Follow
Aravind Prakash
Aravind Prakash
Associate Professor, Binghamton University
Verified email at binghamton.edu - Homepage
Title
Cited by
Cited by
Year
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
A Prakash, X Hu, H Yin
NDSS, 2015
1382015
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform
A Henderson, A Prakash, LK Yan, X Hu, X Wang, R Zhou, H Yin
Proceedings of the 2014 international symposium on software testing and …, 2014
1262014
Debloating software through piece-wise compilation and loading
A Quach, A Prakash, L Yan
27th {USENIX} Security Symposium ({USENIX} Security 18), 869-886, 2018
942018
Decaf: A platform-neutral whole-system dynamic binary analysis platform
A Henderson, LK Yan, X Hu, A Prakash, H Yin, S McCamant
IEEE Transactions on Software Engineering 43 (2), 164-184, 2016
562016
Os-sommelier: Memory-only operating system fingerprinting in the cloud
Y Gu, Y Fu, A Prakash, Z Lin, H Yin
Proceedings of the Third ACM Symposium on Cloud Computing, 1-13, 2012
462012
Enforcing system-wide control flow integrity for exploit detection and diagnosis
A Prakash, H Yin, Z Liang
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
402013
A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments
A Quach, R Erinfolami, D Demicco, A Prakash
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
342017
Mace: High-coverage and robust memory analysis for commodity operating systems
Q Feng, A Prakash, H Yin, Z Lin
Proceedings of the 30th annual computer security applications conference …, 2014
322014
Manipulating semantic values in kernel data structures: Attack assessments and implications
A Prakash, E Venkataramani, H Yin, Z Lin
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
312013
Identifying and analyzing pointer misuses for sophisticated memory-corruption exploit diagnosis
M Zhang, A Prakash, X Li, Z Liang, H Yin
262012
Multi-aspect, robust, and memory exclusive guest os fingerprinting
Y Gu, Y Fu, A Prakash, Z Lin, H Yin
IEEE Transactions on Cloud Computing 2 (4), 380-394, 2014
252014
Defeating rop through denial of stack pivot
A Prakash, H Yin
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
242015
On the trustworthiness of memory analysis—an empirical study from the perspective of binary execution
A Prakash, E Venkataramani, H Yin, Z Lin
IEEE Transactions on Dependable and Secure Computing 12 (5), 557-570, 2014
232014
Origen: Automatic extraction of offset-revealing instructions for cross-version memory analysis
Q Feng, A Prakash, M Wang, C Carmony, H Yin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
142016
Bloat factors and binary specialization
A Quach, A Prakash
Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software …, 2019
102019
Supplementing modern software defenses with stack-pointer sanity
A Quach, M Cole, A Prakash
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
82017
DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries
RA Erinfolami, A Prakash
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
72019
Devil is virtual: Reversing virtual inheritance in c++ binaries
RA Erinfolami, A Prakash
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
32020
On Design Inference from Binaries Compiled using Modern C++ Defenses.
RA Erinfolami, A Quach, A Prakash
RAID, 15-30, 2019
22019
Semantics-preserving dissection of javascript exploits via dynamic js-binary analysis
X Hu, A Prakash, J Wang, R Zhou, Y Cheng, H Yin
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20