Sprobes: Enforcing kernel code integrity on the trustzone architecture X Ge, H Vijayakumar, T Jaeger Proceedings of the 3rd IEEE Mobile Security Technologies Workshop (MoST), 2014 | 186 | 2014 |
Seeding clouds with trust anchors J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010 | 159 | 2010 |
Fuzzfactory: domain-specific fuzzing with waypoints R Padhye, C Lemieux, K Sen, L Simon, H Vijayakumar Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-29, 2019 | 77 | 2019 |
PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation L Harrison, H Vijayakumar, R Padhye, K Sen, M Grace Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020), 2020 | 70 | 2020 |
Integrity walls: Finding attack surfaces from mandatory access control policies H Vijayakumar, G Jakka, S Rueda, J Schiffman, T Jaeger Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 62 | 2012 |
NORAX: Enabling execute-only memory for COTS binaries on AArch64 Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ... 2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017 | 58 | 2017 |
Cloud verifier: Verifiable auditing service for IaaS clouds J Schiffman, Y Sun, H Vijayakumar, T Jaeger 2013 IEEE Ninth World Congress on Services, 239-246, 2013 | 47 | 2013 |
{ATtention} Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ... 27th USENIX security symposium (USENIX security 18), 273-290, 2018 | 45 | 2018 |
{JIGSAW}: Protecting resource access by inferring programmer expectations H Vijayakumar, X Ge, M Payer, T Jaeger 23rd USENIX Security Symposium (USENIX Security 14), 973-988, 2014 | 42 | 2014 |
Instaguard: Instantly deployable hot-patches for vulnerable system programs on android Y Chen, Y Li, L Lu, YH Lin, H Vijayakumar, Z Wang, X Ou 2018 Network and Distributed System Security Symposium (NDSS'18), 2018 | 35 | 2018 |
Verifying system integrity by proxy J Schiffman, H Vijayakumar, T Jaeger International Conference on Trust and Trustworthy Computing, 179-200, 2012 | 34 | 2012 |
{STING}: Finding Name Resolution Vulnerabilities in Programs H Vijayakumar, J Schiffman, T Jaeger 21st USENIX Security Symposium (USENIX Security 12), 585-599, 2012 | 32 | 2012 |
Process firewalls: Protecting processes during resource access H Vijayakumar, J Schiffman, T Jaeger Proceedings of the 8th ACM European Conference on Computer Systems, 57-70, 2013 | 24 | 2013 |
{PolyScope}:{Multi-Policy} Access Control Analysis to Compute Authorized Attack Operations in Android Systems YT Lee, W Enck, H Chen, H Vijayakumar, N Li, Z Qian, D Wang, ... 30th USENIX Security Symposium (USENIX Security 21), 2579-2596, 2021 | 19 | 2021 |
Analysis of virtual machine system policies S Rueda, H Vijayakumar, T Jaeger Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 15 | 2009 |
Transforming commodity security policies to enforce Clark-Wilson integrity D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 13 | 2012 |
A scalable parallelization of all-pairs shortest path algorithm for a high performance cluster environment T Srinivasan, R Balakrishnan, SA Gangadharan, V Hayawardh 2007 International Conference on Parallel and Distributed Systems, 1-8, 2007 | 13 | 2007 |
Cloud armor: Protecting cloud commands from compromised cloud services Y Sun, G Petracca, T Jaeger, H Vijayakumar, J Schiffman 2015 IEEE 8th International Conference on Cloud Computing, 253-260, 2015 | 12 | 2015 |
Cut me some security D Muthukumaran, S Rueda, H Vijayakumar, T Jaeger Proceedings of the 3rd ACM workshop on Assurable and Usable Security …, 2010 | 9 | 2010 |
The right files at the right time H Vijayakumar, T Jaeger Automated Security Management, 119-133, 2013 | 3 | 2013 |