Obserwuj
Aravind Prakash
Tytuł
Cytowane przez
Cytowane przez
Rok
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
A Prakash, X Hu, H Yin
NDSS, 2015
1562015
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform
A Henderson, A Prakash, LK Yan, X Hu, X Wang, R Zhou, H Yin
Proceedings of the 2014 international symposium on software testing and …, 2014
1462014
Debloating software through {Piece-Wise} compilation and loading
A Quach, A Prakash, L Yan
27th USENIX security symposium (USENIX Security 18), 869-886, 2018
1442018
Decaf: A platform-neutral whole-system dynamic binary analysis platform
A Henderson, LK Yan, X Hu, A Prakash, H Yin, S McCamant
IEEE Transactions on Software Engineering 43 (2), 164-184, 2016
612016
Os-sommelier: Memory-only operating system fingerprinting in the cloud
Y Gu, Y Fu, A Prakash, Z Lin, H Yin
Proceedings of the Third ACM Symposium on Cloud Computing, 1-13, 2012
472012
Enforcing system-wide control flow integrity for exploit detection and diagnosis
A Prakash, H Yin, Z Liang
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
452013
A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments
A Quach, R Erinfolami, D Demicco, A Prakash
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
432017
Mace: High-coverage and robust memory analysis for commodity operating systems
Q Feng, A Prakash, H Yin, Z Lin
Proceedings of the 30th annual computer security applications conference …, 2014
342014
Manipulating semantic values in kernel data structures: Attack assessments and implications
A Prakash, E Venkataramani, H Yin, Z Lin
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
332013
Defeating rop through denial of stack pivot
A Prakash, H Yin
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
292015
Identifying and analyzing pointer misuses for sophisticated memory-corruption exploit diagnosis
M Zhang, A Prakash, X Li, Z Liang, H Yin
282012
Multi-aspect, robust, and memory exclusive guest os fingerprinting
Y Gu, Y Fu, A Prakash, Z Lin, H Yin
IEEE Transactions on Cloud Computing 2 (4), 380-394, 2014
262014
On the trustworthiness of memory analysis—an empirical study from the perspective of binary execution
A Prakash, E Venkataramani, H Yin, Z Lin
IEEE Transactions on Dependable and Secure Computing 12 (5), 557-570, 2014
252014
Origen: Automatic extraction of offset-revealing instructions for cross-version memory analysis
Q Feng, A Prakash, M Wang, C Carmony, H Yin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
202016
Bloat factors and binary specialization
A Quach, A Prakash
Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software …, 2019
172019
Declassifier: Class-inheritance inference engine for optimized c++ binaries
RA Erinfolami, A Prakash
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
102019
Supplementing modern software defenses with stack-pointer sanity
A Quach, M Cole, A Prakash
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
82017
Control flow and pointer integrity enforcement in a secure tagged architecture
RT Gollapudi, G Yuksek, D Demicco, M Cole, G Kothari, R Kulkarni, ...
2023 IEEE Symposium on Security and Privacy (SP), 2974-2989, 2023
72023
Devil is virtual: Reversing virtual inheritance in C++ binaries
RA Erinfolami, A Prakash
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
42020
Simplex: Repurposing Intel memory protection extensions for information hiding
M Cole, A Prakash
arXiv preprint arXiv:2009.06490, 2020
32020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20