BibTeX records: Ashish Gehani

download as .bib file

@article{DBLP:journals/access/NiddodiGMMR23,
  author       = {Chaitra Niddodi and
                  Ashish Gehani and
                  Tanu Malik and
                  Sibin Mohan and
                  Michael Lee Rilee},
  title        = {IOSPReD: {I/O} Specialized Packaging of Reduced Datasets and Data-Intensive
                  Applications for Efficient Reproducibility},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {1718--1731},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2022.3233787},
  doi          = {10.1109/ACCESS.2022.3233787},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/NiddodiGMMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/NavasG23,
  author       = {Jorge A. Navas and
                  Ashish Gehani},
  title        = {OCCAM-v2: Combining Static and Dynamic Analysis for Effective and
                  Efficient Whole-Program Specialization},
  journal      = {Commun. {ACM}},
  volume       = {66},
  number       = {4},
  pages        = {40--47},
  year         = {2023},
  url          = {https://doi.org/10.1145/3583112},
  doi          = {10.1145/3583112},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/NavasG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/AlhanahnahMGCYJZ23,
  author       = {Mohannad Alhanahnah and
                  Shiqing Ma and
                  Ashish Gehani and
                  Gabriela F. Ciocarlie and
                  Vinod Yegneswaran and
                  Somesh Jha and
                  Xiangyu Zhang},
  title        = {autoMPI: Automated Multiple Perspective Attack Investigation With
                  Semantics Aware Execution Partitioning},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {4},
  pages        = {2761--2775},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2022.3231242},
  doi          = {10.1109/TSE.2022.3231242},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/AlhanahnahMGCYJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AliMKNHHNSSZYGR23,
  author       = {Muaz Ali and
                  Muhammad Muzammil and
                  Faraz Karim and
                  Ayesha Naeem and
                  Rukhshan Haroon and
                  Muhammad Haris and
                  Huzaifah Nadeem and
                  Waseem Sabir and
                  Fahad Shaon and
                  Fareed Zaffar and
                  Vinod Yegneswaran and
                  Ashish Gehani and
                  Sazzadur Rahaman},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {SoK: {A} Tale of Reduction, Security, and Correctness - Evaluating
                  Program Debloating Paradigms and Their Compositions},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14347},
  pages        = {229--249},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51482-1\_12},
  doi          = {10.1007/978-3-031-51482-1\_12},
  timestamp    = {Thu, 18 Jan 2024 08:27:16 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AliMKNHHNSSZYGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/AhmadMJGIG23,
  author       = {Raza Ahmad and
                  Aniket Modi and
                  Eunjin Jung and
                  Carolina de Senne Garcia and
                  Hassaan Irshad and
                  Ashish Gehani},
  editor       = {Jason Staggs and
                  Sujeet Shenoi},
  title        = {Analyzing Discrepancies in Whole-Network Provenance},
  booktitle    = {Critical Infrastructure Protection {XVII} - 17th {IFIP} {WG} 11.10
                  International Conference, {ICCIP} 2023, Arlington, VA, USA, March
                  13-14, 2023, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {686},
  pages        = {93--114},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49585-4\_5},
  doi          = {10.1007/978-3-031-49585-4\_5},
  timestamp    = {Tue, 30 Jan 2024 09:36:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/AhmadMJGIG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AliHGRU23,
  author       = {Muaz Ali and
                  Rumaisa Habib and
                  Ashish Gehani and
                  Sazzadur Rahaman and
                  Zartash Afzal Uzmi},
  title        = {{BLADE:} Towards Scalable Source Code Debloating},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {75--87},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00022},
  doi          = {10.1109/SECDEV56634.2023.00022},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AliHGRU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HassanTFNNZSGR23,
  author       = {Muhammad Hassan and
                  Talha Tahir and
                  Muhammad Farrukh and
                  Abdullah Naveed and
                  Anas Naeem and
                  Fareed Zaffar and
                  Fahad Shaon and
                  Ashish Gehani and
                  Sazzadur Rahaman},
  title        = {Evaluating Container Debloaters},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {88--98},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00023},
