Arati Baliga, Ph.D. - Publications

Affiliations: 
2009 Graduate School - New Brunswick Rutgers University, New Brunswick, New Brunswick, NJ, United States 
Area:
Computer Science

9 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2012 Butt S, Ganapathy V, Baliga A, Christodorescu M. Monitoring data structures using hardware transactional memory Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7186: 345-359. DOI: 10.1007/978-3-642-29860-8_26  0.315
2011 Baliga A, Ganapathy V, Iftode L. Detecting kernel-level rootkits using data structure invariants Ieee Transactions On Dependable and Secure Computing. 8: 670-684. DOI: 10.1109/Tdsc.2010.38  0.592
2010 Bickford J, O'Hare R, Baliga A, Ganapathy V, Iftode L. Rootkits on smart phones: Attacks, implications and opportunities Hotmobile 2010: the 11th Workshop On Mobile Computing Systems and Applications. 49-53. DOI: 10.1145/1734583.1734596  0.562
2009 Baliga A, Kamat P, Ganapathy V, Iftode L. Identifying systemic threats to kernel data: Attacks and defense techniques Advanced Operating Systems and Kernel Applications: Techniques and Technologies. 46-70. DOI: 10.4018/978-1-60566-850-5.ch003  0.623
2008 Baliga A, Ganapathy V, Iftode L. Automatic inference and enforcement of kernel data structure invariants Proceedings - Annual Computer Security Applications Conference, Acsac. 77-86. DOI: 10.1109/ACSAC.2008.29  0.58
2008 Baliga A, Iftode L, Chen X. Automated containment of rootkits attacks Computers and Security. 27: 323-334. DOI: 10.1016/J.Cose.2008.06.003  0.584
2008 Kamat P, Baliga A, Trappe W. Secure, pseudonymous, and auditable communication in vehicularad hocnetworks Security and Communication Networks. 1: 233-244. DOI: 10.1002/Sec.27  0.378
2007 Baliga A, Kamat P, Iftode L. Lurking in the shadows: Identifying systemic threats to kernel data (short paper) Proceedings - Ieee Symposium On Security and Privacy. 246-251. DOI: 10.1109/SP.2007.25  0.605
2005 Iftode L, Baliga A, Bohra A, Smaldone S, Sultan F. Defending network-centric systems using backdoors Collection of Technical Papers - Infotech At Aerospace: Advancing Contemporary Aerospace Technologies and Their Integration. 3: 1746-1752.  0.547
Show low-probability matches.