VN Venkatakrishnan
Cited by
Cited by
Holmes: real-time apt detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019
Blueprint: Robust prevention of cross-site scripting attacks for existing browsers
M Ter Louw, VN Venkatakrishnan
2009 30th IEEE symposium on security and privacy, 331-346, 2009
Model-carrying code: a practical approach for safe execution of untrusted applications
R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney
ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003
XSS-GUARD: precise dynamic prevention of cross-site scripting attacks
P Bisht, V Venkatakrishnan
Detection of Intrusions and Malware, and Vulnerability Assessment, 23-43, 2008
Fast memory-efficient anomaly detection in streaming heterogeneous graphs
E Manzoor, SM Milajerdi, L Akoglu
Proceedings of the 22nd ACM SIGKDD international conference on knowledge …, 2016
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
P Bisht, P Madhusudan, VN Venkatakrishnan
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-39, 2010
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017
CANDID: preventing SQL injection attacks using dynamic candidate evaluations
S Bandhakavi, P Bisht, P Madhusudan, VN Venkatakrishnan
Proceedings of the 14th ACM conference on Computer and communications …, 2007
On the role and challenges of CFD in the aerospace industry
PR Spalart, V Venkatakrishnan
The Aeronautical Journal 120 (1223), 209-232, 2016
Implicit solvers for unstructured meshes
V Venkatakrishnan, DJ Mavriplis
Journal of computational Physics 105 (1), 83-91, 1993
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting
SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
{AdJail}: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
M Ter Louw, KT Ganesh, VN Venkatakrishnan
19th USENIX Security Symposium (USENIX Security 10), 2010
Isolated program execution: An application transparent approach for executing untrusted programs
Z Liang, VN Venkatakrishnan, R Sekar
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
Notamper: automatic blackbox detection of parameter tampering opportunities in web applications
P Bisht, T Hinrichs, N Skrupsky, R Bobrowicz, VN Venkatakrishnan
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Enhancing web browser security against malware extensions
M Ter Louw, JS Lim, VN Venkatakrishnan
Journal in Computer Virology 4, 179-195, 2008
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
W Sun, Z Liang, VN Venkatakrishnan, R Sekar
NDSS, 2005
A framework for building privacy-conscious composite web services
W Xu, VN Venkatakrishnan, R Sekar, IV Ramakrishnan
2006 IEEE International Conference on Web Services (ICWS'06), 655-662, 2006
Waptec: whitebox analysis of web applications for parameter tampering exploit construction
P Bisht, T Hinrichs, N Skrupsky, VN Venkatakrishnan
Proceedings of the 18th ACM conference on Computer and communications …, 2011
XMC: A logic-programming-based verification toolset
CR Ramakrishnan, IV Ramakrishnan, SA Smolka, Y Dong, X Du, ...
International Conference on Computer Aided Verification, 576-580, 2000
Preventing information leaks through shadow executions
R Capizzi, A Longo, VN Venkatakrishnan, AP Sistla
2008 Annual Computer Security Applications Conference (ACSAC), 322-331, 2008
The system can't perform the operation now. Try again later.
Articles 1–20