  doi          = {10.1109/SECDEV56634.2023.00023},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/HassanTFNNZSGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HussainMNBAZGPY23,
  author       = {Shozab Hussain and
                  Muhammad Musa and
                  Turyal Neeshat and
                  Rja Batool and
                  Omer Ahmed and
                  Fareed Zaffar and
                  Ashish Gehani and
                  Andy Poggio and
                  Maneesh K. Yadav},
  title        = {Towards Reproducible Ransomware Analysis},
  booktitle    = {2023 Cyber Security Experimentation and Test Workshop, {CSET} 2023,
                  Marina del Rey, CA, USA, August 7-8, 2023},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607505.3607510},
  doi          = {10.1145/3607505.3607510},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HussainMNBAZGPY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ModiRMG23,
  author       = {Aniket Modi and
                  Moaz Reyad and
                  Tanu Malik and
                  Ashish Gehani},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Querying Container Provenance},
  booktitle    = {Companion Proceedings of the {ACM} Web Conference 2023, {WWW} 2023,
                  Austin, TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {1564--1567},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543873.3587568},
  doi          = {10.1145/3543873.3587568},
  timestamp    = {Mon, 28 Aug 2023 21:17:11 +0200},
  biburl       = {https://dblp.org/rec/conf/www/ModiRMG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/ManneSMBGC22,
  author       = {Naga Nithin Manne and
                  Shilvi Satpati and
                  Tanu Malik and
                  Amitabha Bagchi and
                  Ashish Gehani and
                  Amitabh Chaudhary},
  title        = {{CHEX:} Multiversion Replay with Ordered Checkpoints},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {15},
  number       = {6},
  pages        = {1297--1310},
  year         = {2022},
  url          = {https://www.vldb.org/pvldb/vol15/p1297-malik.pdf},
  doi          = {10.14778/3514061.3514075},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/ManneSMBGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/NavasG22,
  author       = {Jorge A. Navas and
                  Ashish Gehani},
  title        = {OCCAM-v2: Combining Static and Dynamic Analysis for Effective and
                  Efficient Whole-program Specialization: Leveraging scalable pointer
                  analysis, value analysis, and dynamic analysis},
  journal      = {{ACM} Queue},
  volume       = {20},
  number       = {5},
  pages        = {58--85},
  year         = {2022},
  url          = {https://doi.org/10.1145/3570922},
  doi          = {10.1145/3570922},
  timestamp    = {Fri, 06 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/NavasG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/AhmadNSHAAGZS22,
  author       = {Aatira Anum Ahmad and
                  Abdul Rafae Noor and
                  Hashim Sharif and
                  Usama Hameed and
                  Shoaib Asif and
                  Mubashir Anwar and
                  Ashish Gehani and
                  Fareed Zaffar and
                  Junaid Haroon Siddiqui},
  title        = {Trimmer: An Automated System for Configuration-Based Software Debloating},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {48},
  number       = {9},
  pages        = {3485--3505},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSE.2021.3095716},
  doi          = {10.1109/TSE.2021.3095716},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/AhmadNSHAAGZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipc/NakamuraMKG22,
  author       = {Yuta Nakamura and
                  Tanu Malik and
                  Iyad Kanj and
                  Ashish Gehani},
  title        = {Provenance-based Workflow Diagnostics Using Program Specification},
  booktitle    = {29th {IEEE} International Conference on High Performance Computing,
                  Data, and Analytics, HiPC 2022, Bengaluru, India, December 18-21,
                  2022},
  pages        = {292--301},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HiPC56025.2022.00046},
  doi          = {10.1109/HIPC56025.2022.00046},
  timestamp    = {Wed, 03 May 2023 17:27:40 +0200},
  biburl       = {https://dblp.org/rec/conf/hipc/NakamuraMKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/AbbasKMZTEIGYP22,
  author       = {Mashal Abbas and
                  Shahpar Khan and
                  Abdul Monum and
                  Fareed Zaffar and
                  Rashid Tahir and
                  David M. Eyers and
                  Hassaan Irshad and
                  Ashish Gehani and
                  Vinod Yegneswaran and
                  Thomas Pasquier},
  title        = {{PACED:} Provenance-based Automated Container Escape Detection},
  booktitle    = {{IEEE} International Conference on Cloud Engineering, {IC2E} 2022,
                  Pacific Grove, CA, USA, September 26-30, 2022},
  pages        = {261--272},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IC2E55432.2022.00035},
