Suivre
Amit Vasudevan
Amit Vasudevan
Software Engineering Institute, Carnegie Mellon University
Adresse e-mail validée de acm.org - Page d'accueil
Titre
Citée par
Citée par
Année
Cobra: Fine-grained malware analysis using stealth localized-executions
A Vasudevan, R Yerraballi
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-279, 2006
1812006
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta
2013 IEEE Symposium on Security and Privacy, 430-444, 2013
1772013
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012
1082012
OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms
E Owusu, J Guajardo, J McCune, J Newsome, A Perrig, A Vasudevan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1042013
Stealth breakpoints
A Vasudevan, R Yerraballi
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-392, 2005
1032005
Spike: engineering malware analysis tools using unobtrusive binary-instrumentation
A Vasudevan, R Yerraballi
ACSC 6, 311-320, 2006
932006
Systems and methods for maintaining integrity and secrecy in untrusted computing platforms
JG Merchan, EK Owusu, JMC McCune, JD Newsome, A Vasudevan, ...
US Patent 9,367,701, 2016
812016
Towards verifiable resource accounting for outsourced computation
C Chen, P Maniatis, A Perrig, A Vasudevan, V Sekar
Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on …, 2013
672013
Down to the bare metal: Using processor features for binary analysis
C Willems, R Hund, A Fobian, D Felsch, T Holz, A Vasudevan
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
662012
CARMA: A hardware tamper-resistant isolated execution environment on commodity x86 platforms
A Vasudevan, J McCune, J Newsome, A Perrig, L Van Doorn
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
602012
Lockdown: Towards a safe and practical architecture for security applications on commodity platforms
A Vasudevan, B Parno, N Qu, VD Gligor, A Perrig
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012
602012
Xtrec: Secure real-time execution trace recording on commodity platforms
A Vasudevan, N Qu, A Perrig
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
492011
{überSpark}: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor
A Vasudevan, S Chaki, P Maniatis, L Jia, A Datta
25th USENIX Security Symposium (USENIX Security 16), 87-104, 2016
482016
Methods and apparatuses for user-verifiable execution of security-sensitive code
JM McCune, AM Perrig, A Datta, VD Gligor, Y Li, BJ Parno, A Vasudevan, ...
US Patent 8,627,414, 2014
392014
Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture
A Vasudevan, JM McCune, N Qu, L Van Doorn, A Perrig
International Conference on Trust and Trustworthy Computing, 141-165, 2010
362010
{SketchLib}: Enabling efficient sketch-based monitoring on programmable switches
H Namkung, Z Liu, D Kim, V Sekar, P Steenkiste
19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022
352022
MalTRAK: Tracking and eliminating unknown malware
A Vasudevan
2008 Annual Computer Security Applications Conference (ACSAC), 311-321, 2008
352008
Lockdown: A safe and practical environment for security applications
A Vasudevan, B Parno, N Qu, VD Gligor, A Perrig
CMU-CyLab-09-011 14, 2009
342009
Framework for stealth dynamic coarse and fine-grained malware analysis
A Vasudevan
US Patent App. 11/998,347, 2008
252008
Parametric verification of address space separation
J Franklin, S Chaki, A Datta, JM McCune, A Vasudevan
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
232012
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20