Vaibhav Rastogi
Vaibhav Rastogi
Verified email at - Homepage
Cited by
Cited by
AppsPlayground: Automatic Security Analysis of Smartphone Applications
V Rastogi, Y Chen, W Enck
Proceedings of the third ACM conference on Data and application security and …, 2013
Droidchameleon: Evaluating Android Anti-malware against Transformation Attacks
V Rastogi, Y Chen, X Jiang
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Autocog: Measuring the description-to-permission fidelity in android applications
Z Qu, V Rastogi, X Zhang, Y Chen, T Zhu, Z Chen
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Catch Me if You Can: Evaluating Android Anti-malware against Transformation Attacks
V Rastogi, Y Chen, X Jiang
IEEE Transactions on Information Forensics and Security 9 (1), 99--108, 2014
DroidNative: Automating and optimizing detection of Android native code malware variants
S Alam, Z Qu, R Riley, Y Chen, V Rastogi
computers & security 65, 230-246, 2017
Cimplifier: automatically debloating containers
V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.
V Rastogi, R Shao, Y Chen, X Pan, S Zou, R Riley
2016 Network and Distributed System Security Symposium (NDSS), 2016
Robust attribution regularization
J Chen, X Wu, V Rastogi, Y Liang, S Jha
Advances in Neural Information Processing Systems 32, 2019
Vetting SSL usage in applications with SSLINT
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang
2015 IEEE Symposium on Security and Privacy, 519-534, 2015
Security issues in language-based software ecosystems
RK Vaidya, L De Carli, D Davidson, V Rastogi
arXiv preprint arXiv:1903.02613, 2019
Uranine: Real-time privacy leakage monitoring without system modification for android
V Rastogi, Z Qu, J McClurg, Y Cao, Y Chen
Security and Privacy in Communication Networks: 11th EAI International …, 2015
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Z Li, Y Tang, Y Cao, V Rastogi, Y Chen, B Liu, C Sbisa
2011 Network and Distributed System Security Symposium (NDSS), 2011
Towards understanding limitations of pixel discretization against adversarial attacks
J Chen, X Wu, V Rastogi, Y Liang, S Jha
Proceedings of the 2019 IEEE European Symposium on Security and Privacy …, 2019
Defending against package typosquatting
M Taylor, R Vaidya, D Davidson, L De Carli, V Rastogi
Network and System Security: 14th International Conference, NSS 2020 …, 2020
Virtual browser: a virtualized browser to sandbox third-party javascripts with enhanced security
Y Cao, Z Li, V Rastogi, Y Chen, X Wen
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
Redefining web browser principals with a configurable origin policy
Y Cao, V Rastogi, Z Li, Y Chen, A Moshchuk
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
New directions for container debloating
V Rastogi, C Niddodi, S Mohan, S Jha
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
Understanding in-app ads and detecting hidden attacks through the mobile app-web interface
R Shao, V Rastogi, Y Chen, X Pan, G Guo, S Zou, R Riley
IEEE Transactions on Mobile Computing 17 (11), 2675-2688, 2018
System and method for privacy leakage detection and prevention system without operating system modification
Y Chen, V Rastogi, Z Qu, J McClurg
US Patent 10,460,112, 2019
Neural-augmented static analysis of android communication
J Zhao, A Albarghouthi, V Rastogi, S Jha, D Octeau
Proceedings of the 2018 26th acm joint meeting on european software …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20