A Alhuzali, R Gjomemo, B Eshete, VN Venkatakrishnan – … {USENIX} Security Symposium ({USENIX} Security 18), 2018 [PDF]

DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection

Birhanu Eshete and V.N. Venkatakrishnan
In 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, 2017.[PDF] 

SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data

Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller, V.N. Venkatakrishnan
In 26th USENIX Security Symposium (SEC), Vancouver, BC, Canada, 2017.[PDF] 

Patching Logic Vulnerabilities for Web Applications using LogicPatcher

Maliheh Monshizadeh, Prasad Naldurg, V.N. Venkatakrishnan
In 6th ACM Conference on Data and Applications Security ( CODASPY), New Orleans, LA, 2016.

Chainsaw: Chained Automated Workflow-Based Exploit Generation

Abeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, V.N. Venkatakrishnan
In 23rd ACM Conference on Computer and Communications Security (ACM CCS), Vienna, Austria , 2016.[PDF] 

Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers

Rigel Gjomemo, Phu H. Phung, Ted Ballou, Kedar Namjoshi, V.N. Venkatakrishnan and Lenore Zuck
In IEEE Conference on Quality, Reliability and Security (QRS), Vienna, Austria, 2016.

EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration

Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip Porras, V. N. Venkatakrishnan, Vinod Yegneswaran
In Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2015.[PDF] 

From Verifications to Optimizations

Rigel Gjomemo, Kedar Namjoshi, Phu H. Phung, V.N. Venkatakrishnan, Lenore Zuck
In Verification, Model Checking and and Abstract Interpretation (VMCAI), Mumbai, India, 2015.

Vetting SSL Usage in Applications with SSLINT

Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V.N. Venkatakrishnan, Runqing Yang, and Zhenrui Zhang
In IEEE Symposium on Security and Privacy (SP), San Jose, CA, 2015.

Practical Exploit Generation for Intent Message Vulnerabilities in Android

Daniele Gallingani, Rigel Gjomemo, V. N. Venkatakrishnan, Stefano Zanero
In ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, 2015.

MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications

Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan
In ACM Conference on Computer and Communications Security (CCS), Scottsdale, AZ, 2014.

WebWinnow: Leveraging Exploit Kit Workflows to Detect Malicious URLs

Birhanu Eshete, V.N. Venkatakrishnan
In ACM Conference on Data and Application Security and Privacy ( CODASPY), San Antonio, TX, 2014. [PDF] 

DEICS: Data Erasure in Concurrent Software

Kalpana Gondi, A. Prasad Sistla, V.N. Venkatakrishnan
In 19th Nordic Conference on Secure IT Systems (NordSec), Tromso, Norway, 2014. [PDF] 

Between Worlds: Securing Mixed JavaScript/ActionScript Multi-party Web Content

Phu H. Phung, Maliheh Monshizadeh, Meera Sridhar and Kevin Hamlen, V.N. Venkatakrishnan
In IEEE Transactions on Dependable and Secure Computing (TDSC), , 2014.

PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification.

Pratik Narang, Chittaranjan Hota, V. N. Venkatakrishnan
In EURASIP Journal of Information Security (EURASIP), , 2014.

A Threat Table Based Assessment of Information Security in Telemedicine

John C. Pendergrass, Karen Heart, C. Ranganathan, V. N. Venkatakrishnan
In International Journal of Healthcare Information Systems and Informatics ( IJHISI), , 2014.

Minimizing lifetime of sensitive data in concurrent program

Kalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan
In ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, 2014.

Digital Check Forgery Attacks on Client Check Truncation Systems

Rigel Gjomemo, Hafiz Malik, Nilesh Sumb, V. N. Venkatakrishnan, Rashid Ansari
In Financial Cryptography and Data Security (FC), Barbados, 2014.

Automated detection of parameter tampering opportunities and vulnerabilities in web applications

Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan
In Journal of Computer Security (JSS), , 2014.

PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations

Pratik Narang, Subhajit Ray, Chittaranjan Hota, Venkat Venkatakrishnan
In International Workshop on Cyber Crime (IWCC), San Jose, CA, 2014.

Sensitive Information Disclosure in Amazon Reviews.

Federica Fornaciari, C. Ranganathan, V.N. Venkatakrishnan
In Eighth International Conference on Digital Society (ICDS), Barcelona, Spain, 2014.

A Threat Table based Approach to Telemedicine Secuirity

John C. Pendergrass, Karen Heart, C. Ranganathan, V.N. Venkatakrishnan
In International Conference on Health Information Technology Advancement (HIM), Kalamazoo,MI, 2013.

SafeScript: JavaScript transformation for policy enforcement

Mike Ter Louw, Phu H. Phung, Rohini Krishnamurti, V.N. Venkatkrishnan
In 18th Nordic Conference on Secure IT Systems (NordSec), Illulisat, Greenlan, 2013.

WAVES: Automatic Synthesis of Client-side Validation Code for Web Applications

Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy Hinrichs, V.N. Venkatakrishnan, Lenore Zuck
In ASE Science Journal (Vol. 1, Issue 3, pp. 121-136), , 2012.

