Hayawardh Vijayakumar
Hayawardh Vijayakumar
Samsung Research America
Verified email at samsung.com - Homepage
Title
Cited by
Cited by
Year
Sprobes: Enforcing kernel code integrity on the trustzone architecture
X Ge, H Vijayakumar, T Jaeger
arXiv preprint arXiv:1410.7747, 2014
1442014
Seeding clouds with trust anchors
J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010
1432010
Integrity walls: Finding attack surfaces from mandatory access control policies
H Vijayakumar, G Jakka, S Rueda, J Schiffman, T Jaeger
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
552012
Cloud verifier: Verifiable auditing service for iaas clouds
J Schiffman, Y Sun, H Vijayakumar, T Jaeger
2013 IEEE Ninth World Congress on Services, 239-246, 2013
452013
NORAX: Enabling execute-only memory for COTS binaries on AArch64
Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ...
2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017
422017
Verifying system integrity by proxy
J Schiffman, H Vijayakumar, T Jaeger
International Conference on Trust and Trustworthy Computing, 179-200, 2012
312012
{JIGSAW}: Protecting Resource Access by Inferring Programmer Expectations
H Vijayakumar, X Ge, M Payer, T Jaeger
23rd {USENIX} Security Symposium ({USENIX} Security 14), 973-988, 2014
272014
{STING}: Finding Name Resolution Vulnerabilities in Programs
H Vijayakumar, J Schiffman, T Jaeger
21st {USENIX} Security Symposium ({USENIX} Security 12), 585-599, 2012
222012
Fuzzfactory: domain-specific fuzzing with waypoints
R Padhye, C Lemieux, K Sen, L Simon, H Vijayakumar
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-29, 2019
212019
PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
L Harrison, H Vijayakumar, R Padhye, K Sen, M Grace
Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020), 2020
202020
Attention spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem
DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 273-290, 2018
182018
Process firewalls: Protecting processes during resource access
H Vijayakumar, J Schiffman, T Jaeger
Proceedings of the 8th ACM European Conference on Computer Systems, 57-70, 2013
172013
Instaguard: Instantly deployable hot-patches for vulnerable system programs on android
Y Chen, Y Li, L Lu, YH Lin, H Vijayakumar, Z Wang, X Ou
2018 Network and Distributed System Security Symposium (NDSS'18), 2018
162018
Analysis of virtual machine system policies
S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 14th ACM symposium on Access control models and …, 2009
152009
Cloud armor: Protecting cloud commands from compromised cloud services
Y Sun, G Petracca, T Jaeger, H Vijayakumar, J Schiffman
2015 IEEE 8th International Conference on Cloud Computing, 253-260, 2015
122015
Transforming commodity security policies to enforce Clark-Wilson integrity
D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
122012
A scalable parallelization of all-pairs shortest path algorithm for a high performance cluster environment
T Srinivasan, R Balakrishnan, SA Gangadharan, V Hayawardh
2007 International Conference on Parallel and Distributed Systems, 1-8, 2007
122007
Cut me some security
D Muthukumaran, S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 3rd ACM workshop on Assurable and Usable Security …, 2010
82010
The Right Files at the Right Time
H Vijayakumar, T Jaeger
Automated Security Management, 119-133, 2013
22013
A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution
H Vijayakumar, J Schiffman, T Jaeger
2011 Seventh European Conference on Computer Network Defense, 1-8, 2011
22011
The system can't perform the operation now. Try again later.
Articles 1–20