dblp.uni-trier.dewww.uni-trier.de

V. N. Venkatakrishnan

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
18EEZhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar: Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Trans. Inf. Syst. Secur. 12(3): (2009)
2008
17EEA. Prasad Sistla, V. N. Venkatakrishnan, Michelle Zhou, Hilary Branske: CMV: automatic verification of complete mediation for java virtual machines. ASIACCS 2008: 100-111
16EEWeiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan: Expanding Malware Defense by Securing Software Installations. DIMVA 2008: 164-185
15EEPrithvi Bisht, V. N. Venkatakrishnan: XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. DIMVA 2008: 23-43
14EEMike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan: Enhancing web browser security against malware extensions. Journal in Computer Virology 4(3): 179-195 (2008)
2007
13EESruthi Bandhakavi, Prithvi Bisht, P. Madhusudan, V. N. Venkatakrishnan: CANDID: preventing sql injection attacks using dynamic candidate evaluations. ACM Conference on Computer and Communications Security 2007: 12-24
12EEMike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan: Extensible Web Browser Security. DIMVA 2007: 1-19
2006
11EETejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan: Data Sandboxing: A Technique for Enforcing Confidentiality Policies. ACSAC 2006: 223-234
10EEV. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar: Provably Correct Runtime Enforcement of Non-interference Properties. ICICS 2006: 332-351
9EEWei Xu, V. N. Venkatakrishnan, R. Sekar, I. V. Ramakrishnan: A Framework for Building Privacy-Conscious Composite Web Services. ICWS 2006: 655-662
8EEDoo San Sim, V. N. Venkatakrishnan: SUEZ: A Distributed Safe Execution Environment for System Administration Trials. LISA 2006: 161-173
2005
7EEWeiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar: One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. NDSS 2005
6EEWei Xu, R. Sekar, I. V. Ramakrishnan, V. N. Venkatakrishnan: An approach for realizing privacy-preserving web-based services. WWW (Special interest tracks and posters) 2005: 1014-1015
2003
5EEZhenkai Liang, V. N. Venkatakrishnan, R. Sekar: Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. ACSAC 2003: 182-191
4EEDaniel C. DuVarney, V. N. Venkatakrishnan, Sandeep Bhatkar: SELF: a transparent security extension for ELF binaries. NSPW 2003: 29-38
3EER. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney: Model-carrying code: a practical approach for safe execution of untrusted applications. SOSP 2003: 15-28
2002
2EEV. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang: An Approach for Secure Software Installation. LISA 2002: 219-226
2000
1 C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka, Yifei Dong, Xiaoqun Du, Abhik Roychoudhury, V. N. Venkatakrishnan: XMC: A Logic-Programming-Based Verification Toolset. CAV 2000: 576-580

Coauthor Index

1Sruthi Bandhakavi [13]
2Samik Basu [3]
3Sandeep Bhatkar [3] [4]
4Prithvi Bisht [13] [15]
5Hilary Branske [17]
6Yifei Dong [1]
7Xiaoqun Du [1]
8Daniel C. DuVarney [3] [4] [10]
9T. Kamat [2]
10Tejas Khatiwala [11]
11Zhenkai Liang [2] [5] [7] [16] [18]
12Jin Soon Lim [12] [14]
13Mike Ter Louw [12] [14]
14P. Madhusudan (Parthasarathy Madhusudan) [13]
15C. R. Ramakrishnan [1]
16I. V. Ramakrishnan [1] [6] [9]
17Abhik Roychoudhury [1]
18R. Sekar [2] [3] [5] [6] [7] [9] [10] [16] [18]
19Doo San Sim [8]
20A. Prasad Sistla [17]
21Scott A. Smolka [1]
22Weiqing Sun [7] [16] [18]
23Raj Swaminathan [11]
24S. Tsipa [2]
25Wei Xu [6] [9] [10]
26Michelle Zhou [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)