What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
V. N. Venkatakrishnan
Google Scholar
ORCID:
0000-0002-1690-9185
31
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
FIXX: FInding eXploits from eXamples.
Neil P. Thimmaiah
Yashashvi J. Dave
Rigel Gjomemo
V. N. Venkatakrishnan
2024
conf/ccs
ReactAppScan: Mining React Application Vulnerabilities via Component Graph.
Zhiyong Guo
Mingqing Kang
V. N. Venkatakrishnan
Rigel Gjomemo
Yinzhi Cao
2023
conf/sp
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.
Mingqing Kang
Yichao Xu
Song Li
Rigel Gjomemo
Jianwei Hou
V. N. Venkatakrishnan
Yinzhi Cao
2022
conf/iciss
Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection.
Sutanu Kumar Ghosh
Kiavash Satvat
Rigel Gjomemo
V. N. Venkatakrishnan
2021
conf/eurosp
Extractor: Extracting Attack Behavior from Threat Reports.
Kiavash Satvat
Rigel Gjomemo
V. N. Venkatakrishnan
2019
conf/ccs
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. N. Venkatakrishnan
2019
conf/sp
HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows.
Sadegh Momeni Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. N. Venkatakrishnan
2018
conf/uss
NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications.
Abeer Alhuzali
Rigel Gjomemo
Birhanu Eshete
V. N. Venkatakrishnan
2017
conf/uss
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
Md Nahid Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. N. Venkatakrishnan
2017
conf/dsn
DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection.
Birhanu Eshete
V. N. Venkatakrishnan
2016
conf/ccs
Chainsaw: Chained Automated Workflow-based Exploit Generation.
Abeer Alhuzali
Birhanu Eshete
Rigel Gjomemo
V. N. Venkatakrishnan
2015
conf/sp
Vetting SSL Usage in Applications with SSLINT.
Boyuan He
Vaibhav Rastogi
Yinzhi Cao
Yan Chen
V. N. Venkatakrishnan
Runqing Yang
Zhenrui Zhang
2014
conf/ccs
MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications.
Maliheh Monshizadeh
Prasad Naldurg
V. N. Venkatakrishnan
2014
conf/fc
Digital Check Forgery Attacks on Client Check Truncation Systems.
Rigel Gjomemo
Hafiz Malik
Nilesh Sumb
V. N. Venkatakrishnan
Rashid Ansari
2011
conf/ccs
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction.
Prithvi Bisht
Timothy L. Hinrichs
Nazari Skrupsky
V. N. Venkatakrishnan
2010
conf/ccs
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications.
Prithvi Bisht
Timothy L. Hinrichs
Nazari Skrupsky
Radoslaw Bobrowicz
V. N. Venkatakrishnan
2010
conf/ccs
TAPS: automatically preparing safe SQL queries.
Prithvi Bisht
A. Prasad Sistla
V. N. Venkatakrishnan
2010
conf/uss
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements.
Mike Ter Louw
Karthik Thotta Ganesh
V. N. Venkatakrishnan
2010
conf/fc
Automatically Preparing Safe SQL Queries.
Prithvi Bisht
A. Prasad Sistla
V. N. Venkatakrishnan
2010
conf/iciss
WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper).
V. N. Venkatakrishnan
Prithvi Bisht
Mike Ter Louw
Michelle Zhou
Kalpana Gondi
Karthik Thotta Ganesh
2010
conf/iciss
Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation.
Michelle Zhou
Prithvi Bisht
V. N. Venkatakrishnan
2009
conf/sp
Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers.
Mike Ter Louw
V. N. Venkatakrishnan
2008
conf/ccs
CMV: automatic verification of complete mediation for java virtual machines.
A. Prasad Sistla
V. N. Venkatakrishnan
Michelle Zhou
Hilary Branske
2008
conf/acsac
Preventing Information Leaks through Shadow Executions.
Roberto Capizzi
Antonio Longo
V. N. Venkatakrishnan
A. Prasad Sistla
2007
conf/ccs
CANDID: preventing sql injection attacks using dynamic candidate evaluations.
Sruthi Bandhakavi
Prithvi Bisht
P. Madhusudan
V. N. Venkatakrishnan
2006
conf/icics
Provably Correct Runtime Enforcement of Non-interference Properties.
V. N. Venkatakrishnan
Wei Xu
Daniel C. DuVarney
R. Sekar
2006
conf/acsac
Data Sandboxing: A Technique for Enforcing Confidentiality Policies.
Tejas Khatiwala
Raj Swaminathan
V. N. Venkatakrishnan
2005
conf/ndss
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
Weiqing Sun
Zhenkai Liang
V. N. Venkatakrishnan
R. Sekar
2003
conf/nspw
SELF: a transparent security extension for ELF binaries.
Daniel C. DuVarney
V. N. Venkatakrishnan
Sandeep Bhatkar
2003
conf/acsac
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs.
Zhenkai Liang
V. N. Venkatakrishnan
R. Sekar
2002
conf/nspw
Empowering mobile code using expressive security policies.
V. N. Venkatakrishnan
Ram Peri
R. Sekar
Coauthors
A. Prasad Sistla
(4)
Abeer Alhuzali
(2)
Antonio Longo
(1)
Birhanu Eshete
(6)
Boyuan He
(1)
Daniel C. DuVarney
(2)
Hafiz Malik
(1)
Hilary Branske
(1)
Jianwei Hou
(1)
Junao Wang
(1)
Kalpana Gondi
(1)
Karthik Thotta Ganesh
(2)
Kiavash Satvat
(2)
Maliheh Monshizadeh
(1)
Md Nahid Hossain
(1)
Michelle Zhou
(3)
Mike Ter Louw
(3)
Mingqing Kang
(2)
Nazari Skrupsky
(2)
Neil P. Thimmaiah
(1)
Nilesh Sumb
(1)
P. Madhusudan
(1)
Prasad Naldurg
(1)
Prithvi Bisht
(7)
R. Sekar
(6)
Radoslaw Bobrowicz
(1)
Raj Swaminathan
(1)
Ram Peri
(1)
Rashid Ansari
(1)
Rigel Gjomemo
(11)
Roberto Capizzi
(1)
Runqing Yang
(1)
Sadegh M. Milajerdi
(2)
Sadegh Momeni Milajerdi
(1)
Sandeep Bhatkar
(1)
Scott D. Stoller
(1)
Song Li
(1)
Sruthi Bandhakavi
(1)
Sutanu Kumar Ghosh
(1)
Tejas Khatiwala
(1)
Timothy L. Hinrichs
(2)
V. N. Venkatakrishnan
(31)
Vaibhav Rastogi
(1)
Wei Xu
(1)
Weiqing Sun
(1)
Yan Chen
(1)
Yashashvi J. Dave
(1)
Yichao Xu
(1)
Yinzhi Cao
(3)
Zhenkai Liang
(2)
Zhenrui Zhang
(1)
Zhiyong Guo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to