Hayawardh Vijayakumar
Hayawardh Vijayakumar
Samsung Research America
Bestätigte E-Mail-Adresse bei samsung.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Seeding clouds with trust anchors
J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010
1432010
Sprobes: Enforcing kernel code integrity on the trustzone architecture
X Ge, H Vijayakumar, T Jaeger
arXiv preprint arXiv:1410.7747, 2014
1342014
Integrity walls: Finding attack surfaces from mandatory access control policies
H Vijayakumar, G Jakka, S Rueda, J Schiffman, T Jaeger
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
522012
Cloud verifier: Verifiable auditing service for iaas clouds
J Schiffman, Y Sun, H Vijayakumar, T Jaeger
2013 IEEE Ninth World Congress on Services, 239-246, 2013
432013
NORAX: Enabling execute-only memory for COTS binaries on AArch64
Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ...
2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017
402017
Verifying system integrity by proxy
J Schiffman, H Vijayakumar, T Jaeger
International Conference on Trust and Trustworthy Computing, 179-200, 2012
292012
{JIGSAW}: Protecting Resource Access by Inferring Programmer Expectations
H Vijayakumar, X Ge, M Payer, T Jaeger
23rd {USENIX} Security Symposium ({USENIX} Security 14), 973-988, 2014
242014
{STING}: Finding Name Resolution Vulnerabilities in Programs
H Vijayakumar, J Schiffman, T Jaeger
21st {USENIX} Security Symposium ({USENIX} Security 12), 585-599, 2012
202012
PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
L Harrison, H Vijayakumar, R Padhye, K Sen, M Grace
Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020), 2020
172020
Attention spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem
DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 273-290, 2018
152018
Process firewalls: Protecting processes during resource access
H Vijayakumar, J Schiffman, T Jaeger
Proceedings of the 8th ACM European Conference on Computer Systems, 57-70, 2013
152013
Analysis of virtual machine system policies
S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 14th ACM symposium on Access control models and …, 2009
152009
Transforming commodity security policies to enforce Clark-Wilson integrity
D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
132012
A scalable parallelization of all-pairs shortest path algorithm for a high performance cluster environment
T Srinivasan, R Balakrishnan, SA Gangadharan, V Hayawardh
2007 International Conference on Parallel and Distributed Systems, 1-8, 2007
132007
Instaguard: Instantly deployable hot-patches for vulnerable system programs on android
Y Chen, Y Li, L Lu, YH Lin, H Vijayakumar, Z Wang, X Ou
2018 Network and Distributed System Security Symposium (NDSS'18), 2018
122018
Cloud armor: Protecting cloud commands from compromised cloud services
Y Sun, G Petracca, T Jaeger, H Vijayakumar, J Schiffman
2015 IEEE 8th International Conference on Cloud Computing, 253-260, 2015
112015
FuzzFactory: domain-specific fuzzing with waypoints
R Padhye, C Lemieux, K Sen, L Simon, H Vijayakumar
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-29, 2019
92019
Cut me some security
D Muthukumaran, S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 3rd ACM workshop on Assurable and Usable Security …, 2010
72010
The Right Files at the Right Time
H Vijayakumar, T Jaeger
Automated Security Management, 119-133, 2013
22013
A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution
H Vijayakumar, J Schiffman, T Jaeger
2011 Seventh European Conference on Computer Network Defense, 1-8, 2011
22011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20