2008 |
11 | EE | Garrett Brown,
Travis Howe,
Micheal Ihbe,
Atul Prakash,
Kevin Borders:
Social networks and context-aware spam.
CSCW 2008: 403-412 |
10 | EE | Kevin Borders,
Atul Prakash:
Towards Quantification of Network-Based Information Leaks via HTTP.
HotSec 2008 |
9 | EE | Xin Zhao,
Kevin Borders,
Atul Prakash:
Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers.
Middleware 2008: 388-407 |
8 | EE | Laura Falk,
Atul Prakash,
Kevin Borders:
Analyzing websites for user-visible security design flaws.
SOUPS 2008: 117-126 |
2007 |
7 | EE | Kevin Borders,
Atul Prakash,
Mark Zielinski:
Spector: Automatically Analyzing Shell Code.
ACSAC 2007: 501-514 |
6 | EE | Xin Zhao,
Kevin Borders,
Atul Prakash:
Using a virtual machine to protect sensitive Grid resources.
Concurrency and Computation: Practice and Experience 19(14): 1917-1935 (2007) |
2006 |
5 | EE | Kevin Borders,
Xin Zhao,
Atul Prakash:
Securing sensitive content in a view-only file system.
Digital Rights Management Workshop 2006: 27-36 |
4 | EE | Kevin Borders,
Xin Zhao,
Atul Prakash:
Siren: Catching Evasive Malware (Short Paper).
IEEE Symposium on Security and Privacy 2006: 78-85 |
2005 |
3 | EE | Kevin Borders,
Xin Zhao,
Atul Prakash:
CPOL: high-performance policy evaluation.
ACM Conference on Computer and Communications Security 2005: 147-157 |
2 | EE | Xin Zhao,
Kevin Borders,
Atul Prakash:
Towards Protecting Sensitive Files in a Compromised System.
IEEE Security in Storage Workshop 2005: 21-28 |
2004 |
1 | EE | Kevin Borders,
Atul Prakash:
Web tap: detecting covert web traffic.
ACM Conference on Computer and Communications Security 2004: 110-120 |