Search Results - "Vasudevan, Amit"
-
1
Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers
Published in 2023 IEEE 36th Computer Security Foundations Symposium (CSF) (01-07-2023)“…Trusted Execution Environments (TEE) are ubiq-uitous. They form the highest privileged software component of the platform with full access to the system and…”
Get full text
Conference Proceeding -
2
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework
Published in 2013 IEEE Symposium on Security and Privacy (01-05-2013)“…We present the design, implementation, and verification of XMHF- an eXtensible and Modular Hypervisor Framework. XMHF is designed to achieve three goals --…”
Get full text
Conference Proceeding -
3
MalTRAK: Tracking and Eliminating Unknown Malware
Published in 2008 Annual Computer Security Applications Conference (ACSAC) (01-12-2008)“…Malware or malicious code is a rapidly evolving threat to the computing community. Zero-day malware are exploiting vulnerabilities very soon after being…”
Get full text
Conference Proceeding -
4
Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform
Published in 2018 IEEE European Symposium on Security and Privacy (EuroS&P) (01-04-2018)“…Robust security on a commodity low-cost and popular computing platform is a worthy goal for today's Internet of Things (IoT) and embedded ecosystems. We…”
Get full text
Conference Proceeding -
5
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
Published in 2011 44th Hawaii International Conference on System Sciences (01-01-2011)“…We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise…”
Get full text
Conference Proceeding -
6
Cobra: fine-grained malware analysis using stealth localized-executions
Published in 2006 IEEE Symposium on Security and Privacy (S&P'06) (2006)“…Fine-grained code analysis in the context of malware is a complex and challenging task that provides insight into malware code-layers…”
Get full text
Conference Proceeding -
7
Formalizing an Architectural Model of a Trustworthy Edge IoT Security Gateway
Published in 2021 IEEE 27th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA) (01-08-2021)“…Today's edge networks continue to see an increasing number of deployed IoT devices. These IoT devices aim to increase productivity and efficiency; however,…”
Get full text
Conference Proceeding -
8
Stealth breakpoints
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary…”
Get full text
Conference Proceeding -
9
Reviewing the role of machine learning and artificial intelligence for remote attestation in 5G+ networks
Published in 2022 IEEE Future Networks World Forum (FNWF) (01-10-2022)“…The next generation of communication networks promises an exponential growth in number, low latency, and heterogeneity of devices. Consequently, we need to be…”
Get full text
Conference Proceeding -
10
WiLDCAT: An integrated stealth environment for dynamic malware analysis
Published 01-01-2007“…Malware a term that refers to viruses, trojans, worms, spyware or any form of malicious code is widespread today. Given the devastating effects that malware…”
Get full text
Dissertation -
11
KalKi++: A Scalable and Extensible IoT Security Platform
Published in 2021 IEEE 7th World Forum on Internet of Things (WF-IoT) (14-06-2021)“…Internet of Things (IoT) security remains a challenge due to device vulnerabilities and untrusted supply chains, often limiting the benefits that organizations…”
Get full text
Conference Proceeding -
12
KalKi: A Software-Defined IoT Security Platform
Published in 2020 IEEE 6th World Forum on Internet of Things (WF-IoT) (01-06-2020)“…Commercial IoT devices are increasingly being integrated into software systems. However, given the also increasing number of IoT vulnerability reports, there…”
Get full text
Conference Proceeding -
13
WiLDCAT: An integrated stealth environment for dynamic malware analysis
Get full text
Dissertation -
14
Sakthi: A retargetable dynamic framework for binary instrumentation
Get full text
Dissertation -
15
Sakthi: A retargetable dynamic framework for binary instrumentation
Published 01-01-2003“…The various contexts in which operating systems and to an extent general purpose applications get used in practice, pose a need to be able to extend certain…”
Get full text
Dissertation -
16
Re-inforced stealth breakpoints
Published in 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009) (01-10-2009)“…This paper extends VAMPiRE, a stealth breakpoint framework specifically tailored for microscopic malware analysis. Stealth breakpoints are designed to provide…”
Get full text
Conference Proceeding -
17
Stability-indicating assay method for determination of actarit,its process related impurities and degradation products:Insight into stability profile and degradation pathways
Published in Journal of pharmaceutical analysis (01-12-2014)“…The stability of the drug actarit was studied under different stress conditions like hydrolysis(acid,alkaline and neutral),oxidation,photolysis and thermal…”
Get full text
Journal Article