2008 |
11 | EE | Arnar Birgisson,
Mohan Dhawan,
Úlfar Erlingsson,
Vinod Ganapathy,
Liviu Iftode:
Enforcing authorization policies using transactional memory introspection.
ACM Conference on Computer and Communications Security 2008: 223-234 |
10 | EE | Vinod Ganapathy,
Matthew J. Renzelmann,
Arini Balakrishnan,
Michael M. Swift,
Somesh Jha:
The design and implementation of microdrivers.
ASPLOS 2008: 168-178 |
2007 |
9 | EE | Vinod Ganapathy,
Dave King,
Trent Jaeger,
Somesh Jha:
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis.
ICSE 2007: 458-467 |
2006 |
8 | EE | Hao Wang,
Somesh Jha,
Vinod Ganapathy:
NetSpy: Automatic Generation of Spyware Signatures for NIDS.
ACSAC 2006: 99-108 |
7 | EE | Trishul M. Chilimbi,
Vinod Ganapathy:
HeapMD: identifying heap-based bugs using anomaly detection.
ASPLOS 2006: 219-228 |
6 | EE | Vinod Ganapathy,
Trent Jaeger,
Somesh Jha:
Retrofitting Legacy Code for Authorization Policy Enforcement.
IEEE Symposium on Security and Privacy 2006: 214-229 |
2005 |
5 | EE | Shai Rubin,
Mihai Christodorescu,
Vinod Ganapathy,
Jonathon T. Giffin,
Louis Kruger,
Hao Wang,
Nicholas Kidd:
An auctioning reputation system based on anomaly.
ACM Conference on Computer and Communications Security 2005: 270-279 |
4 | EE | Vinod Ganapathy,
Trent Jaeger,
Somesh Jha:
Automatic placement of authorization hooks in the linux security modules framework.
ACM Conference on Computer and Communications Security 2005: 330-339 |
3 | EE | Vinod Ganapathy,
Sanjit A. Seshia,
Somesh Jha,
Thomas W. Reps,
Randal E. Bryant:
Automatic discovery of API-level exploits.
ICSE 2005: 312-321 |
2003 |
2 | EE | Vinod Ganapathy,
Somesh Jha,
David Chandler,
David Melski,
David Vitek:
Buffer overrun detection using linear programming and static analysis.
ACM Conference on Computer and Communications Security 2003: 345-354 |
2002 |
1 | EE | Vinod Ganapathy,
S. Ramesh:
Slicing Synchronous Reactive Programs.
Electr. Notes Theor. Comput. Sci. 65(5): (2002) |