[go: up one dir, main page]

Follow
VN Venkatakrishnan
Title
Cited by
Cited by
Year
The NAS parallel benchmarks—summary and preliminary results
DH Bailey, E Barszcz, JT Barton, DS Browning, RL Carter, L Dagum, ...
Proceedings of the 1991 ACM/IEEE Conference on Supercomputing, 158-165, 1991
41571991
Holmes: real-time apt detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
2019 IEEE symposium on security and privacy (SP), 1137-1152, 2019
7462019
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017
3912017
Fast memory-efficient anomaly detection in streaming heterogeneous graphs
E Manzoor, SM Milajerdi, L Akoglu
Proceedings of the 22nd ACM SIGKDD international conference on knowledge …, 2016
3782016
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting
SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
3542019
Blueprint: Robust prevention of cross-site scripting attacks for existing browsers
M Ter Louw, VN Venkatakrishnan
2009 30th IEEE symposium on security and privacy, 331-346, 2009
3052009
On the role and challenges of CFD in the aerospace industry
PR Spalart, V Venkatakrishnan
The Aeronautical Journal 120 (1223), 209-232, 2016
2982016
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
2882003
XSS-GUARD: precise dynamic prevention of cross-site scripting attacks
P Bisht, V Venkatakrishnan
Detection of Intrusions and Malware, and Vulnerability Assessment, 23-43, 2008
2872008
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
P Bisht, P Madhusudan, VN Venkatakrishnan
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-39, 2010
2462010
CANDID: preventing SQL injection attacks using dynamic candidate evaluations
S Bandhakavi, P Bisht, P Madhusudan, VN Venkatakrishnan
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2332007
Implicit solvers for unstructured meshes
V Venkatakrishnan, DJ Mavriplis
Journal of computational Physics 105 (1), 83-91, 1993
2131993
Extractor: Extracting attack behavior from threat reports
K Satvat, R Gjomemo, VN Venkatakrishnan
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 598-615, 2021
2002021
{AdJail}: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
M Ter Louw, KT Ganesh, VN Venkatakrishnan
19th USENIX Security Symposium (USENIX Security 10), 2010
1702010
Isolated program execution: An application transparent approach for executing untrusted programs
Z Liang, VN Venkatakrishnan, R Sekar
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
1622003
Notamper: automatic blackbox detection of parameter tampering opportunities in web applications
P Bisht, T Hinrichs, N Skrupsky, R Bobrowicz, VN Venkatakrishnan
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1402010
Enhancing web browser security against malware extensions
M Ter Louw, JS Lim, VN Venkatakrishnan
Journal in Computer Virology 4 (3), 179-195, 2008
1352008
{NAVEX}: Precise and scalable exploit generation for dynamic web applications
A Alhuzali, R Gjomemo, B Eshete, VN Venkatakrishnan
27th USENIX Security Symposium (USENIX Security 18), 377-392, 2018
1192018
Waptec: whitebox analysis of web applications for parameter tampering exploit construction
P Bisht, T Hinrichs, N Skrupsky, VN Venkatakrishnan
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1092011
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
W Sun, Z Liang, VN Venkatakrishnan, R Sekar
NDSS, 2005
1072005
The system can't perform the operation now. Try again later.
Articles 1–20