Dinakar Dhurjati
Dinakar Dhurjati
Staff Engineer, Qualcomm Research Silicon Valley
Verified email at qti.qualcomm.com
Cited by
Cited by
A fast automaton-based method for detecting anomalous program behaviors
R Sekar, M Bendre, D Dhurjati, P Bollineni
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 144-155, 2000
Automated test input generation for web applications
G Wassermann, D Yu, A Chander, D Dhurjati, H Inamura
US Patent 8,302,080, 2012
Backwards-compatible array bounds checking for C with very low overhead
D Dhurjati, V Adve
Proceedings of the 28th international conference on Software engineering …, 2006
Dynamic test input generation for web applications
G Wassermann, D Yu, A Chander, D Dhurjati, H Inamura, Z Su
Proceedings of the 2008 international symposium on Software testing and …, 2008
Secure virtual architecture: A safe execution environment for commodity operating systems
J Criswell, A Lenharth, D Dhurjati, V Adve
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
SAFECode: Enforcing alias analysis for weakly typed languages
D Dhurjati, S Kowshik, V Adve
ACM SIGPLAN Notices 41 (6), 144-157, 2006
Memory safety without runtime checks or garbage collection
D Dhurjati, S Kowshik, V Adve, C Lattner
Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and …, 2003
Efficiently detecting all dangling pointer uses in production servers
D Dhurjati, V Adve
International Conference on Dependable Systems and Networks (DSN'06), 269-280, 2006
Nested kernel: An operating system architecture for intra-kernel privilege separation
N Dautenhahn, T Kasampalis, W Dietz, J Criswell, V Adve
Proceedings of the Twentieth International Conference on Architectural …, 2015
Ensuring code safety without runtime checks for real-time control systems
S Kowshik, D Dhurjati, V Adve
Proceedings of the 2002 International Conference on Compilers, Architecture …, 2002
Scaling up superoptimization
PM Phothilimthana, A Thakur, R Bodik, D Dhurjati
Proceedings of the Twenty-First International Conference on Architectural …, 2016
Memory safety without garbage collection for embedded applications
D Dhurjati, S Kowshik, V Adve, C Lattner
ACM Transactions on Embedded Computing Systems (TECS) 4 (1), 73-111, 2005
Path-sensitive dataflow analysis with iterative refinement
D Dhurjati, M Das, Y Yang
International Static Analysis Symposium, 425-442, 2006
Method for test suite reduction through system call coverage criterion
D Dhurjati, A Chander, H Inamura
US Patent App. 12/204,654, 2009
Energy-Efficient Run-Time Offloading of Dynamically Generated Code in Heterogenuous Multiprocessor Systems
SAK Gathala, D Dhurjati, A Ermolinskiy, CA Vick
US Patent App. 13/961,122, 2015
Optimal test input sequence generation for finite state models and pushdown systems
A Chander, D Dhurjati, K Sen, D Yu
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
Formal specification and analysis of timing properties in software systems
M AlTurki, D Dhurjati, D Yu, A Chander, H Inamura
International Conference on Fundamental Approaches to Software Engineering …, 2009
Data Protection Using Virtual Resource Views
M Christodorescu, D Dhurjati, N Islam
US Patent App. 15/076,936, 2017
Greenthumb: Superoptimizer construction framework
PM Phothilimthana, A Thakur, R Bodik, D Dhurjati
Proceedings of the 25th International Conference on Compiler Construction …, 2016
Efficient directed acyclic graph pattern matching to enable code partitioning and execution on heterogeneous processor cores
D Dhurjati, M Kim, CA Vick
US Patent 9,201,659, 2015
The system can't perform the operation now. Try again later.
Articles 1–20