vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. A Prakash, X Hu, H Yin NDSS, 2015 | 148 | 2015 |
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform A Henderson, A Prakash, LK Yan, X Hu, X Wang, R Zhou, H Yin Proceedings of the 2014 international symposium on software testing and …, 2014 | 138 | 2014 |
Debloating software through {Piece-Wise} compilation and loading A Quach, A Prakash, L Yan 27th USENIX security symposium (USENIX Security 18), 869-886, 2018 | 129 | 2018 |
Decaf: A platform-neutral whole-system dynamic binary analysis platform A Henderson, LK Yan, X Hu, A Prakash, H Yin, S McCamant IEEE Transactions on Software Engineering 43 (2), 164-184, 2016 | 61 | 2016 |
Os-sommelier: Memory-only operating system fingerprinting in the cloud Y Gu, Y Fu, A Prakash, Z Lin, H Yin Proceedings of the Third ACM Symposium on Cloud Computing, 1-13, 2012 | 47 | 2012 |
Enforcing system-wide control flow integrity for exploit detection and diagnosis A Prakash, H Yin, Z Liang Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 41 | 2013 |
A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments A Quach, R Erinfolami, D Demicco, A Prakash Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017 | 40 | 2017 |
Mace: High-coverage and robust memory analysis for commodity operating systems Q Feng, A Prakash, H Yin, Z Lin Proceedings of the 30th annual computer security applications conference …, 2014 | 32 | 2014 |
Manipulating semantic values in kernel data structures: Attack assessments and implications A Prakash, E Venkataramani, H Yin, Z Lin 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 32 | 2013 |
Defeating rop through denial of stack pivot A Prakash, H Yin Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 27 | 2015 |
Identifying and analyzing pointer misuses for sophisticated memory-corruption exploit diagnosis M Zhang, A Prakash, X Li, Z Liang, H Yin | 27 | 2012 |
Multi-aspect, robust, and memory exclusive guest os fingerprinting Y Gu, Y Fu, A Prakash, Z Lin, H Yin IEEE Transactions on Cloud Computing 2 (4), 380-394, 2014 | 26 | 2014 |
On the trustworthiness of memory analysis—an empirical study from the perspective of binary execution A Prakash, E Venkataramani, H Yin, Z Lin IEEE Transactions on Dependable and Secure Computing 12 (5), 557-570, 2014 | 24 | 2014 |
Origen: Automatic extraction of offset-revealing instructions for cross-version memory analysis Q Feng, A Prakash, M Wang, C Carmony, H Yin Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 18 | 2016 |
Bloat factors and binary specialization A Quach, A Prakash Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software …, 2019 | 15 | 2019 |
DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries RA Erinfolami, A Prakash Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 8 | 2019 |
Supplementing modern software defenses with stack-pointer sanity A Quach, M Cole, A Prakash Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 8 | 2017 |
Control flow and pointer integrity enforcement in a secure tagged architecture RT Gollapudi, G Yuksek, D Demicco, M Cole, G Kothari, R Kulkarni, ... 2023 IEEE Symposium on Security and Privacy (SP), 2974-2989, 2023 | 5 | 2023 |
Devil is virtual: Reversing virtual inheritance in c++ binaries RA Erinfolami, A Prakash Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 3 | 2020 |
Simplex: Repurposing Intel memory protection extensions for information hiding M Cole, A Prakash arXiv preprint arXiv:2009.06490, 2020 | 3 | 2020 |