  doi          = {10.1109/IC2E55432.2022.00035},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic2e/AbbasKMZTEIGYP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/AhmadASGZ22,
  author       = {Aatira Anum Ahmad and
                  Mubashir Anwar and
                  Hashim Sharif and
                  Ashish Gehani and
                  Fareed Zaffar},
  title        = {Trimmer: Context-Specific Code Reduction},
  booktitle    = {37th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2022, Rochester, MI, USA, October 10-14, 2022},
  pages        = {168:1--168:5},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3551349.3559529},
  doi          = {10.1145/3551349.3559529},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/AhmadASGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-08429,
  author       = {Naga Nithin Manne and
                  Shilvi Satpati and
                  Tanu Malik and
                  Amitabha Bagchi and
                  Ashish Gehani and
                  Amitabh Chaudhary},
  title        = {{CHEX:} Multiversion Replay with Ordered Checkpoints},
  journal      = {CoRR},
  volume       = {abs/2202.08429},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.08429},
  eprinttype    = {arXiv},
  eprint       = {2202.08429},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-08429.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GehaniAIZP21,
  author       = {Ashish Gehani and
                  Raza Ahmad and
                  Hassaan Irshad and
                  Jianqiao Zhu and
                  Jignesh M. Patel},
  title        = {Digging into big provenance (with {SPADE)}},
  journal      = {Commun. {ACM}},
  volume       = {64},
  number       = {12},
  pages        = {48--56},
  year         = {2021},
  url          = {https://doi.org/10.1145/3475358},
  doi          = {10.1145/3475358},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/GehaniAIZP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/GehaniAIZP21,
  author       = {Ashish Gehani and
                  Raza Ahmad and
                  Hassan Irshad and
                  Jianqiao Zhu and
                  Jignesh M. Patel},
  title        = {Digging into Big Provenance (with {SPADE):} {A} user interface for
                  querying provenance},
  journal      = {{ACM} Queue},
  volume       = {19},
  number       = {3},
  pages        = {77--106},
  year         = {2021},
  url          = {https://doi.org/10.1145/3475965.3476885},
  doi          = {10.1145/3475965.3476885},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/GehaniAIZP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IrshadCGYLPJKXZ21,
  author       = {Hassaan Irshad and
                  Gabriela F. Ciocarlie and
                  Ashish Gehani and
                  Vinod Yegneswaran and
                  Kyu Hyung Lee and
                  Jignesh M. Patel and
                  Somesh Jha and
                  Yonghwi Kwon and
                  Dongyan Xu and
                  Xiangyu Zhang},
  title        = {{TRACE:} Enterprise-Wide Provenance Tracking for Real-Time {APT} Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4363--4376},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3098977},
  doi          = {10.1109/TIFS.2021.3098977},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/IrshadCGYLPJKXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/YuMZT0XULCYG21,
  author       = {Le Yu and
                  Shiqing Ma and
                  Zhuo Zhang and
                  Guanhong Tao and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Vincent E. Urias and
                  Han Wei Lin and
                  Gabriela F. Ciocarlie and
                  Vinod Yegneswaran and
                  Ashish Gehani},
  title        = {ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance
                  without Instrumentation},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/alchemist-fusing-application-and-audit-logs-for-precise-attack-provenance-without-instrumentation/},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/YuMZT0XULCYG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/GehaniAI21,
  author       = {Ashish Gehani and
                  Raza Ahmad and
                  Hassaan Irshad},
  editor       = {Tanu Malik and
                  Thomas Pasquier},
  title        = {Practical Provenance Privacy Protection},
  booktitle    = {13th International Workshop on Theory and Practice of Provenance,
                  TaPP 2021, July 19-20, 2021},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/tapp2021/presentation/gehani},
  timestamp    = {Fri, 05 Nov 2021 13:25:52 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/GehaniAI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenI0GY21,
  author       = {Xutong Chen and
                  Hassaan Irshad and
                  Yan Chen and
                  Ashish Gehani and
