Follow
Prashant Anantharaman
Prashant Anantharaman
Senior Security Researcher at Narf Industries
Verified email at narfindustries.com - Homepage
Title
Cited by
Cited by
Year
Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things
I Agadakos, CY Chen, M Campanelli, P Anantharaman, M Hasan, ...
462017
Building Hardened Internet-of-Things Clients with Language-theoretic Security
P Anantharaman, M Locasto, GF Ciocarlie, U Lindqvist
IEEE Symposium on Security and Privacy Workshops, 2017
222017
Ghostbusting: Mitigating Spectre with intraprocess memory isolation
IR Jenkins, P Anantharaman, R Shapiro, JP Brady, S Bratus, SW Smith
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-11, 2020
182020
IoTHound: environment-agnostic device identification and monitoring
P Anantharaman, L Song, I Agadakos, G Ciocarlie, B Copos, U Lindqvist, ...
Proceedings of the 10th International Conference on the Internet of Things, 1-9, 2020
152020
The Parsley data format definition language
P Mundkur, L Briesemeister, N Shankar, P Anantharaman, S Ali, Z Lucas, ...
2020 IEEE Security and Privacy Workshops (SPW), 300-307, 2020
102020
Phasorsec: Protocol security filters for wide area measurement systems
P Anantharaman, K Palani, R Brantley, G Brown, S Bratus, SW Smith
2018 IEEE International Conference on Communications, Control, and Computing …, 2018
102018
Mismorphism: The heart of the weird machine
P Anantharaman, V Kothari, JP Brady, IR Jenkins, S Ali, MC Millian, ...
Security Protocols XXVII: 27th International Workshop, Cambridge, UK, April …, 2020
92020
I am Joe’s Fridge: Scalable Identity in the Internet of Things
P Anantharaman, K Palani, D Nicol, SW Smith
IEEE International Conference on Internet of Things (iThings), 129--135, 2016
82016
What we have here is failure to validate: Summer of LangSec
S Ali, P Anantharaman, Z Lucas, SW Smith
IEEE Security & Privacy 19 (3), 17-23, 2021
62021
Going Dark: A Retrospective on the North American Blackout of 2038
P Anantharaman, JP Brady, P Flathers, VH Kothari, MC Millian, J Reeves, ...
Proceedings of the New Security Paradigms Workshop, 52-63, 2018
52018
Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic Security
P Anantharaman, MC Millian, S Bratus, ML Patterson
Cybersecurity Development (SecDev), 2017 IEEE, 4-5, 2017
52017
Intent as a secure design primitive
P Anantharaman, JP Brady, IR Jenkins, VH Kothari, MC Millian, K Palani, ...
Modeling and Design of Secure Internet of Things, 529-562, 2020
42020
Scalable identity and key management for publish-subscribe protocols in the Internet-of-Things
P Anantharaman, K Palani, S Smith
Proceedings of the 9th International Conference on the Internet of Things, 1-7, 2019
42019
Capturing the iccMAX calculatorElement: a case study on format design
VH Kothari, P Anantharaman, SW Smith, B Hitaj, P Mundkur, N Shankar, ...
2022 IEEE Security and Privacy Workshops (SPW), 176-197, 2022
32022
Protecting Systems from Exploits Using Language-Theoretic Security
P Anantharaman
Dartmouth College, 2022
32022
A communications validity detector for SCADA networks
P Anantharaman, A Chachra, S Sinha, M Millian, B Copos, S Smith, ...
Critical Infrastructure Protection XV: 15th IFIP WG 11.10 International …, 2022
32022
Armor Within: Defending Against Vulnerabilities in Third-Party Libraries
S Ali, P Anantharaman, SW Smith
2020 IEEE Security and Privacy Workshops (SPW), 291-299, 2020
32020
Converting an electric power utility network to defend against crafted inputs
M Millian, P Anantharaman, S Bratus, S Smith, M Locasto
Critical Infrastructure Protection XIII: 13th IFIP WG 11.10 International …, 2019
32019
A format-aware reducer for scriptable rewriting of PDF files
P Anantharaman, S Cheung, N Boorman, ME Locasto
2022 IEEE Security and Privacy Workshops (SPW), 136-151, 2022
22022
Parsing PEGs with Length Fields in Software and Hardware
ZS Lucas, JY Liu, P Anantharaman, SW Smith
2021 IEEE Security and Privacy Workshops (SPW), 128-133, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20