Holmes: real-time apt detection through correlation of suspicious information flows SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan 2019 IEEE symposium on security and privacy (SP), 1137-1152, 2019 | 559 | 2019 |
Blueprint: Robust prevention of cross-site scripting attacks for existing browsers M Ter Louw, VN Venkatakrishnan 2009 30th IEEE symposium on security and privacy, 331-346, 2009 | 301 | 2009 |
Fast memory-efficient anomaly detection in streaming heterogeneous graphs E Manzoor, SM Milajerdi, L Akoglu Proceedings of the 22nd ACM SIGKDD international conference on knowledge …, 2016 | 296 | 2016 |
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ... 26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017 | 291 | 2017 |
XSS-GUARD: precise dynamic prevention of cross-site scripting attacks P Bisht, V Venkatakrishnan Detection of Intrusions and Malware, and Vulnerability Assessment, 23-43, 2008 | 288 | 2008 |
Model-carrying code: a practical approach for safe execution of untrusted applications R Sekar, VN Venkatakrishnan, S Basu, S Bhatkar, DC DuVarney ACM SIGOPS Operating Systems Review 37 (5), 15-28, 2003 | 283 | 2003 |
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 253 | 2019 |
On the role and challenges of CFD in the aerospace industry PR Spalart, V Venkatakrishnan The Aeronautical Journal 120 (1223), 209-232, 2016 | 253 | 2016 |
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks P Bisht, P Madhusudan, VN Venkatakrishnan ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-39, 2010 | 233 | 2010 |
CANDID: preventing SQL injection attacks using dynamic candidate evaluations S Bandhakavi, P Bisht, P Madhusudan, VN Venkatakrishnan Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 223 | 2007 |
Implicit solvers for unstructured meshes V Venkatakrishnan, DJ Mavriplis Journal of computational Physics 105 (1), 83-91, 1993 | 204 | 1993 |
The NAS parallel benchmarks D Bailey, E Barszcz, J Barton, D Browning, R Carter, L Dagum, R Fatoohi, ... Technical Report RNR-94-007, NASA Ames Research Center,(March 1994), 2010 | 181 | 2010 |
{AdJail}: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements M Ter Louw, KT Ganesh, VN Venkatakrishnan 19th USENIX Security Symposium (USENIX Security 10), 2010 | 170 | 2010 |
Isolated program execution: An application transparent approach for executing untrusted programs Z Liang, VN Venkatakrishnan, R Sekar 19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003 | 158 | 2003 |
Notamper: automatic blackbox detection of parameter tampering opportunities in web applications P Bisht, T Hinrichs, N Skrupsky, R Bobrowicz, VN Venkatakrishnan Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 138 | 2010 |
Enhancing web browser security against malware extensions M Ter Louw, JS Lim, VN Venkatakrishnan Journal in Computer Virology 4, 179-195, 2008 | 131 | 2008 |
Extractor: Extracting attack behavior from threat reports K Satvat, R Gjomemo, VN Venkatakrishnan 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 598-615, 2021 | 122 | 2021 |
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. W Sun, Z Liang, VN Venkatakrishnan, R Sekar NDSS, 2005 | 108 | 2005 |
Waptec: whitebox analysis of web applications for parameter tampering exploit construction P Bisht, T Hinrichs, N Skrupsky, VN Venkatakrishnan Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 106 | 2011 |
XMC: A logic-programming-based verification toolset CR Ramakrishnan, IV Ramakrishnan, SA Smolka, Y Dong, X Du, ... International Conference on Computer Aided Verification, 576-580, 2000 | 102 | 2000 |