                  Vinod Yegneswaran},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CLARION:} Sound and Clear Provenance Tracking for Microservice Deployments},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3989--4006},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-xutong},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChenI0GY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/NiddodiGMNM20,
  author       = {Chaitra Niddodi and
                  Ashish Gehani and
                  Tanu Malik and
                  Jorge A. Navas and
                  Sibin Mohan},
  editor       = {Ivo Jimenez and
                  Carlos Maltzahn and
                  Jay F. Lofstead},
  title        = {MiDas: Containerizing Data-Intensive Applications with {I/O} Specialization},
  booktitle    = {Proceedings of the 3rd International Workshop on Practical Reproducible
                  Evaluation of Computer Systems, P-RECS@HPDC 2020, Stockholm, Sweden,
                  June 23, 2020},
  pages        = {21--25},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3391800.3398174},
  doi          = {10.1145/3391800.3398174},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpdc/NiddodiGMNM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/HanMGSP20,
  author       = {Xueyuan Han and
                  James Mickens and
                  Ashish Gehani and
                  Margo I. Seltzer and
                  Thomas F. J.{-}M. Pasquier},
  editor       = {Ivo Jimenez and
                  Carlos Maltzahn and
                  Jay F. Lofstead},
  title        = {Xanthus: Push-button Orchestration of Host Provenance Data Collection},
  booktitle    = {Proceedings of the 3rd International Workshop on Practical Reproducible
                  Evaluation of Computer Systems, P-RECS@HPDC 2020, Stockholm, Sweden,
                  June 23, 2020},
  pages        = {27--32},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3391800.3398175},
  doi          = {10.1145/3391800.3398175},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpdc/HanMGSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KaanicheBLGR20,
  author       = {Nesrine Kaaniche and
                  Sana Belguith and
                  Maryline Laurent and
                  Ashish Gehani and
                  Giovanni Russello},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {225--237},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009889302250237},
  doi          = {10.5220/0009889302250237},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KaanicheBLGR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/AhmadJGIG20,
  author       = {Raza Ahmad and
                  Eunjin Jung and
                  Carolina de Senne Garcia and
                  Hassaan Irshad and
                  Ashish Gehani},
  editor       = {Thomas Pasquier},
  title        = {Discrepancy Detection in Whole Network Provenance},
  booktitle    = {12th International Workshop on Theory and Practice of Provenance,
                  TaPP 2020, June 22, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/tapp2020/presentation/ahmad},
  timestamp    = {Fri, 05 Nov 2021 13:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/AhmadJGIG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/ChanGIC20,
  author       = {Sheung Chi Chan and
                  Ashish Gehani and
                  Hassaan Irshad and
                  James Cheney},
  editor       = {Thomas Pasquier},
  title        = {Integrity Checking and Abnormality Detection of Provenance Records},
  booktitle    = {12th International Workshop on Theory and Practice of Provenance,
                  TaPP 2020, June 22, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/tapp2020/presentation/chan},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/ChanGIC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/NakamuraMG20,
  author       = {Yuta Nakamura and
                  Tanu Malik and
                  Ashish Gehani},
  editor       = {Thomas Pasquier},
  title        = {Efficient Provenance Alignment in Reproduced Executions},
  booktitle    = {12th International Workshop on Theory and Practice of Provenance,
                  TaPP 2020, June 22, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/tapp2020/presentation/nakamura},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/NakamuraMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-04717,
  author       = {Xueyuan Han and
                  James Mickens and
                  Ashish Gehani and
                  Margo I. Seltzer and
                  Thomas F. J.{-}M. Pasquier},
  title        = {Xanthus: Push-button Orchestration of Host Provenance Data Collection},
  journal      = {CoRR},
  volume       = {abs/2005.04717},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.04717},
  eprinttype    = {arXiv},
  eprint       = {2005.04717},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-04717.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/EldefrawyGM19,
  author       = {Karim Eldefrawy and
                  Ashish Gehani and
                  Alexandre Matton},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Longitudinal Analysis of Misuse of Bitcoin},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {259--278},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_13},
