Tripunitara, Mahesh
65  Ergebnisse:
Personensuche X
?
1

The Hardness of Learning Access Control Policies:

, In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies,
Lei, Xiaomeng ; Tripunitara, Mahesh - p. 133-144 , 2023
 
?
2

A Comparison of Four Notions of Isomorphism-Based Security ..:

Lin, Zhiyuan ; Tripunitara, Mahesh
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  4 - p. 3371-3377 , 2023
 
?
3

Finding Unchecked Low-Level Calls with Zero False Positives..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
4

Granularity and Usability in Authorization Policies:

, In: Communications in Computer and Information Science; Emerging Information Security and Applications,
Zhang, Boyun ; Gill, Puneet ; Mihai, Nelu. - p. 68-86 , 2022
 
?
6

Locked Circuit Indistinguishability: A Notion of Security f..:

, In: 2022 IEEE 35th Computer Security Foundations Symposium (CSF),
Massad, Mohamed El ; Juma, Nahid ; Shahen, Jonathan... - p. 455-470 , 2022
 
?
7

The Secrecy Resilience of Access Control Policies and Its A..:

, In: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies,
Guo, Qiang ; Tripunitara, Mahesh - p. 115-126 , 2022
 
?
8

Forensic Analysis in Access Control : Foundations and a ..:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
Juma, Nahid ; Huang, Xiaowei ; Tripunitara, Mahesh - p. 1533-1550 , 2020
 
?
10

The Overhead from Combating Side-Channels in Cloud Systems ..:

Juma, Nahid ; Shahen, Jonathan ; Bijon, Khalid.
IEEE Transactions on Dependable and Secure Computing.  17 (2020)  2 - p. 422-435 , 2020
 
?
12

Session details: Session 9: Virtualization and Hardware:

, In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy,
 
?
13

The Need for Declarative Properties in Digital IC Security:

, In: Proceedings of the Great Lakes Symposium on VLSI 2017,
 
?
14

Graph Automorphism-Based, Semantics-Preserving Security for..:

, In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy,
Lin, Zhiyuan ; Tripunitara, Mahesh - p. 337-348 , 2017
 
?
15

Reverse engineering camouflaged sequential circuits without..:

, In: Proceedings of the 36th International Conference on Computer-Aided Design,
 
1-15