2009 |
18 | EE | Zhenkai Liang,
Weiqing Sun,
V. N. Venkatakrishnan,
R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2008 |
17 | EE | A. Prasad Sistla,
V. N. Venkatakrishnan,
Michelle Zhou,
Hilary Branske:
CMV: automatic verification of complete mediation for java virtual machines.
ASIACCS 2008: 100-111 |
16 | EE | Weiqing Sun,
R. Sekar,
Zhenkai Liang,
V. N. Venkatakrishnan:
Expanding Malware Defense by Securing Software Installations.
DIMVA 2008: 164-185 |
15 | EE | Prithvi Bisht,
V. N. Venkatakrishnan:
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks.
DIMVA 2008: 23-43 |
14 | EE | Mike Ter Louw,
Jin Soon Lim,
V. N. Venkatakrishnan:
Enhancing web browser security against malware extensions.
Journal in Computer Virology 4(3): 179-195 (2008) |
2007 |
13 | EE | Sruthi Bandhakavi,
Prithvi Bisht,
P. Madhusudan,
V. N. Venkatakrishnan:
CANDID: preventing sql injection attacks using dynamic candidate evaluations.
ACM Conference on Computer and Communications Security 2007: 12-24 |
12 | EE | Mike Ter Louw,
Jin Soon Lim,
V. N. Venkatakrishnan:
Extensible Web Browser Security.
DIMVA 2007: 1-19 |
2006 |
11 | EE | Tejas Khatiwala,
Raj Swaminathan,
V. N. Venkatakrishnan:
Data Sandboxing: A Technique for Enforcing Confidentiality Policies.
ACSAC 2006: 223-234 |
10 | EE | V. N. Venkatakrishnan,
Wei Xu,
Daniel C. DuVarney,
R. Sekar:
Provably Correct Runtime Enforcement of Non-interference Properties.
ICICS 2006: 332-351 |
9 | EE | Wei Xu,
V. N. Venkatakrishnan,
R. Sekar,
I. V. Ramakrishnan:
A Framework for Building Privacy-Conscious Composite Web Services.
ICWS 2006: 655-662 |
8 | EE | Doo San Sim,
V. N. Venkatakrishnan:
SUEZ: A Distributed Safe Execution Environment for System Administration Trials.
LISA 2006: 161-173 |
2005 |
7 | EE | Weiqing Sun,
Zhenkai Liang,
V. N. Venkatakrishnan,
R. Sekar:
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
NDSS 2005 |
6 | EE | Wei Xu,
R. Sekar,
I. V. Ramakrishnan,
V. N. Venkatakrishnan:
An approach for realizing privacy-preserving web-based services.
WWW (Special interest tracks and posters) 2005: 1014-1015 |
2003 |
5 | EE | Zhenkai Liang,
V. N. Venkatakrishnan,
R. Sekar:
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs.
ACSAC 2003: 182-191 |
4 | EE | Daniel C. DuVarney,
V. N. Venkatakrishnan,
Sandeep Bhatkar:
SELF: a transparent security extension for ELF binaries.
NSPW 2003: 29-38 |
3 | EE | R. Sekar,
V. N. Venkatakrishnan,
Samik Basu,
Sandeep Bhatkar,
Daniel C. DuVarney:
Model-carrying code: a practical approach for safe execution of untrusted applications.
SOSP 2003: 15-28 |
2002 |
2 | EE | V. N. Venkatakrishnan,
R. Sekar,
T. Kamat,
S. Tsipa,
Zhenkai Liang:
An Approach for Secure Software Installation.
LISA 2002: 219-226 |
2000 |
1 | | C. R. Ramakrishnan,
I. V. Ramakrishnan,
Scott A. Smolka,
Yifei Dong,
Xiaoqun Du,
Abhik Roychoudhury,
V. N. Venkatakrishnan:
XMC: A Logic-Programming-Based Verification Toolset.
CAV 2000: 576-580 |