  doi          = {10.1007/978-3-030-21568-2\_13},
  timestamp    = {Wed, 29 May 2019 12:25:55 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/EldefrawyGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/JungTGG19,
  author       = {Eunjin Jung and
                  Marion Le Tilly and
                  Ashish Gehani and
                  Yunjie Ge},
  title        = {Data Mining-Based Ethereum Fraud Detection},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {266--273},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00042},
  doi          = {10.1109/BLOCKCHAIN.2019.00042},
  timestamp    = {Wed, 08 Jan 2020 16:20:56 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/JungTGG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/ChanCBPGICS19,
  author       = {Sheung Chi Chan and
                  James Cheney and
                  Pramod Bhatotia and
                  Thomas F. J.{-}M. Pasquier and
                  Ashish Gehani and
                  Hassaan Irshad and
                  Lucian Carata and
                  Margo I. Seltzer},
  title        = {ProvMark: {A} Provenance Expressiveness Benchmarking System},
  booktitle    = {Proceedings of the 20th International Middleware Conference, Middleware
                  2019, Davis, CA, USA, December 9-13, 2019},
  pages        = {268--279},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3361525.3361552},
  doi          = {10.1145/3361525.3361552},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/ChanCBPGICS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/BarreGY19,
  author       = {Mathieu Barr{\'{e}} and
                  Ashish Gehani and
                  Vinod Yegneswaran},
  editor       = {Thomas Moyer and
                  Sudeepa Roy},
  title        = {Mining Data Provenance to Detect Advanced Persistent Threats},
  booktitle    = {11th International Workshop on Theory and Practice of Provenance,
                  TaPP 2019, Philadelphia, PA, USA, June 3, 2019},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/tapp2019/presentation/barre},
  timestamp    = {Fri, 05 Nov 2021 13:25:28 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/BarreGY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-11187,
  author       = {Sheung Chi Chan and
                  James Cheney and
                  Pramod Bhatotia and
                  Thomas F. J.{-}M. Pasquier and
                  Ashish Gehani and
                  Hassaan Irshad and
                  Lucian Carata and
                  Margo I. Seltzer},
  title        = {ProvMark: {A} Provenance Expressiveness Benchmarking System},
  journal      = {CoRR},
  volume       = {abs/1909.11187},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.11187},
  eprinttype    = {arXiv},
  eprint       = {1909.11187},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-11187.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataservice/KaanicheJG18,
  author       = {Nesrine Kaaniche and
                  Eunjin Jung and
                  Ashish Gehani},
  title        = {Efficiently Validating Aggregated IoT Data Integrity},
  booktitle    = {Fourth {IEEE} International Conference on Big Data Computing Service
                  and Applications, BigDataService 2018, Bamberg, Germany, March 26-29,
                  2018},
  pages        = {260--265},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/BigDataService.2018.00046},
  doi          = {10.1109/BIGDATASERVICE.2018.00046},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataservice/KaanicheJG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmics/GelleSG18,
  author       = {Loic Gelle and
                  Hassen Sa{\"{\i}}di and
                  Ashish Gehani},
  editor       = {Falk Howar and
                  Jiri Barnat},
  title        = {Wholly!: {A} Build System For The Modern Software Stack},
  booktitle    = {Formal Methods for Industrial Critical Systems - 23rd International
                  Conference, {FMICS} 2018, Maynooth, Ireland, September 3-4, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11119},
  pages        = {242--257},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00244-2\_16},
  doi          = {10.1007/978-3-030-00244-2\_16},
  timestamp    = {Sat, 19 Oct 2019 20:28:59 +0200},
  biburl       = {https://dblp.org/rec/conf/fmics/GelleSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipaw/AhmadBG18,
  author       = {Raza Ahmad and
                  Melanie Bru and
                  Ashish Gehani},
  editor       = {Khalid Belhajjame and
                  Ashish Gehani and
                  Pinar Alper},
  title        = {Streaming Provenance Compression},
  booktitle    = {Provenance and Annotation of Data and Processes - 7th International
                  Provenance and Annotation Workshop, {IPAW} 2018, London, UK, July
                  9-10, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11017},
  pages        = {236--240},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98379-0\_27},
  doi          = {10.1007/978-3-319-98379-0\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ipaw/AhmadBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/SharifAGZ18,
