Holmes: real-time apt detection through correlation of suspicious information flows SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan 2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019 | 483 | 2019 |
Blueprint: Robust prevention of cross-site scripting attacks for existing browsers M Ter Louw, VN Venkatakrishnan 2009 30th IEEE symposium on security and privacy, 331-346, 2009 | 292 | 2009 |
Model-carrying code: a practical approach for safe execution of untrusted applications R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003 | 281 | 2003 |
XSS-GUARD: precise dynamic prevention of cross-site scripting attacks P Bisht, V Venkatakrishnan Detection of Intrusions and Malware, and Vulnerability Assessment, 23-43, 2008 | 279 | 2008 |
Fast memory-efficient anomaly detection in streaming heterogeneous graphs E Manzoor, SM Milajerdi, L Akoglu Proceedings of the 22nd ACM SIGKDD international conference on knowledge …, 2016 | 267 | 2016 |
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ... 26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017 | 256 | 2017 |
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks P Bisht, P Madhusudan, VN Venkatakrishnan ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-39, 2010 | 227 | 2010 |
On the role and challenges of CFD in the aerospace industry PR Spalart, V Venkatakrishnan The Aeronautical Journal 120 (1223), 209-232, 2016 | 223 | 2016 |
CANDID: preventing SQL injection attacks using dynamic candidate evaluations S Bandhakavi, P Bisht, P Madhusudan, VN Venkatakrishnan Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 218 | 2007 |
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 209 | 2019 |
Implicit solvers for unstructured meshes V Venkatakrishnan, DJ Mavriplis Journal of computational Physics 105 (1), 83-91, 1993 | 207 | 1993 |
{AdJail}: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements M Ter Louw, KT Ganesh, VN Venkatakrishnan 19th USENIX Security Symposium (USENIX Security 10), 2010 | 168 | 2010 |
Isolated program execution: An application transparent approach for executing untrusted programs Z Liang, VN Venkatakrishnan, R Sekar 19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003 | 153 | 2003 |
Notamper: automatic blackbox detection of parameter tampering opportunities in web applications P Bisht, T Hinrichs, N Skrupsky, R Bobrowicz, VN Venkatakrishnan Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 136 | 2010 |
Enhancing web browser security against malware extensions M Ter Louw, JS Lim, VN Venkatakrishnan Journal in Computer Virology 4, 179-195, 2008 | 130 | 2008 |
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. W Sun, Z Liang, VN Venkatakrishnan, R Sekar NDSS, 2005 | 107 | 2005 |
Waptec: whitebox analysis of web applications for parameter tampering exploit construction P Bisht, T Hinrichs, N Skrupsky, VN Venkatakrishnan Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 104 | 2011 |
A framework for building privacy-conscious composite web services W Xu, VN Venkatakrishnan, R Sekar, IV Ramakrishnan 2006 IEEE International Conference on Web Services (ICWS'06), 655-662, 2006 | 102 | 2006 |
XMC: A logic-programming-based verification toolset CR Ramakrishnan, IV Ramakrishnan, SA Smolka, Y Dong, X Du, ... International Conference on Computer Aided Verification, 576-580, 2000 | 99 | 2000 |
Preventing information leaks through shadow executions R Capizzi, A Longo, VN Venkatakrishnan, AP Sistla 2008 Annual Computer Security Applications Conference (ACSAC), 322-331, 2008 | 97 | 2008 |