Follow
Aravind Prakash
Aravind Prakash
Associate Professor, Binghamton University
Verified email at binghamton.edu - Homepage
Title
Cited by
Cited by
Year
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
A Prakash, X Hu, H Yin
NDSS, 2015
1662015
Debloating software through {Piece-Wise} compilation and loading
A Quach, A Prakash, L Yan
27th USENIX security symposium (USENIX Security 18), 869-886, 2018
1552018
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform
A Henderson, A Prakash, LK Yan, X Hu, X Wang, R Zhou, H Yin
Proceedings of the 2014 international symposium on software testing and …, 2014
1522014
Decaf: A platform-neutral whole-system dynamic binary analysis platform
A Henderson, LK Yan, X Hu, A Prakash, H Yin, S McCamant
IEEE Transactions on Software Engineering 43 (2), 164-184, 2016
662016
Os-sommelier: Memory-only operating system fingerprinting in the cloud
Y Gu, Y Fu, A Prakash, Z Lin, H Yin
Proceedings of the Third ACM Symposium on Cloud Computing, 1-13, 2012
482012
A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments
A Quach, R Erinfolami, D Demicco, A Prakash
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
472017
Enforcing system-wide control flow integrity for exploit detection and diagnosis
A Prakash, H Yin, Z Liang
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
462013
Mace: High-coverage and robust memory analysis for commodity operating systems
Q Feng, A Prakash, H Yin, Z Lin
Proceedings of the 30th annual computer security applications conference …, 2014
352014
Manipulating semantic values in kernel data structures: Attack assessments and implications
A Prakash, E Venkataramani, H Yin, Z Lin
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
352013
Defeating rop through denial of stack pivot
A Prakash, H Yin
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
312015
Identifying and analyzing pointer misuses for sophisticated memory-corruption exploit diagnosis
M Zhang, A Prakash, X Li, Z Liang, H Yin
292012
Multi-aspect, robust, and memory exclusive guest os fingerprinting
Y Gu, Y Fu, A Prakash, Z Lin, H Yin
IEEE Transactions on Cloud Computing 2 (4), 380-394, 2014
282014
On the trustworthiness of memory analysis—an empirical study from the perspective of binary execution
A Prakash, E Venkataramani, H Yin, Z Lin
IEEE Transactions on Dependable and Secure Computing 12 (5), 557-570, 2014
272014
Structural performance of biaxial geogrid reinforced concrete slab
K RajeshKumar, PO Awoyera, G Shyamala, V Kumar, N Gurumoorthy, ...
International Journal of Civil Engineering, 1-11, 2022
262022
Origen: Automatic extraction of offset-revealing instructions for cross-version memory analysis
Q Feng, A Prakash, M Wang, C Carmony, H Yin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
232016
Bloat factors and binary specialization
A Quach, A Prakash
Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software …, 2019
192019
Declassifier: Class-inheritance inference engine for optimized c++ binaries
RA Erinfolami, A Prakash
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
112019
Control flow and pointer integrity enforcement in a secure tagged architecture
RT Gollapudi, G Yuksek, D Demicco, M Cole, G Kothari, R Kulkarni, ...
2023 IEEE Symposium on Security and Privacy (SP), 2974-2989, 2023
92023
Supplementing modern software defenses with stack-pointer sanity
A Quach, M Cole, A Prakash
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
82017
Lite-SeqCNN: A Light-Weight Deep CNN Architecture for Protein Function Prediction
V Kumar, A Deepak, A Ranjan, A Prakash
IEEE/ACM Transactions on Computational Biology and Bioinformatics 20 (3 …, 2023
72023
The system can't perform the operation now. Try again later.
Articles 1–20