default search action
V. N. Venkatakrishnan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c54]Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan:
TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis. CODASPY 2024: 349-360 - 2023
- [c53]Mingqing Kang, Yichao Xu, Song Li, Rigel Gjomemo, Jianwei Hou, V. N. Venkatakrishnan, Yinzhi Cao:
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability. SP 2023: 1059-1076 - [i8]Sutanu Kumar Ghosh, Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan:
OSTINATO: Cross-host Attack Correlation Through Attack Activity Similarity Detection. CoRR abs/2312.09321 (2023) - 2022
- [c52]Sutanu Kumar Ghosh, Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan:
Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection. ICISS 2022: 1-22 - 2021
- [c51]Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan:
Extractor: Extracting Attack Behavior from Threat Reports. EuroS&P 2021: 598-615 - [i7]Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan:
EXTRACTOR: Extracting Attack Behavior from Threat Reports. CoRR abs/2104.08618 (2021) - 2020
- [j8]Hafiz Malik, Rigel Gjomemo, V. N. Venkatakrishnan, Rashid Ansari, Aun Irtaza:
Remote Check Truncation Systems: Vulnerability Analysis and Countermeasures. IEEE Access 8: 59485-59510 (2020)
2010 – 2019
- 2019
- [c50]Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan:
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. CCS 2019: 1813-1830 - [c49]Sadegh Momeni Milajerdi, Rigel Gjomemo, Birhanu Eshete, R. Sekar, V. N. Venkatakrishnan:
HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows. IEEE Symposium on Security and Privacy 2019: 1137-1152 - [i6]Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan:
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. CoRR abs/1910.00056 (2019) - 2018
- [c48]Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, Venkat N. Venkatakrishnan:
ProPatrol: Attack Investigation via Extracted High-Level Tasks. ICISS 2018: 107-126 - [c47]Abeer Alhuzali, Rigel Gjomemo, Birhanu Eshete, V. N. Venkatakrishnan:
NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications. USENIX Security Symposium 2018: 377-392 - [i5]Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan:
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. CoRR abs/1801.02062 (2018) - [i4]Sadegh M. Milajerdi, Rigel Gjomemo, Birhanu Eshete, R. Sekar, V. N. Venkatakrishnan:
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows. CoRR abs/1810.01594 (2018) - [i3]Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan:
ProPatrol: Attack Investigation via Extracted High-Level Tasks. CoRR abs/1810.05711 (2018) - 2017
- [c46]Birhanu Eshete, V. N. Venkatakrishnan:
DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection. DSN 2017: 463-474 - [c45]Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan:
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. USENIX Security Symposium 2017: 487-504 - 2016
- [c44]Abeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan:
Chainsaw: Chained Automated Workflow-based Exploit Generation. CCS 2016: 641-652 - [c43]Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan:
Patching Logic Vulnerabilities for Web Applications using LogicPatcher. CODASPY 2016: 73-84 - [c42]Rigel Gjomemo, Phu H. Phung, Edmund Ballou, Kedar S. Namjoshi, V. N. Venkatakrishnan, Lenore D. Zuck:
Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers. QRS 2016: 323-334 - [i2]Emaad A. Manzoor, Sadegh Momeni, Venkat N. Venkatakrishnan, Leman Akoglu:
Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs. CoRR abs/1602.04844 (2016) - [i1]Birhanu Eshete, Rigel Gjomemo, Md Nahid Hossain, Sadegh Momeni, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan, Junao Wang:
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program. CoRR abs/1610.06936 (2016) - 2015
- [j7]Phu H. Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, V. N. Venkatakrishnan:
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content. IEEE Trans. Dependable Secur. Comput. 12(4): 443-457 (2015) - [c41]Daniele Gallingani, Rigel Gjomemo, V. N. Venkatakrishnan, Stefano Zanero:
Practical Exploit Generation for Intent Message Vulnerabilities in Android. CODASPY 2015: 155-157 - [c40]Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip A. Porras, Venkat N. Venkatakrishnan, Vinod Yegneswaran:
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration. NDSS 2015 - [c39]Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang:
Vetting SSL Usage in Applications with SSLINT. IEEE Symposium on Security and Privacy 2015: 519-534 - [c38]Rigel Gjomemo, Kedar S. Namjoshi, Phu H. Phung, V. N. Venkatakrishnan, Lenore D. Zuck:
From Verification to Optimizations. VMCAI 2015: 300-317 - 2014
- [j6]Pratik Narang, Chittaranjan Hota, V. N. Venkatakrishnan:
PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification. EURASIP J. Inf. Secur. 2014: 15 (2014) - [j5]John C. Pendergrass, Karen Heart, C. Ranganathan, V. N. Venkatakrishnan:
A Threat Table Based Assessment of Information Security in Telemedicine. Int. J. Heal. Inf. Syst. Informatics 9(4): 20-31 (2014) - [j4]Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan:
Automated detection of parameter tampering opportunities and vulnerabilities in web applications. J. Comput. Secur. 22(3): 415-465 (2014) - [c37]Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan:
MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications. CCS 2014: 690-701 - [c36]Kalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan:
Minimizing lifetime of sensitive data in concurrent programs. CODASPY 2014: 171-174 - [c35]Birhanu Eshete, V. N. Venkatakrishnan:
WebWinnow: leveraging exploit kit workflows to detect malicious urls. CODASPY 2014: 305-312 - [c34]Rigel Gjomemo, Hafiz Malik, Nilesh Sumb, V. N. Venkatakrishnan, Rashid Ansari:
Digital Check Forgery Attacks on Client Check Truncation Systems. Financial Cryptography 2014: 3-20 - [c33]Kalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan:
DEICS: Data Erasure in Concurrent Software. NordSec 2014: 42-58 - 2013
- [c32]Nazari Skrupsky, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck:
TamperProof: a server-agnostic defense for parameter tampering attacks on web applications. CODASPY 2013: 129-140 - [c31]Mike Ter Louw, Phu H. Phung, Rohini Krishnamurti, Venkat N. Venkatakrishnan:
SafeScript: JavaScript Transformation for Policy Enforcement. NordSec 2013: 67-83 - [c30]Timothy L. Hinrichs, Daniele Rossetti, Gabriele Petronella, V. N. Venkatakrishnan, A. Prasad Sistla, Lenore D. Zuck:
WEBLOG: a declarative language for secure web development. PLAS 2013: 59-70 - 2012
- [c29]Kalpana Gondi, Prithvi Bisht, Praveen Venkatachari, A. Prasad Sistla, V. N. Venkatakrishnan:
SWIPE: eager erasure of sensitive data in large scale systems software. CODASPY 2012: 295-306 - [c28]Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck:
WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications. CyberSecurity 2012: 46-53 - [c27]Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy L. Hinrichs, Venkat N. Venkatakrishnan, Lenore D. Zuck:
Don't Repeat Yourself: Automatically Synthesizing Client-side Validation Code for Web Applications. WebApps 2012: 107-108 - [e1]Venkat N. Venkatakrishnan, Diganta Goswami:
Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings. Lecture Notes in Computer Science 7671, Springer 2012, ISBN 978-3-642-35129-7 [contents] - 2011
- [c26]Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan:
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction. CCS 2011: 575-586 - [r2]V. N. Venkatakrishnan:
Applications of Formal Methods to Web Application Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 45-46 - [r1]V. N. Venkatakrishnan:
Web Browser Security and Privacy. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1372-1373 - 2010
- [j3]Prithvi Bisht, Parthasarathy Madhusudan, V. N. Venkatakrishnan:
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks. ACM Trans. Inf. Syst. Secur. 13(2): 14:1-14:39 (2010) - [c25]Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, Radoslaw Bobrowicz, V. N. Venkatakrishnan:
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications. CCS 2010: 607-618 - [c24]Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakrishnan:
TAPS: automatically preparing safe SQL queries. CCS 2010: 645-647 - [c23]Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakrishnan:
Automatically Preparing Safe SQL Queries. Financial Cryptography 2010: 272-288 - [c22]V. N. Venkatakrishnan, Prithvi Bisht, Mike Ter Louw, Michelle Zhou, Kalpana Gondi, Karthik Thotta Ganesh:
WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper). ICISS 2010: 3-26 - [c21]Michelle Zhou, Prithvi Bisht, V. N. Venkatakrishnan:
Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation. ICISS 2010: 96-110 - [c20]Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkatakrishnan:
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements. USENIX Security Symposium 2010: 371-388
2000 – 2009
- 2009
- [j2]Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Trans. Inf. Syst. Secur. 12(3): 14:1-14:37 (2009) - [c19]Mike Ter Louw, V. N. Venkatakrishnan:
Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers. SP 2009: 331-346 - 2008
- [j1]Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan:
Enhancing web browser security against malware extensions. J. Comput. Virol. 4(3): 179-195 (2008) - [c18]Roberto Capizzi, Antonio Longo, V. N. Venkatakrishnan, A. Prasad Sistla:
Preventing Information Leaks through Shadow Executions. ACSAC 2008: 322-331 - [c17]A. Prasad Sistla, V. N. Venkatakrishnan, Michelle Zhou, Hilary Branske:
CMV: automatic verification of complete mediation for java virtual machines. AsiaCCS 2008: 100-111 - [c16]Prithvi Bisht, V. N. Venkatakrishnan:
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. DIMVA 2008: 23-43 - [c15]Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan:
Expanding Malware Defense by Securing Software Installations. DIMVA 2008: 164-185 - 2007
- [c14]Sruthi Bandhakavi, Prithvi Bisht, P. Madhusudan, V. N. Venkatakrishnan:
CANDID: preventing sql injection attacks using dynamic candidate evaluations. CCS 2007: 12-24 - [c13]Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan:
Extensible Web Browser Security. DIMVA 2007: 1-19 - 2006
- [c12]Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan:
Data Sandboxing: A Technique for Enforcing Confidentiality Policies. ACSAC 2006: 223-234 - [c11]V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar:
Provably Correct Runtime Enforcement of Non-interference Properties. ICICS 2006: 332-351 - [c10]Wei Xu, V. N. Venkatakrishnan, R. Sekar, I. V. Ramakrishnan:
A Framework for Building Privacy-Conscious Composite Web Services. ICWS 2006: 655-662 - [c9]Doo San Sim, V. N. Venkatakrishnan:
SUEZ: A Distributed Safe Execution Environment for System Administration Trials. LISA 2006: 161-173 - 2005
- [c8]Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar:
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. NDSS 2005 - [c7]Wei Xu, R. Sekar, I. V. Ramakrishnan, V. N. Venkatakrishnan:
An approach for realizing privacy-preserving web-based services. WWW (Special interest tracks and posters) 2005: 1014-1015 - 2003
- [c6]Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar:
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. ACSAC 2003: 182-191 - [c5]Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep Bhatkar:
SELF: a transparent security extension for ELF binaries. NSPW 2003: 29-38 - [c4]R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney:
Model-carrying code: a practical approach for safe execution of untrusted applications. SOSP 2003: 15-28 - 2002
- [c3]V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang:
An Approach for Secure Software Installation. LISA 2002: 219-226 - [c2]V. N. Venkatakrishnan, Ram Peri, R. Sekar:
Empowering mobile code using expressive security policies. NSPW 2002: 61-68 - 2000
- [c1]C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka, Yifei Dong, Xiaoqun Du, Abhik Roychoudhury, V. N. Venkatakrishnan:
XMC: A Logic-Programming-Based Verification Toolset. CAV 2000: 576-580
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint