Vinod Ganapathy
Vinod Ganapathy
Associate Professor, Department of Computer Science and Automation, Indian Institute of Science
Verified email at iisc.ac.in - Homepage
Title
Cited by
Cited by
Year
Automatic inference and enforcement of kernel data structure invariants
A Baliga, V Ganapathy, L Iftode
2008 Annual Computer Security Applications Conference (ACSAC), 77-86, 2008
298*2008
Rootkits on smart phones: attacks, implications and opportunities
J Bickford, R O'Hare, A Baliga, V Ganapathy, L Iftode
Proceedings of the eleventh workshop on mobile computing systems …, 2010
1882010
Analyzing information flow in JavaScript-based browser extensions
M Dhawan, V Ganapathy
2009 Annual Computer Security Applications Conference, 382-391, 2009
1762009
Privately querying location-based services with sybilquery
P Shankar, V Ganapathy, L Iftode
Proceedings of the 11th international conference on Ubiquitous computing, 31-40, 2009
1662009
Self-service cloud computing
S Butt, HA Lagar-Cavilla, A Srivastava, V Ganapathy
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1582012
The design and implementation of microdrivers
V Ganapathy, MJ Renzelmann, A Balakrishnan, MM Swift, S Jha
ACM Sigplan Notices 43 (3), 168-178, 2008
154*2008
Buffer overrun detection using linear programming and static analysis
V Ganapathy, S Jha, D Chandler, D Melski, D Vitek
Proceedings of the 10th ACM conference on Computer and communications …, 2003
1542003
Automatic placement of authorization hooks in the Linux security modules framework
V Ganapathy, T Jaeger, S Jha
Proceedings of the 12th ACM conference on Computer and communications …, 2005
722005
K2C: Cryptographic cloud storage with lazy revocation and anonymous access
S Zarandioon, DD Yao, V Ganapathy
International Conference on Security and Privacy in Communication Systems, 59-76, 2011
692011
An auctioning reputation system based on anomaly
S Rubin, M Christodorescu, V Ganapathy, JT Giffin, L Kruger, H Wang, ...
Proceedings of the 12th ACM conference on Computer and communications …, 2005
682005
Retrofitting legacy code for authorization policy enforcement
V Ganapathy, T Jaeger, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-229, 2006
642006
Security versus energy tradeoffs in host-based mobile malware detection
J Bickford, HA Lagar-Cavilla, A Varshavsky, V Ganapathy, L Iftode
Proceedings of the 9th international conference on Mobile systems …, 2011
532011
An analysis of the mozilla jetpack extension framework
R Karim, M Dhawan, V Ganapathy, C Shan
European Conference on Object-Oriented Programming, 333-355, 2012
522012
NetSpy: Automatic generation of spyware signatures for NIDS
H Wang, S Jha, V Ganapathy
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 99-108, 2006
512006
Automatic discovery of API-level exploits
V Ganapathy, SA Seshia, S Jha, TW Reps, RE Bryant
Proceedings of the 27th international conference on Software engineering …, 2005
51*2005
Improving NFA-based signature matching using ordered binary decision diagrams
L Yang, R Karim, V Ganapathy, R Smith
International Workshop on Recent Advances in Intrusion Detection, 58-78, 2010
48*2010
Mining security-sensitive operations in legacy code using concept analysis
V Ganapathy, D King, T Jaeger, S Jha
29th International Conference on Software Engineering (ICSE'07), 458-467, 2007
482007
Inferring likely mappings between APIs
A Gokhale, V Ganapathy, Y Padmanaban
2013 35th International Conference on Software Engineering (ICSE), 82-91, 2013
472013
Heapmd: Identifying heap-based bugs using anomaly detection
TM Chilimbi, V Ganapathy
ACM SIGOPS Operating Systems Review 40 (5), 219-228, 2006
442006
Enforcing authorization policies using transactional memory introspection
A Birgisson, M Dhawan, U Erlingsson, V Ganapathy, L Iftode
Proceedings of the 15th ACM conference on Computer and communications …, 2008
392008
The system can't perform the operation now. Try again later.
Articles 1–20