Search Results - "Vasudevan, Amit"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers by Derakhshan, Farzaneh, Zhang, Zichao, Vasudevan, Amit, Jia, Limin

    “…Trusted Execution Environments (TEE) are ubiq-uitous. They form the highest privileged software component of the platform with full access to the system and…”
    Get full text
    Conference Proceeding
  2. 2

    Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework by Vasudevan, A., Chaki, S., Limin Jia, McCune, J., Newsome, J., Datta, A.

    “…We present the design, implementation, and verification of XMHF- an eXtensible and Modular Hypervisor Framework. XMHF is designed to achieve three goals --…”
    Get full text
    Conference Proceeding
  3. 3

    MalTRAK: Tracking and Eliminating Unknown Malware by Vasudevan, A.

    “…Malware or malicious code is a rapidly evolving threat to the computing community. Zero-day malware are exploiting vulnerabilities very soon after being…”
    Get full text
    Conference Proceeding
  4. 4

    Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform by Vasudevan, Amit, Chaki, Sagar

    “…Robust security on a commodity low-cost and popular computing platform is a worthy goal for today's Internet of Things (IoT) and embedded ecosystems. We…”
    Get full text
    Conference Proceeding
  5. 5

    XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms by Vasudevan, A, Ning Qu, Perrig, A

    “…We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise…”
    Get full text
    Conference Proceeding
  6. 6

    Cobra: fine-grained malware analysis using stealth localized-executions by Vasudevan, A., Yerraballi, R.

    “…Fine-grained code analysis in the context of malware is a complex and challenging task that provides insight into malware code-layers…”
    Get full text
    Conference Proceeding
  7. 7

    Formalizing an Architectural Model of a Trustworthy Edge IoT Security Gateway by McCormack, Matt, Vasudevan, Amit, Liu, Guyue, Sekar, Vyas

    “…Today's edge networks continue to see an increasing number of deployed IoT devices. These IoT devices aim to increase productivity and efficiency; however,…”
    Get full text
    Conference Proceeding
  8. 8

    Stealth breakpoints by Vasudevan, A., Yerraballi, R.

    “…Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary…”
    Get full text
    Conference Proceeding
  9. 9

    Reviewing the role of machine learning and artificial intelligence for remote attestation in 5G+ networks by Gallagher, Shannon K., Whisnant, Austin, Hristozov, Anton D., Vasudevan, Amit

    “…The next generation of communication networks promises an exponential growth in number, low latency, and heterogeneity of devices. Consequently, we need to be…”
    Get full text
    Conference Proceeding
  10. 10

    WiLDCAT: An integrated stealth environment for dynamic malware analysis by Vasudevan, Amit

    Published 01-01-2007
    “…Malware a term that refers to viruses, trojans, worms, spyware or any form of malicious code is widespread today. Given the devastating effects that malware…”
    Get full text
    Dissertation
  11. 11

    KalKi++: A Scalable and Extensible IoT Security Platform by Echeverria, Sebastian, Lewis, Grace, Mazzotta, Craig, O'Meara, Kyle, Williams, Keegan, Novakouski, Marc, Vasudevan, Amit, McCormack, Matthew, Sekar, Vyas

    “…Internet of Things (IoT) security remains a challenge due to device vulnerabilities and untrusted supply chains, often limiting the benefits that organizations…”
    Get full text
    Conference Proceeding
  12. 12

    KalKi: A Software-Defined IoT Security Platform by Echeverria, Sebastian, Lewis, Grace, Mazzotta, Craig, Grabowski, Christopher, O'Meara, Kyle, Vasudevan, Amit, Novakouski, Marc, McCormack, Matthew, Sekar, Vyas

    “…Commercial IoT devices are increasingly being integrated into software systems. However, given the also increasing number of IoT vulnerability reports, there…”
    Get full text
    Conference Proceeding
  13. 13

    WiLDCAT: An integrated stealth environment for dynamic malware analysis by Vasudevan, Amit

    “…Malware a term that refers to viruses, trojans, worms, spyware or any form of malicious code is widespread today. Given the devastating effects that malware…”
    Get full text
    Dissertation
  14. 14

    Sakthi: A retargetable dynamic framework for binary instrumentation by Vasudevan, Amit

    “…The various contexts in which operating systems and to an extent general purpose applications get used in practice, pose a need to be able to extend certain…”
    Get full text
    Dissertation
  15. 15

    Sakthi: A retargetable dynamic framework for binary instrumentation by Vasudevan, Amit

    Published 01-01-2003
    “…The various contexts in which operating systems and to an extent general purpose applications get used in practice, pose a need to be able to extend certain…”
    Get full text
    Dissertation
  16. 16

    Re-inforced stealth breakpoints by Vasudevan, A.

    “…This paper extends VAMPiRE, a stealth breakpoint framework specifically tailored for microscopic malware analysis. Stealth breakpoints are designed to provide…”
    Get full text
    Conference Proceeding
  17. 17