What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Srikanth V. Krishnamurthy
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls.
Qing Deng
Juefei Pu
Zhaowei Tan
Zhiyun Qian
Srikanth V. Krishnamurthy
2024
conf/ccs
Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks.
Xin'an Zhou
Qing Deng
Juefei Pu
Keyu Man
Zhiyun Qian
Srikanth V. Krishnamurthy
2024
conf/uss
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks.
Yizhuo Zhai
Zhiyun Qian
Chengyu Song
Manu Sridharan
Trent Jaeger
Paul L. Yu
Srikanth V. Krishnamurthy
2024
conf/eurosp
DNS Exfiltration Guided by Generative Adversarial Networks.
Abdulrahman Fahim
Shitong Zhu
Zhiyun Qian
Chengyu Song
Evangelos E. Papalexakis
Supriyo Chakraborty
Kevin S. Chan
Paul L. Yu
Trent Jaeger
Srikanth V. Krishnamurthy
2022
conf/ndss
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel.
Yizhuo Zhai
Yu Hao
Zheng Zhang
Weiteng Chen
Guoren Li
Zhiyun Qian
Chengyu Song
Manu Sridharan
Srikanth V. Krishnamurthy
Trent Jaeger
Paul L. Yu
2021
conf/ccs
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison.
Zhongjie Wang
Shitong Zhu
Keyu Man
Pengxiong Zhu
Yu Hao
Zhiyun Qian
Srikanth V. Krishnamurthy
Tom La Porta
Michael J. De Lucia
2021
conf/ccs
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison.
Zhongjie Wang
Shitong Zhu
Keyu Man
Pengxiong Zhu
Yu Hao
Zhiyun Qian
Srikanth V. Krishnamurthy
Tom La Porta
Michael J. De Lucia
2021
conf/uss
SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning.
Daimeng Wang
Zheng Zhang
Hang Zhang
Zhiyun Qian
Srikanth V. Krishnamurthy
Nael B. Abu-Ghazaleh
2021
conf/acsac
Eluding ML-based Adblockers With Actionable Adversarial Examples.
Shitong Zhu
Zhongjie Wang
Xun Chen
Shasha Li
Keyu Man
Umar Iqbal
Zhiyun Qian
Kevin S. Chan
Srikanth V. Krishnamurthy
Zubair Shafiq
Yu Hao
Guoren Li
Zheng Zhang
Xiaochen Zou
2020
conf/ndss
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.
Zhongjie Wang
Shitong Zhu
Yue Cao
Zhiyun Qian
Chengyu Song
Srikanth V. Krishnamurthy
Kevin S. Chan
Tracy D. Braun
2019
conf/ccs
Principled Unearthing of TCP Side Channel Vulnerabilities.
Yue Cao
Zhongjie Wang
Zhiyun Qian
Chengyu Song
Srikanth V. Krishnamurthy
Paul L. Yu
2019
conf/nspw
Employing attack graphs for intrusion detection.
Frank Capobianco
Rahul George
Kaiming Huang
Trent Jaeger
Srikanth V. Krishnamurthy
Zhiyun Qian
Mathias Payer
Paul L. Yu
2019
conf/ndss
Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems.
Shasha Li
Ajaya Neupane
Sujoy Paul
Chengyu Song
Srikanth V. Krishnamurthy
Amit K. Roy-Chowdhury
Ananthram Swami
2019
conf/ndss
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
Daimeng Wang
Ajaya Neupane
Zhiyun Qian
Nael B. Abu-Ghazaleh
Srikanth V. Krishnamurthy
Edward J. M. Colbert
Paul L. Yu
2018
conf/ccs
Droid M+: Developer Support for Imbibing Android's New Permission Model.
Ioannis Gasparis
Azeem Aqil
Zhiyun Qian
Chengyu Song
Srikanth V. Krishnamurthy
Rajiv Gupta
Edward Colbert
2017
conf/uss
Detecting Android Root Exploits by Learning from Root Providers.
Ioannis Gasparis
Zhiyun Qian
Chengyu Song
Srikanth V. Krishnamurthy
2016
conf/ccs
Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.
