What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vinod Ganapathy
Google Scholar
23
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/popets
Privadome: Delivery Drones and Citizen Privacy.
Gokulnath Pillai
Ajith Suresh
Eikansh Gupta
Vinod Ganapathy
Arpita Patra
2024
conf/ndss
Decentralized Information-Flow Control for ROS2.
Nishit V. Pandya
Himanshu Kumar
Gokulnath Pillai
Vinod Ganapathy
2023
conf/ccs
Whole-Program Control-Flow Path Attestation.
Nikita Yadav
Vinod Ganapathy
2021
conf/asiaccs
(Mis)managed: A Novel TLB-based Covert Channel on GPUs.
Ajay Nayak
B. Pratheek
Vinod Ganapathy
Arkaprava Basu
2020
conf/ccs
Privaros: A Framework for Privacy-Compliant Delivery Drones.
Rakesh Rajan Beck
Abhishek Vijeev
Vinod Ganapathy
2017
conf/ccs
Compiler Optimizations with Retrofitting Transformations: Is there a Semantic Mismatch?
Jay P. Lim
Vinod Ganapathy
Santosh Nagarakatte
2016
journals/compsec
Exploring infrastructure support for app-based services on cloud platforms.
Hai Nguyen
Vinod Ganapathy
Abhinav Srivastava
Shivaramakrishnan Vaidyanathan
2015
conf/iciss
Reflections on the Self-service Cloud Computing Project.
Vinod Ganapathy
2013
journals/tifs
Monitoring Integrity Using Limited Local Memory.
Yuki Kinebuchi
Shakeel Butt
Vinod Ganapathy
Liviu Iftode
Tatsuo Nakajima
2012
conf/ccs
Towards a richer model of cloud app markets.
Abhinav Srivastava
Vinod Ganapathy
2012
conf/ccs
Short paper: enhancing users' comprehension of android permissions.
Liu Yang
Nader Boushehrinejadmoradi
Pallab Roy
Vinod Ganapathy
Liviu Iftode
2012
conf/ccs
Leveraging "choice" to automate authorization hook placement.
Divya Muthukumaran
Trent Jaeger
Vinod Ganapathy
2012
conf/ccs
Self-service cloud computing.
Shakeel Butt
H. Andrés Lagar-Cavilla
Abhinav Srivastava
Vinod Ganapathy
2009
conf/acsac
Analyzing Information Flow in JavaScript-Based Browser Extensions.
Mohan Dhawan
Vinod Ganapathy
2009
conf/acsac
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers.
Shakeel Butt
Vinod Ganapathy
Michael M. Swift
Chih-Cheng Chang
2008
conf/ccs
Enforcing authorization policies using transactional memory introspection.
Arnar Birgisson
Mohan Dhawan
Úlfar Erlingsson
Vinod Ganapathy
Liviu Iftode
2008
conf/acsac
Automatic Inference and Enforcement of Kernel Data Structure Invariants.
Arati Baliga
Vinod Ganapathy
Liviu Iftode
2008
conf/acsac
OMOS: A Framework for Secure Communication in Mashup Applications.
Saman Zarandioon
Danfeng Yao
Vinod Ganapathy
2006
conf/sp
Retrofitting Legacy Code for Authorization Policy Enforcement.
Vinod Ganapathy
Trent Jaeger
Somesh Jha
2006
conf/acsac
NetSpy: Automatic Generation of Spyware Signatures for NIDS.
Hao Wang
Somesh Jha
Vinod Ganapathy
2005
conf/ccs
Automatic placement of authorization hooks in the linux security modules framework.
Vinod Ganapathy
Trent Jaeger
Somesh Jha
2005
conf/ccs
An auctioning reputation system based on anomaly.
Shai Rubin
Mihai Christodorescu
Vinod Ganapathy
Jonathon T. Giffin
Louis Kruger
Hao Wang
Nicholas Kidd
2003
conf/ccs
Buffer overrun detection using linear programming and static analysis.
Vinod Ganapathy
Somesh Jha
David Chandler
David Melski
David Vitek
Coauthors
Abhinav Srivastava
(3)
Abhishek Vijeev
(1)
Ajay Nayak
(1)
Ajith Suresh
(1)
Arati Baliga
(1)
Arkaprava Basu
(1)
Arnar Birgisson
(1)
Arpita Patra
(1)
B. Pratheek
(1)
Chih-Cheng Chang
(1)
Danfeng Yao
(1)
David Chandler
(1)
David Melski
(1)
David Vitek
(1)
Divya Muthukumaran
(1)
Eikansh Gupta
(1)
Gokulnath Pillai
(2)
H. Andrés Lagar-Cavilla
(1)
Hai Nguyen
(1)
Hao Wang
(1)
Hao Wang
(1)
Himanshu Kumar
(1)
Jay P. Lim
(1)
Jonathon T. Giffin
(1)
Liu Yang
(1)
Liviu Iftode
(4)
Louis Kruger
(1)
Michael M. Swift
(1)
Mihai Christodorescu
(1)
Mohan Dhawan
(2)
Nader Boushehrinejadmoradi
(1)
Nicholas Kidd
(1)
Nikita Yadav
(1)
Nishit V. Pandya
(1)
Pallab Roy
(1)
Rakesh Rajan Beck
(1)
Saman Zarandioon
(1)
Santosh Nagarakatte
(1)
Shai Rubin
(1)
Shakeel Butt
(3)
Shivaramakrishnan Vaidyanathan
(1)
Somesh Jha
(4)
Tatsuo Nakajima
(1)
Trent Jaeger
(3)
Úlfar Erlingsson
(1)
Vinod Ganapathy
(23)
Yuki Kinebuchi
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to