Model-checking in-lined reference monitors M Sridhar, KW Hamlen International Workshop on Verification, Model Checking, and Abstract …, 2010 | 44 | 2010 |
Between worlds: Securing mixed JavaScript/ActionScript multi-party web content PH Phung, M Monshizadeh, M Sridhar, KW Hamlen IEEE Transactions on Dependable and Secure Computing 12 (4), 443-457, 2014 | 29 | 2014 |
Exploiting memory corruption vulnerabilities in connman for iot devices KV English, I Obaidat, M Sridhar 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 27 | 2019 |
Jadeite: a novel image-behavior-based approach for java malware detection using deep learning I Obaidat, M Sridhar, KM Pham, PH Phung Computers & Security 113, 102547, 2022 | 26 | 2022 |
Hybridguard: A principal-based permission and fine-grained policy enforcement framework for web-based mobile applications PH Phung, A Mohanty, R Rachapalli, M Sridhar 2017 IEEE Security and Privacy Workshops (SPW), 147-156, 2017 | 25 | 2017 |
ActionScript in-lined reference monitoring in Prolog M Sridhar, KW Hamlen International Symposium on Practical Aspects of Declarative Languages, 149-151, 2010 | 23 | 2010 |
Flexible in-lined reference monitor certification: Challenges and future directions M Sridhar, KW Hamlen Proceedings of the 5th ACM workshop on Programming languages meets program …, 2011 | 22 | 2011 |
Control-hijacking vulnerabilities in IoT firmware: A brief survey A Mohanty, I Obaidat, F Yilmaz, M Sridhar Proceedings of the 1st International Workshop on Security and Privacy for …, 2018 | 21 | 2018 |
Aspect-oriented runtime monitor certification KW Hamlen, MM Jones, M Sridhar International Conference on Tools and Algorithms for the Construction and …, 2012 | 21 | 2012 |
ActionScript bytecode verification with co-logic programming BW DeVries, G Gupta, KW Hamlen, S Moore, M Sridhar Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009 | 17 | 2009 |
Hippocratic binary instrumentation: First do no harm M Sridhar, R Wartell, KW Hamlen Science of Computer Programming 93, 110-124, 2014 | 11 | 2014 |
Criminal investigations: An interactive experience to improve student engagement and achievement in cybersecurity courses JG Hall, A Mohanty, P Murarisetty, ND Nguyen, JC Bahamón, ... Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022 | 8 | 2022 |
Guide me to exploit: Assisted ROP exploit generation for ActionScript virtual machine F Yilmaz, M Sridhar, W Choi Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 6 | 2020 |
Inscription: Thwarting ActionScript web attacks from within M Sridhar, A Mohanty, F Yilmaz, V Tendulkar, KW Hamlen 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 6 | 2018 |
Flash in the dark: Illuminating the landscape of ActionScript web security trends and threats M Sridhar, M Chirva, B Ferrell, KW Hamlen, D Karamchandani Journal of Information Systems Security (JISSec) 13 (2), 59-96, 2017 | 6 | 2017 |
DISSAV: A dynamic, interactive stack-smashing attack visualization tool E Akeyson, H Ramaprasad, M Sridhar Journal of The Colloquium for Information Systems Security Education 9 (1), 8-8, 2022 | 5 | 2022 |
HIJaX: Human Intent to Javascript XSS Generator Y Frempong The University of North Carolina at Charlotte, 2022 | 5 | 2022 |
A fine-grained classification and security analysis of web-based virtual machine vulnerabilities F Yilmaz, M Sridhar, A Mohanty, V Tendulkar, KW Hamlen Computers & Security 105, 102246, 2021 | 5 | 2021 |
HybriDiagnostics: evaluating security issues in hybrid smarthome companion apps A Mohanty, M Sridhar 2021 IEEE Security and Privacy Workshops (SPW), 228-234, 2021 | 5 | 2021 |
A multi-party, fine-grained permission and policy enforcement framework for hybrid mobile applications PH Phung, RSV Reddy, S Cap, A Pierce, A Mohanty, M Sridhar Journal of Computer Security 28 (3), 375-404, 2020 | 5 | 2020 |