Stefan Achleitner
Thomas La Porta
Patrick D. McDaniel
Shridatt Sugrim
Srikanth V. Krishnamurthy
Ritu Chadha
2016
conf/uss
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous.
Yue Cao
Zhiyun Qian
Zhongjie Wang
Tuan Dao
Srikanth V. Krishnamurthy
Lisa M. Marvel
2016
conf/cns
Automated cross layer feature selection for effective intrusion detection in networked systems.
Azeem Aqil
Ahmed Osama Fathy Atya
Srikanth V. Krishnamurthy
Paul L. Yu
Ananthram Swami
Jeff Rowe
Karl N. Levitt
Alexander Poylisher
Constantin Serban
Ritu Chadha
2014
conf/ccs
Security and Science of Agility.
Patrick D. McDaniel
Trent Jaeger
Thomas F. La Porta
Nicolas Papernot
Robert J. Walls
Alexander Kott
Lisa M. Marvel
Ananthram Swami
Prasant Mohapatra
Srikanth V. Krishnamurthy
Iulian Neamtiu
2014
conf/cns
Secret message sharing using online social media.
Jianxia Ning
Indrajeet Singh
Harsha V. Madhyastha
Srikanth V. Krishnamurthy
Guohong Cao
Prasant Mohapatra
2012
conf/acsac
Enabling private conversations on Twitter.
Indrajeet Singh
Michael Butkiewicz
Harsha V. Madhyastha
Srikanth V. Krishnamurthy
Sateesh Addepalli
Coauthors
Abdulrahman Fahim
(1)
Ahmed Osama Fathy Atya
(1)
Ajaya Neupane
(2)
Alexander Kott
(1)
Alexander Poylisher
(1)
Amit K. Roy-Chowdhury
(1)
Ananthram Swami
(3)
Azeem Aqil
(2)
Chengyu Song
(8)
Constantin Serban
(1)
Daimeng Wang
(2)
Edward Colbert
(1)
Edward J. M. Colbert
(1)
Evangelos E. Papalexakis
(1)
Frank Capobianco
(1)
Guohong Cao
(1)
Guoren Li
(2)
Hang Zhang
(1)
Harsha V. Madhyastha
(2)
Indrajeet Singh
(2)
Ioannis Gasparis
(2)
Iulian Neamtiu
(1)
Jeff Rowe
(1)
Jianxia Ning
(1)
Juefei Pu
(2)
Kaiming Huang
(1)
Karl N. Levitt
(1)
Kevin S. Chan
(3)
Keyu Man
(4)
Lisa M. Marvel
(2)
Manu Sridharan
(2)
Mathias Payer
(1)
Michael Butkiewicz
(1)
Michael J. De Lucia
(2)
Nael B. Abu-Ghazaleh
(2)
Nicolas Papernot
(1)
Patrick D. McDaniel
(2)
Paul L. Yu
(7)
Pengxiong Zhu
(2)
Prasant Mohapatra
(2)
Qing Deng
(2)
Rahul George
(1)
Rajiv Gupta
(1)
Ritu Chadha
(2)
Robert J. Walls
(1)
Sateesh Addepalli
(1)
Shasha Li
(2)
Shitong Zhu
(5)
Shridatt Sugrim
(1)
Srikanth V. Krishnamurthy
(22)
Stefan Achleitner
(1)
Sujoy Paul
(1)
Supriyo Chakraborty
(1)
Thomas F. La Porta
(1)
Thomas La Porta
(1)
Tom La Porta
(2)
Tracy D. Braun
(1)
Trent Jaeger
(5)
Tuan Dao
(1)
Umar Iqbal
(1)
Weiteng Chen
(1)
Xiaochen Zou
(1)
Xin'an Zhou
(1)
Xun Chen
(1)
Yizhuo Zhai
(2)
Yu Hao
(4)
Yue Cao
(3)
Zhaowei Tan
(1)
Zheng Zhang
(3)
Zhiyun Qian
(16)
Zhongjie Wang
(6)
Zubair Shafiq
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to