  author       = {Hashim Sharif and
                  Muhammad Abubakar and
                  Ashish Gehani and
                  Fareed Zaffar},
  editor       = {Marianne Huchard and
                  Christian K{\"{a}}stner and
                  Gordon Fraser},
  title        = {{TRIMMER:} application specialization for code debloating},
  booktitle    = {Proceedings of the 33rd {ACM/IEEE} International Conference on Automated
                  Software Engineering, {ASE} 2018, Montpellier, France, September 3-7,
                  2018},
  pages        = {329--339},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3238147.3238160},
  doi          = {10.1145/3238147.3238160},
  timestamp    = {Thu, 23 Jun 2022 19:54:17 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/SharifAGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Kwon0WLLM0XJCGY18,
  author       = {Yonghwi Kwon and
                  Fei Wang and
                  Weihang Wang and
                  Kyu Hyung Lee and
                  Wen{-}Chuan Lee and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Somesh Jha and
                  Gabriela F. Ciocarlie and
                  Ashish Gehani and
                  Vinod Yegneswaran},
  title        = {{MCI} : Modeling-based Causality Inference in Audit Logging for Attack
                  Investigation},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_07B-2\_Kwon\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Kwon0WLLM0XJCGY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/MaZKL0CGYXJ18,
  author       = {Shiqing Ma and
                  Juan Zhai and
                  Yonghwi Kwon and
                  Kyu Hyung Lee and
                  Xiangyu Zhang and
                  Gabriela F. Ciocarlie and
                  Ashish Gehani and
                  Vinod Yegneswaran and
                  Dongyan Xu and
                  Somesh Jha},
  editor       = {Haryadi S. Gunawi and
                  Benjamin C. Reed},
  title        = {Kernel-Supported Cost-Effective Audit Logging for Causality Tracking},
  booktitle    = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston,
                  MA, USA, July 11-13, 2018},
  pages        = {241--254},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/atc18/presentation/ma-shiqing},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/MaZKL0CGYXJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ipaw/2018,
  editor       = {Khalid Belhajjame and
                  Ashish Gehani and
                  Pinar Alper},
  title        = {Provenance and Annotation of Data and Processes - 7th International
                  Provenance and Annotation Workshop, {IPAW} 2018, London, UK, July
                  9-10, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11017},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98379-0},
  doi          = {10.1007/978-3-319-98379-0},
  isbn         = {978-3-319-98378-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ipaw/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-manifestos/AllenABCCCCCGGG17,
  author       = {Alice Allen and
                  Cecilia R. Aragon and
                  Christoph Becker and
                  Jeffrey C. Carver and
                  Andrei Chis and
                  Beno{\^{\i}}t Combemale and
                  Mike Croucher and
                  Kevin Crowston and
                  Daniel Garijo and
                  Ashish Gehani and
                  Carole A. Goble and
                  Robert Haines and
                  Robert Hirschfeld and
                  James Howison and
                  Kathryn D. Huff and
                  Caroline Jay and
                  Daniel S. Katz and
                  Claude Kirchner and
                  Katie Kuksenok and
                  Ralf L{\"{a}}mmel and
                  Oscar Nierstrasz and
                  Matthew J. Turk and
                  Rob van Nieuwpoort and
                  Matthew Vaughn and
                  Jurgen J. Vinju},
  title        = {Engineering Academic Software (Dagstuhl Perspectives Workshop 16252)},
  journal      = {Dagstuhl Manifestos},
  volume       = {6},
  number       = {1},
  pages        = {1--20},
  year         = {2017},
  url          = {https://doi.org/10.4230/DagMan.6.1.1},
  doi          = {10.4230/DAGMAN.6.1.1},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-manifestos/AllenABCCCCCGGG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KrellCG017,
  author       = {Fernando Krell and
                  Gabriela F. Ciocarlie and
                  Ashish Gehani and
                  Mariana Raykova},
  editor       = {Helena Handschuh},
  title        = {Low-Leakage Secure Search for Boolean Expressions},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {397--413},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_23},
  doi          = {10.1007/978-3-319-52153-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KrellCG017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/GhoshDPYG17,
  author       = {Shalini Ghosh and
