vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. A Prakash, X Hu, H Yin NDSS, 2015 | 166 | 2015 |
Debloating software through {Piece-Wise} compilation and loading A Quach, A Prakash, L Yan 27th USENIX security symposium (USENIX Security 18), 869-886, 2018 | 155 | 2018 |
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform A Henderson, A Prakash, LK Yan, X Hu, X Wang, R Zhou, H Yin Proceedings of the 2014 international symposium on software testing and …, 2014 | 152 | 2014 |
Decaf: A platform-neutral whole-system dynamic binary analysis platform A Henderson, LK Yan, X Hu, A Prakash, H Yin, S McCamant IEEE Transactions on Software Engineering 43 (2), 164-184, 2016 | 66 | 2016 |
Os-sommelier: Memory-only operating system fingerprinting in the cloud Y Gu, Y Fu, A Prakash, Z Lin, H Yin Proceedings of the Third ACM Symposium on Cloud Computing, 1-13, 2012 | 48 | 2012 |
A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments A Quach, R Erinfolami, D Demicco, A Prakash Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017 | 47 | 2017 |
Enforcing system-wide control flow integrity for exploit detection and diagnosis A Prakash, H Yin, Z Liang Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 46 | 2013 |
Mace: High-coverage and robust memory analysis for commodity operating systems Q Feng, A Prakash, H Yin, Z Lin Proceedings of the 30th annual computer security applications conference …, 2014 | 35 | 2014 |
Manipulating semantic values in kernel data structures: Attack assessments and implications A Prakash, E Venkataramani, H Yin, Z Lin 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 35 | 2013 |
Defeating rop through denial of stack pivot A Prakash, H Yin Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 31 | 2015 |
Identifying and analyzing pointer misuses for sophisticated memory-corruption exploit diagnosis M Zhang, A Prakash, X Li, Z Liang, H Yin | 29 | 2012 |
Multi-aspect, robust, and memory exclusive guest os fingerprinting Y Gu, Y Fu, A Prakash, Z Lin, H Yin IEEE Transactions on Cloud Computing 2 (4), 380-394, 2014 | 28 | 2014 |
On the trustworthiness of memory analysis—an empirical study from the perspective of binary execution A Prakash, E Venkataramani, H Yin, Z Lin IEEE Transactions on Dependable and Secure Computing 12 (5), 557-570, 2014 | 27 | 2014 |
Structural performance of biaxial geogrid reinforced concrete slab K RajeshKumar, PO Awoyera, G Shyamala, V Kumar, N Gurumoorthy, ... International Journal of Civil Engineering, 1-11, 2022 | 26 | 2022 |
Origen: Automatic extraction of offset-revealing instructions for cross-version memory analysis Q Feng, A Prakash, M Wang, C Carmony, H Yin Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 23 | 2016 |
Bloat factors and binary specialization A Quach, A Prakash Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software …, 2019 | 19 | 2019 |
Declassifier: Class-inheritance inference engine for optimized c++ binaries RA Erinfolami, A Prakash Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 11 | 2019 |
Control flow and pointer integrity enforcement in a secure tagged architecture RT Gollapudi, G Yuksek, D Demicco, M Cole, G Kothari, R Kulkarni, ... 2023 IEEE Symposium on Security and Privacy (SP), 2974-2989, 2023 | 9 | 2023 |
Supplementing modern software defenses with stack-pointer sanity A Quach, M Cole, A Prakash Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 8 | 2017 |
Lite-SeqCNN: A Light-Weight Deep CNN Architecture for Protein Function Prediction V Kumar, A Deepak, A Ranjan, A Prakash IEEE/ACM Transactions on Computational Biology and Bioinformatics 20 (3 …, 2023 | 7 | 2023 |