Follow
Vinod Ganapathy
Vinod Ganapathy
Professor of Computer Science, Indian Institute of Science Bangalore
Verified email at iisc.ac.in - Homepage
Title
Cited by
Cited by
Year
Automatic inference and enforcement of kernel data structure invariants
A Baliga, V Ganapathy, L Iftode
2008 Annual Computer Security Applications Conference (ACSAC), 77-86, 2008
337*2008
Rootkits on smart phones: attacks, implications and opportunities
J Bickford, R O'Hare, A Baliga, V Ganapathy, L Iftode
Proceedings of the eleventh workshop on mobile computing systems …, 2010
2082010
Analyzing information flow in JavaScript-based browser extensions
M Dhawan, V Ganapathy
2009 Annual Computer Security Applications Conference, 382-391, 2009
2002009
Privately querying location-based services with sybilquery
P Shankar, V Ganapathy, L Iftode
Proceedings of the 11th international conference on Ubiquitous computing, 31-40, 2009
1902009
Self-service cloud computing
S Butt, HA Lagar-Cavilla, A Srivastava, V Ganapathy
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1812012
The design and implementation of microdrivers
V Ganapathy, MJ Renzelmann, A Balakrishnan, MM Swift, S Jha
ACM Sigplan Notices 43 (3), 168-178, 2008
175*2008
Buffer overrun detection using linear programming and static analysis
V Ganapathy, S Jha, D Chandler, D Melski, D Vitek
Proceedings of the 10th ACM conference on Computer and communications …, 2003
1682003
K2C: Cryptographic cloud storage with lazy revocation and anonymous access
S Zarandioon, DD Yao, V Ganapathy
International Conference on Security and Privacy in Communication Systems, 59-76, 2011
832011
Automatic placement of authorization hooks in the Linux security modules framework
V Ganapathy, T Jaeger, S Jha
Proceedings of the 12th ACM conference on Computer and communications …, 2005
832005
NetSpy: Automatic generation of spyware signatures for NIDS
H Wang, S Jha, V Ganapathy
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 99-108, 2006
762006
Activethief: Model extraction using active learning and unannotated public data
S Pal, Y Gupta, A Shukla, A Kanade, S Shevade, V Ganapathy
Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 865-872, 2020
74*2020
An auctioning reputation system based on anomaly
S Rubin, M Christodorescu, V Ganapathy, JT Giffin, L Kruger, H Wang, ...
Proceedings of the 12th ACM conference on computer and communications …, 2005
722005
Retrofitting legacy code for authorization policy enforcement
V Ganapathy, T Jaeger, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-229, 2006
692006
Improving nfa-based signature matching using ordered binary decision diagrams
L Yang, R Karim, V Ganapathy, R Smith
International Workshop on Recent Advances in Intrusion Detection, 58-78, 2010
62*2010
Inferring likely mappings between APIs
A Gokhale, V Ganapathy, Y Padmanaban
2013 35th International Conference on Software Engineering (ICSE), 82-91, 2013
592013
Security versus energy tradeoffs in host-based mobile malware detection
J Bickford, HA Lagar-Cavilla, A Varshavsky, V Ganapathy, L Iftode
Proceedings of the 9th international conference on Mobile systems …, 2011
592011
An analysis of the mozilla jetpack extension framework
R Karim, M Dhawan, V Ganapathy, C Shan
European Conference on Object-Oriented Programming, 333-355, 2012
552012
Mining security-sensitive operations in legacy code using concept analysis
V Ganapathy, D King, T Jaeger, S Jha
29th International Conference on Software Engineering (ICSE'07), 458-467, 2007
532007
Automatic discovery of API-level exploits
V Ganapathy, SA Seshia, S Jha, TW Reps, RE Bryant
Proceedings of the 27th international conference on Software engineering …, 2005
51*2005
Regulating arm trustzone devices in restricted spaces
F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
502016
The system can't perform the operation now. Try again later.
Articles 1–20