous Reactive Programs.
Proceedings of the Synchronous Languages, Applications, and Programming, 2002


  Loading...