Vinod Ganapathy
Vinod Ganapathy
Professor of Computer Science, Indian Institute of Science Bangalore
Verified email at - Homepage
Cited by
Cited by
Automatic inference and enforcement of kernel data structure invariants
A Baliga, V Ganapathy, L Iftode
2008 Annual Computer Security Applications Conference (ACSAC), 77-86, 2008
Rootkits on smart phones: attacks, implications and opportunities
J Bickford, R O'Hare, A Baliga, V Ganapathy, L Iftode
Proceedings of the eleventh workshop on mobile computing systems …, 2010
Analyzing information flow in JavaScript-based browser extensions
M Dhawan, V Ganapathy
2009 Annual Computer Security Applications Conference, 382-391, 2009
Privately querying location-based services with sybilquery
P Shankar, V Ganapathy, L Iftode
Proceedings of the 11th international conference on Ubiquitous computing, 31-40, 2009
The design and implementation of microdrivers
V Ganapathy, MJ Renzelmann, A Balakrishnan, MM Swift, S Jha
ACM Sigplan Notices 43 (3), 168-178, 2008
Self-service cloud computing
S Butt, HA Lagar-Cavilla, A Srivastava, V Ganapathy
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Buffer overrun detection using linear programming and static analysis
V Ganapathy, S Jha, D Chandler, D Melski, D Vitek
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Activethief: Model extraction using active learning and unannotated public data
S Pal, Y Gupta, A Shukla, A Kanade, S Shevade, V Ganapathy
Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 865-872, 2020
Faastlane: Accelerating {Function-as-a-Service} Workflows
S Kotni, A Nayak, V Ganapathy, A Basu
2021 USENIX Annual Technical Conference (USENIX ATC 21), 805-820, 2021
Automatic placement of authorization hooks in the Linux security modules framework
V Ganapathy, T Jaeger, S Jha
Proceedings of the 12th ACM conference on Computer and communications …, 2005
K2C: Cryptographic cloud storage with lazy revocation and anonymous access
S Zarandioon, D Yao, V Ganapathy
International Conference on Security and Privacy in Communication Systems, 59-76, 2011
NetSpy: Automatic generation of spyware signatures for NIDS
H Wang, S Jha, V Ganapathy
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 99-108, 2006
An auctioning reputation system based on anomaly
S Rubin, M Christodorescu, V Ganapathy, JT Giffin, L Kruger, H Wang, ...
Proceedings of the 12th ACM conference on computer and communications …, 2005
Retrofitting legacy code for authorization policy enforcement
V Ganapathy, T Jaeger, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-229, 2006
Improving NFA-based signature matching using ordered binary decision diagrams
L Yang, R Karim, V Ganapathy, R Smith
International Workshop on Recent Advances in Intrusion Detection, 58-78, 2010
Inferring likely mappings between APIs
A Gokhale, V Ganapathy, Y Padmanaban
2013 35th International Conference on Software Engineering (ICSE), 82-91, 2013
Automatic discovery of API-level exploits
V Ganapathy, SA Seshia, S Jha, TW Reps, RE Bryant
Proceedings of the 27th international conference on Software engineering …, 2005
Regulating arm trustzone devices in restricted spaces
F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
Security versus energy tradeoffs in host-based mobile malware detection
J Bickford, HA Lagar-Cavilla, A Varshavsky, V Ganapathy, L Iftode
Proceedings of the 9th international conference on Mobile systems …, 2011
Testing cross-platform mobile app development frameworks (t)
N Boushehrinejadmoradi, V Ganapathy, S Nagarakatte, L Iftode
2015 30th IEEE/ACM International Conference on Automated Software …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20