Year |
Citation |
Score |
2012 |
Butt S, Ganapathy V, Baliga A, Christodorescu M. Monitoring data structures using hardware transactional memory Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7186: 345-359. DOI: 10.1007/978-3-642-29860-8_26 |
0.315 |
|
2011 |
Baliga A, Ganapathy V, Iftode L. Detecting kernel-level rootkits using data structure invariants Ieee Transactions On Dependable and Secure Computing. 8: 670-684. DOI: 10.1109/Tdsc.2010.38 |
0.592 |
|
2010 |
Bickford J, O'Hare R, Baliga A, Ganapathy V, Iftode L. Rootkits on smart phones: Attacks, implications and opportunities Hotmobile 2010: the 11th Workshop On Mobile Computing Systems and Applications. 49-53. DOI: 10.1145/1734583.1734596 |
0.562 |
|
2009 |
Baliga A, Kamat P, Ganapathy V, Iftode L. Identifying systemic threats to kernel data: Attacks and defense techniques Advanced Operating Systems and Kernel Applications: Techniques and Technologies. 46-70. DOI: 10.4018/978-1-60566-850-5.ch003 |
0.623 |
|
2008 |
Baliga A, Ganapathy V, Iftode L. Automatic inference and enforcement of kernel data structure invariants Proceedings - Annual Computer Security Applications Conference, Acsac. 77-86. DOI: 10.1109/ACSAC.2008.29 |
0.58 |
|
2008 |
Baliga A, Iftode L, Chen X. Automated containment of rootkits attacks Computers and Security. 27: 323-334. DOI: 10.1016/J.Cose.2008.06.003 |
0.584 |
|
2008 |
Kamat P, Baliga A, Trappe W. Secure, pseudonymous, and auditable communication in vehicularad hocnetworks Security and Communication Networks. 1: 233-244. DOI: 10.1002/Sec.27 |
0.378 |
|
2007 |
Baliga A, Kamat P, Iftode L. Lurking in the shadows: Identifying systemic threats to kernel data (short paper) Proceedings - Ieee Symposium On Security and Privacy. 246-251. DOI: 10.1109/SP.2007.25 |
0.605 |
|
2005 |
Iftode L, Baliga A, Bohra A, Smaldone S, Sultan F. Defending network-centric systems using backdoors Collection of Technical Papers - Infotech At Aerospace: Advancing Contemporary Aerospace Technologies and Their Integration. 3: 1746-1752. |
0.547 |
|
Show low-probability matches. |