Name
Affiliation
Papers
VINOD GANAPATHY
Rutgers University
55
Collaborators
Citations 
PageRank 
87
713
42.69
Referers 
Referees 
References 
1743
1787
1018
Search Limit
1001000
Title
Citations
PageRank
Year
SGXL: Security and Performance for Enclaves Using Large Pages10.392021
(Mis)managed: A Novel TLB-based Covert Channel on GPUs10.352021
Faastlane: Accelerating Function-As-A-Service Workflows00.342021
Privaros: A Framework for Privacy-Compliant Delivery Drones10.342020
Activethief: Model Extraction Using Active Learning And Unannotated Public Data00.342020
An evaluation of methods to port legacy code to SGX enclaves00.342020
A framework for the extraction of Deep Neural Networks by leveraging public data.30.372019
Regulating Drones in Restricted Spaces10.362019
Secure, Consistent, and High-Performance Memory Snapshotting.00.342018
Engarde: Mutually-Trusted Inspection Of Sgx Enclaves30.372017
Compiler Optimizations with Retrofitting Transformations: Is there a Semantic Mismatch?00.342017
Regulating ARM TrustZone Devices in Restricted Spaces.140.662016
Detecting plagiarized mobile apps using API birthmarks30.382016
Exploring infrastructure support for app-based services on cloud platforms.00.342016
Reflections on the Self-service Cloud Computing Project.00.342015
Testing Cross-Platform Mobile App Development Frameworks (T)60.422015
A novel algorithm for pattern matching with back references.00.342015
Efficient runtime-enforcement techniques for policy weaving30.392014
On the Control Plane of a Self-service Cloud Platform50.432014
Retargetting Legacy Browser Extensions to Modern Extension Frameworks.10.362014
Inferring likely mappings between APIs200.782013
Leveraging "choice" to automate authorization hook placement110.762012
Short paper: enhancing users' comprehension of android permissions70.522012
An analysis of the mozilla jetpack extension framework240.952012
Self-service cloud computing321.002012
Enhancing javascript with transactions40.402012
Fast submatch extraction using OBDDs40.642012
Towards a richer model of cloud app markets50.532012
Fast, memory-efficient regular expression matching with NFA-OBDDs50.422011
Security versus energy tradeoffs in host-based mobile malware detection120.662011
Monitoring data structures using hardware transactional memory20.362011
Detecting Kernel-Level Rootkits Using Data Structure Invariants361.242011
Enhancing Mobile Malware Detection with Social Collaboration.70.622011
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access.120.612011
Rootkits on smart phones: attacks, implications and opportunities442.922010
Improving NFA-based signature matching using ordered binary decision diagrams100.632010
Core-Local Memory Assisted Protection40.502010
The case for JavaScript transactions: position paper30.432010
Privacy-aware identity management for client-side mashup applications50.462009
Working set-based access control for network file systems00.342009
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers100.542009
Analyzing Information Flow in JavaScript-Based Browser Extensions743.122009
Privately querying location-based services with SybilQuery521.872009
Automatic Inference and Enforcement of Kernel Data Structure Invariants823.572008
OMOS: A Framework for Secure Communication in Mashup Applications110.632008
Enforcing authorization policies using transactional memory introspection200.862008
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis211.002007
Microdrivers: a new architecture for device drivers140.832007
Retrofitting legacy code for authorization policy enforcement251.002006
NetSpy: Automatic Generation of Spyware Signatures for NIDS131.272006
  • 1
  • 2