Don't Repeat Yourself: Automatically Synthesizing Client-side Validation

Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy Hinrichs, V.N. Venkatakrishnan, Lenore Zuck
In Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy Hinrichs, and Lenore Zuck (WebApps), Boston, MA, 2012.

SWIPE: Eager Erasure of Sensitive Data in Large Scale Systems Software

Kalpana Gondi, Prithvi Bisht, Praveen Venkatachari, A. Prasad Sistla, V.N. Venkatakrishnan
In 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, 2012.

WAPTEC: Whitebox Analysis of Web Applications for Parameter Tampering Exploit Construction

Prithvi Bisht, Tim Hinrichs, Nazario Skrupsky, V.N. Venkatakrishnan
In 18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, 2011.[PDF]

CANDID: Preventing SQL Injection Attacks Using Dynamic Candidate Evaluations

Prithvi Bisht, P. Madhusudan, V.N. Venkatakrishnan
In ACM Transactions on Information and Systems Security ( TISSEC), Volume 13, Issue 2, 2010.

Strengthening XSRF Defenses for Legacy Web Applications Using White-box Analysis and Transformation

Michelle Zhou, Prithvi Bisht, V.N. Venkatakrishnan
In 6th International Conference on Information Systems Security ( ICISS), Gandhinagar, India, 2010.

WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications

Prithvi Bisht, Mike Ter Louw, Michelle Zhou,Kalpana Gondi and Karthik Thotta Ganesh, V.N. Venkatakrishnan
In 6th International Conference on Information Systems Security (ICISS), Gandhinagar, India, 2010.

NoTamper: Automatically Detecting Parameter Tampering Vulnerabilities in Web Applications

Prithvi Bisht, Timothy Hinrichs, Nazario Skrupsky, Radoslaw Bobrowicz, V.N. Venkatakrishnan
In ACM Conference on Computer and Communications Security (CCS), Chicago, IL, 2010.[PDF]

AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements

Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan
In USENIX Security Symposium (SEC), Washington D.C, 2010.[PDF]

Automatically Preparing Safe SQL Queries

Prithvi Bisht, A. Prasad Sistla, V.N. Venkatakrishnan
In Financial Cryptography and Data Security (FC), Tenerife, Spain, 2010.[PDF]

Alcatraz: An Isolation Environment for Experimenting with Untrusted Software

Zhenkai Liang, Weiqin Sun, R. Sekar, V.N. Venkatakrishnan
In ACM Transactions on Information and Systems Security (TISSEC), Volume 12, Issue 3, 2009.

BluePrint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers

Mike Ter Louw, V.N. Venkatakrishnan
In IEEE Symposium on Security and Privacy (S&P), Oakland, CA, 2009.[PDF]

Enhancing web browser security against malware extensions

Mike Ter Louw, Jin Soon Lim, V.N. Venkatakrishnan
In Journal in Computer Virology (JCV), Volume 4, Number 3, 2008.

Preventing Information Leaks Through Shadow Executions

Roberto Capizzi, Antonio Longo, A. Prasad Sistla, V.N. Venkatakrishnan
In 24th ACSA Computer Applications Security Conference (ACSAC), Anaheim, CA, 2008. [PDF]

XSS-Guard: Precise Dynamic Prevention of Cross-Site Scripting Attacks

Prithvi Bisht, V.N. Venkatakrishnan
In Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), Paris, France, 2008.

Expanding Malware Defense by Securing Software Installations

Weiqing Sun, R. Sekar, Zhenkai Liang, V.N. Venkatakrishnan
In Fifth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), Paris, France, 2008.

Analysis of Hypertext Isolation Techniques for XSS Prevention

Mike Ter Louw, Prithvi Bisht, V.N. Venkatakrishnan
In Workshop on Web 2.0 Security and Privacy (W2SP), Oakland, CA, 2008.

CMV: Automatic Verification of Complete Mediation for Java Virtual Machines

A. Prasad Sistla, Michelle Zhou, Hilary Branske, V.N. Venkatakrishnan
In 3rd ACM Symposium on Information, Computer and Communications Security (ASIACCS), Tokyo, Japan, 2008. [PDF]

CANDID: Preventing SQL Injection Attacks Using Dynamic Candidate Evaluations

South Bandhakavi, Prithvi Bisht, P. Madhusudan, V.N. Venkatakrishnan
In 14th ACM Conference on Computer and Communications Security (CSS), Alexandria, VA, 2007.[PDF]

Extensible Web Browser Security

Mike Ter Louw, Jin Soon Lim, V.N. Venkatakrishnan
In Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), Luzerne, Switzerland, 2007.[PDF]

A Comparative Study of Three Random Password Generators

Michael Leonhard, V.N. Venkatakrishnan
In IEEE Conference on Information Technology (EIT), Chicago, IL, 2007.

Data Sandboxing: A Technique for Enforcing Confidentiality Policies

T. Khatiwala, R. Swaminathan, V.N. Venkatakrishnan
In 22nd Annual ACSA Computer Applications Security Conference (ACSAC), Miami, FL, 2006.[PDF]

Provably Correct Runtime Enforcement of Non-interference Policies

V.N. Venkatakrishnan, W. Xu, D.C. DuVarney, R. Sekar
In 8th International Conference on Information and Communications Security (ICICS), Raleigh, NC, 2006.[PDF]