Security analysis in role-based access control N Li, MV Tripunitara ACM Transactions on Information and System Security (TISSEC) 9 (4), 391-420, 2006 | 310 | 2006 |
Securing Computer Hardware Using 3D Integrated Circuit ({{{{{IC}}}}}) Technology and Split Manufacturing for Obfuscation F Imeson, A Emtenan, S Garg, M Tripunitara 22nd USENIX Security Symposium (USENIX Security 13), 495-510, 2013 | 262 | 2013 |
Integrated circuit (IC) decamouflaging: Reverse engineering camouflaged ICs within minutes. M El Massad, S Garg, MV Tripunitara NDSS, 1-14, 2015 | 244 | 2015 |
On mutually exclusive roles and separation-of-duty N Li, MV Tripunitara, Z Bizri ACM Transactions on Information and System Security (TISSEC) 10 (2), 5-es, 2007 | 238 | 2007 |
Towards formal verification of role-based access control policies S Jha, N Li, M Tripunitara, Q Wang, W Winsborough IEEE transactions on dependable and secure computing 5 (4), 242-255, 2008 | 183 | 2008 |
Reverse engineering camouflaged sequential circuits without scan access M El Massad, S Garg, M Tripunitara 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 33-40, 2017 | 119 | 2017 |
Automatic error finding in access-control policies K Jayaraman, V Ganesh, M Tripunitara, M Rinard, S Chapin Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 112 | 2011 |
A middleware approach to asynchronous and backward compatible detection and prevention of ARP cache poisoning MV Tripunitara, P Dutta Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99 …, 1999 | 84 | 1999 |
Computer vulnerability analysis I Krsul, E Spafford, M Tripunitara COAST Laboratory, Purdue University, West Lafayette, IN, Technical Report, 1998 | 83 | 1998 |
Logic locking for secure outsourced chip fabrication: A new attack and provably secure defense mechanism ME Massad, J Zhang, S Garg, MV Tripunitara arXiv preprint arXiv:1703.10187, 2017 | 77 | 2017 |
On safety in discretionary access control N Li, MV Tripunitara 2005 IEEE Symposium on Security and Privacy (S&P'05), 96-109, 2005 | 69 | 2005 |
Robust shared objects for non-volatile main memory R Berryhill, W Golab, M Tripunitara 19th International Conference on Principles of Distributed Systems (OPODIS …, 2016 | 68 | 2016 |
A theory for comparing the expressive power of access control models MV Tripunitara, N Li Journal of Computer Security 15 (2), 231-272, 2007 | 67 | 2007 |
Comparing the expressive power of access control models MV Tripunitara, N Li Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 65 | 2004 |
Resiliency policies in access control N Li, Q Wang, M Tripunitara ACM Transactions on Information and System Security (TISSEC) 12 (4), 1-34, 2009 | 62 | 2009 |
Mohawk: Abstraction-refinement and bound-estimation for verifying access control policies K Jayaraman, M Tripunitara, V Ganesh, M Rinard, S Chapin ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-28, 2013 | 46 | 2013 |
Fair payments for outsourced computations B Carbunar, M Tripunitara 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2010 | 37 | 2010 |
Middle approach to asynchronous and backward-compatible detection and prevention of ARP cache poisoning MV Tripunitara, P Dutta US Patent 6,771,649, 2004 | 35 | 2004 |
The foundational work of Harrison-Ruzzo-Ullman revisited MV Tripunitara, N Li IEEE Transactions on Dependable and Secure Computing 10 (1), 28-39, 2012 | 32 | 2012 |
Payments for outsourced computations B Carbunar, MV Tripunitara IEEE Transactions on Parallel and Distributed Systems 23 (2), 313-320, 2011 | 30 | 2011 |