                  Ariyam Das and
                  Phillip A. Porras and
                  Vinod Yegneswaran and
                  Ashish Gehani},
  title        = {Automated Categorization of Onion Sites for Analyzing the Darkweb
                  Ecosystem},
  booktitle    = {Proceedings of the 23rd {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13
                  - 17, 2017},
  pages        = {1793--1802},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3097983.3098193},
  doi          = {10.1145/3097983.3098193},
  timestamp    = {Fri, 25 Dec 2020 01:14:16 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/GhoshDPYG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/ChanGCSI17,
  author       = {Sheung Chi Chan and
                  Ashish Gehani and
                  James Cheney and
                  Ripduman Sohan and
                  Hassaan Irshad},
  editor       = {Adam Bates and
                  Bill Howe},
  title        = {Expressiveness Benchmarking for System-Level Provenance},
  booktitle    = {9th {USENIX} Workshop on the Theory and Practice of Provenance, TaPP
                  2017, Seattle, WA, USA, June 23, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/tapp17/workshop-program/presentation/chan},
  timestamp    = {Tue, 02 Feb 2021 08:04:55 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/ChanGCSI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/debs/JoyYGGLK16,
  author       = {Joshua Joy and
                  Yu{-}Ting Yu and
                  Mario Gerla and
                  Ashish Gehani and
                  Hasnain Lakhani and
                  Minyoung Kim},
  editor       = {Avigdor Gal and
                  Matthias Weidlich and
                  Vana Kalogeraki and
                  Nalini Venkasubramanian},
  title        = {Energy efficient, context-aware cache coding for mobile information-centric
                  networks},
  booktitle    = {Proceedings of the 10th {ACM} International Conference on Distributed
                  and Event-based Systems, {DEBS} '16, Irvine, CA, USA, June 20 - 24,
                  2016},
  pages        = {270--280},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2933267.2940322},
  doi          = {10.1145/2933267.2940322},
  timestamp    = {Fri, 26 May 2023 07:40:34 +0200},
  biburl       = {https://dblp.org/rec/conf/debs/JoyYGGLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipaw/Stamatogiannakis16,
  author       = {Manolis Stamatogiannakis and
                  Hasanat Kazmi and
                  Hashim Sharif and
                  Remco Vermeulen and
                  Ashish Gehani and
                  Herbert Bos and
                  Paul Groth},
  editor       = {Marta Mattoso and
                  Boris Glavic},
  title        = {Trade-Offs in Automatic Provenance Capture},
  booktitle    = {Provenance and Annotation of Data and Processes - 6th International
                  Provenance and Annotation Workshop, {IPAW} 2016, McLean, VA, USA,
                  June 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9672},
  pages        = {29--41},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40593-3\_3},
  doi          = {10.1007/978-3-319-40593-3\_3},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ipaw/Stamatogiannakis16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/KazmiLGTZ16,
  author       = {Hasanat Kazmi and
                  Hasnain Lakhani and
                  Ashish Gehani and
                  Rashid Tahir and
                  Fareed Zaffar},
  editor       = {Alessandro Pellegrini and
                  Aris Gkoulalas{-}Divanis and
                  Pierangelo di Sanzo and
                  Dimiter R. Avresky},
  title        = {To route or to secure: Tradeoffs in ICNs over MANETs},
  booktitle    = {15th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2016, Cambridge, Boston, MA, USA, October 31 - November 2, 2016},
  pages        = {367--374},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/NCA.2016.7778643},
  doi          = {10.1109/NCA.2016.7778643},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/KazmiLGTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/GehaniKI16,
  author       = {Ashish Gehani and
                  Hasanat Kazmi and
                  Hassaan Irshad},
  editor       = {Sarah Cohen Boulakia},
  title        = {Scaling {SPADE} to "Big Provenance"},
  booktitle    = {8th {USENIX} Workshop on the Theory and Practice of Provenance, TaPP
                  2016, Washington, D.C., USA, June 8-9, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/tapp16/workshop-program/presentation/gehani},
  timestamp    = {Tue, 02 Feb 2021 08:04:57 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/GehaniKI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RaykovaLKG15,
  author       = {Mariana Raykova and
                  Hasnain Lakhani and
                  Hasanat Kazmi and
                  Ashish Gehani},
  title        = {Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric
                  Networks},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818001},
