Karthick Jayaraman
Karthick Jayaraman
Verified email at microsoft.com - Homepage
TitleCited byYear
Automatic creation of SQL injection and cross-site scripting attacks
A Kieyzun, PJ Guo, K Jayaraman, MD Ernst
Proceedings of the 31st International Conference on Software Engineering …, 2009
4282009
Checking beliefs in dynamic networks
NP Lopes, N Bjørner, P Godefroid, K Jayaraman, G Varghese
12th {USENIX} Symposium on Networked Systems Design and Implementation …, 2015
1162015
jFuzz: A concolic whitebox fuzzer for Java
K Jayaraman, D Harvison, V Ganesh, A Kiezun
782009
Automatic error finding in access-control policies
K Jayaraman, V Ganesh, M Tripunitara, M Rinard, S Chapin
Proceedings of the 18th ACM conference on Computer and communications …, 2011
772011
Escudo: A fine-grained protection model for web browsers
K Jayaraman, W Du, B Rajagopalan, SJ Chapin
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
522010
Automated analysis and debugging of network connectivity policies
K Jayaraman, N Bjørner, G Outhred, C Kaufman
MSR, Seattle, WA, USA, Tech. Rep. MSR-TR-2014-102, 2014
342014
Mohawk: Abstraction-refinement and bound-estimation for verifying access control policies
K Jayaraman, M Tripunitara, V Ganesh, M Rinard, S Chapin
ACM Transactions on Information and System Security (TISSEC) 15 (4), 18, 2013
302013
Checking cloud contracts in Microsoft Azure
N Bjørner, K Jayaraman
International Conference on Distributed Computing and Internet Technology, 21-32, 2015
242015
Enhancing security education with hands-on laboratory exercises
W Du, K Jayaraman, NB Gaubatz
Proceedings of the 5th Annual Symposium on Information Assurance (ASIA'10 …, 2010
232010
Enforcing request integrity in web applications
K Jayaraman, G Lewandowski, PG Talaga, SJ Chapin
IFIP Annual Conference on Data and Applications Security and Privacy, 225-240, 2010
202010
Position paper: Why are there so many vulnerabilities in web applications?
W Du, K Jayaraman, X Tan, T Luo, S Chapin
Proceedings of the 2011 New Security Paradigms Workshop, 83-94, 2011
142011
Dna pairing: Using differential network analysis to find reachability bugs
N Lopes, N Bjørner, P Godefroid, K Jayaraman, G Varghese
Technical Report MSR-TR-2014-58, Microsoft Research, 2014
92014
Modeling user interactions for (fun and) profit: preventing request forgery attacks on web applications
K Jayaraman, PG Talaga, G Lewandowski, SJ Chapin, M Hafiz
Proceedings of the 16th Conference on Pattern Languages of Programs, 16, 2009
92009
System and method for compact form exhaustive analysis of security policies
K Jayaraman, CW Kaufman, NS Bjorner
US Patent 9,467,473, 2016
82016
Arbac policy for a large multi-national bank
K Jayaraman, V Ganesh, M Tripunitara, MC Rinard, SJ Chapin
arXiv preprint arXiv:1110.2849, 2011
52011
Network verification: Calculus and solvers
N Bjørner, K Jayaraman
2014 International Science and Technology Conference (Modern Networking …, 2014
42014
Banking on interoperability: Secure, interoperable credential management
G Benson, SK Chin, S Croston, K Jayaraman, S Older
Computer Networks 67, 235-251, 2014
42014
Memento: A Framework for Hardening Web Applications
K Jayaraman, G Lewandowski, SJ Chapin
Center for Systems Assurance Technical Report CSATR-2008-11-01, 2008
42008
Re-designing the Web’s Access Control System
W Du, X Tan, T Luo, K Jayaraman, Z Zhu
IFIP Annual Conference on Data and Applications Security and Privacy, 4-11, 2011
22011
Interoperable credentials management for wholesale banking
G Benson, SK Chin, S Croston, K Jayaraman, S Older
22011
The system can't perform the operation now. Try again later.
Articles 1–20