[go: up one dir, main page]

Follow
Meet Udeshi
Meet Udeshi
PhD Student, Center for Cybersecurity, New York University
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
EnIGMA: Interactive Tools Substantially Assist LM Agents in Finding Security Vulnerabilities
T Abramovich, M Udeshi, M Shao, K Lieret, H Xi, K Milner, S Jancheska, ...
Forty-second International Conference on Machine Learning, 2025
58*2025
Nyu ctf bench: A scalable open-source benchmark dataset for evaluating llms in offensive security
M Shao, S Jancheska, M Udeshi, B Dolan-Gavitt, K Milner, B Chen, M Yin, ...
Advances in Neural Information Processing Systems 37, 57472-57498, 2024
282024
D-CIPHER: Dynamic Collaborative Intelligent Multi-Agent System with Planner and Heterogeneous Executors for Offensive Security
M Udeshi, M Shao, H Xi, N Rani, K Milner, VSC Putrevu, B Dolan-Gavitt, ...
arXiv preprint arXiv:2502.10931, 2025
9*2025
CRAKEN: Cybersecurity LLM Agent with Knowledge-Based Execution
M Shao, H Xi, N Rani, M Udeshi, VSC Putrevu, K Milner, B Dolan-Gavitt, ...
arXiv preprint arXiv:2505.17107, 2025
62025
Fine-grained scheduling in heterogeneous-isa architectures
NK Boran, S Rathore, M Udeshi, V Singh
IEEE Computer Architecture Letters 20 (1), 9-12, 2020
52020
Tamper-proof network traffic measurements on a NIC for intrusion detection
M Udeshi, P Krishnamurthy, R Karri, F Khorrami
IEEE Transactions on Network and Service Management, 2024
22024
REMaQE: Reverse Engineering Math Equations from Executables
M Udeshi, P Krishnamurthy, H Pearce, R Karri, F Khorrami
ACM Transactions on Cyber-Physical Systems 8 (4), 1-25, 2024
22024
SaMOSA: Sandbox for Malware Orchestration and Side-Channel Analysis
M Udeshi, VSC Putrevu, P Krishnamurthy, R Karri, F Khorrami
arXiv preprint arXiv:2508.14261, 2025
12025
REMEND: Neural Decompilation for Reverse Engineering Math Equations from Binary Executables
M Udeshi, P Krishnamurthy, R Karri, F Khorrami
ACM Transactions on Intelligent Systems and Technology, 2025
12025
Binary Diff Summarization using Large Language Models
M Udeshi, VSC Putrevu, P Krishnamurthy, P Anantharaman, S Carrick, ...
arXiv preprint arXiv:2509.23970, 2025
2025
Ransomware 3.0: Self-Composing and LLM-Orchestrated
M Raz, M Udeshi, PV Charan, P Krishnamurthy, F Khorrami, R Karri
arXiv preprint arXiv:2508.20444, 2025
2025
Towards Effective Offensive Security LLM Agents: Hyperparameter Tuning, LLM as a Judge, and a Lightweight CTF Benchmark
M Shao, N Rani, K Milner, H Xi, M Udeshi, S Aggarwal, VSC Putrevu, ...
arXiv preprint arXiv:2508.05674, 2025
2025
HIDC: Heterogeneous-ISA Dynamic Core
NK Boran, P Diwan, M Udeshi, S Rathore, V Singh
2024 IEEE International Conference on High Performance Computing and …, 2024
2024
Exploring Data Security on Microprocessor Hardware
M Udeshi
Indian Institute of Technology Bombay Mumbai 400076 (India) 26, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–14