  doi          = {10.1145/2818000.2818001},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RaykovaLKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/WoodMJSKGGSG15,
  author       = {Samuel B. Wood and
                  James Mathewson and
                  Joshua Joy and
                  Mark{-}Oliver Stehr and
                  Minyoung Kim and
                  Ashish Gehani and
                  Mario Gerla and
                  Hamid R. Sadjadpour and
                  J. J. Garcia{-}Luna{-}Aceves},
  editor       = {Narciso Mart{\'{\i}}{-}Oliet and
                  Peter Csaba {\"{O}}lveczky and
                  Carolyn L. Talcott},
  title        = {{ICEMAN:} {A} Practical Architecture for Situational Awareness at
                  the Network Edge},
  booktitle    = {Logic, Rewriting, and Concurrency - Essays dedicated to Jos{\'{e}}
                  Meseguer on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9200},
  pages        = {617--631},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23165-5\_29},
  doi          = {10.1007/978-3-319-23165-5\_29},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/WoodMJSKGGSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/MalechaGS15,
  author       = {Gregory Malecha and
                  Ashish Gehani and
                  Natarajan Shankar},
  editor       = {Roger L. Wainwright and
                  Juan Manuel Corchado and
                  Alessio Bechini and
                  Jiman Hong},
  title        = {Automated software winnowing},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
                  Salamanca, Spain, April 13-17, 2015},
  pages        = {1504--1511},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2695664.2695751},
  doi          = {10.1145/2695664.2695751},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/MalechaGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangYGYTG15,
  author       = {Chao Yang and
                  Guangliang Yang and
                  Ashish Gehani and
                  Vinod Yegneswaran and
                  Dawood Tariq and
                  Guofei Gu},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {58--77},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_4},
  doi          = {10.1007/978-3-319-28865-9\_4},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/YangYGYTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AsgharGCR14,
  author       = {Muhammad Rizwan Asghar and
                  Ashish Gehani and
                  Bruno Crispo and
                  Giovanni Russello},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {{PIDGIN:} privacy-preserving interest and content sharing in opportunistic
                  networks},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {135--146},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590303},
  doi          = {10.1145/2590296.2590303},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AsgharGCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/GehaniT14,
  author       = {Ashish Gehani and
                  Dawood Tariq},
  editor       = {Adriane Chapman and
                  Bertram Lud{\"{a}}scher and
                  Andreas Schreiber},
  title        = {Provenance Integration},
  booktitle    = {6th Workshop on the Theory and Practice of Provenance, TaPP'14, Cologne,
                  Germany, June 12-13, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/tapp2014/agenda/presentation/gehani},
  timestamp    = {Tue, 02 Feb 2021 08:04:56 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/GehaniT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CaskurluGBS13,
  author       = {Bugra {\c{C}}askurlu and
                  Ashish Gehani and
                  Cemal {\c{C}}agatay Bilgin and
                  K. Subramani},
  title        = {Analytical models for risk-based intrusion response},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {10},
  pages        = {2181--2192},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2013.03.012},
  doi          = {10.1016/J.COMNET.2013.03.012},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/CaskurluGBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/GehaniT13,
  author       = {Ashish Gehani and
                  Dawood Tariq},
  editor       = {Giovanna Guerrini},
  title        = {Cross-platform provenance},
  booktitle    = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT/ICDT} '13, Genoa, Italy,
                  March 22, 2013, Workshop Proceedings},
  pages        = {335--336},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2457317.2457378},
  doi          = {10.1145/2457317.2457378},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/GehaniT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LakhaniTAZTG13,
  author       = {Hasnain Lakhani and
                  Rashid Tahir and
                  Azeem Aqil and
                  Fareed Zaffar and
                  Dawood Tariq and
                  Ashish Gehani},
  title        = {Optimized Rollback and Re-computation},
  booktitle    = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
                  Wailea, HI, USA, January 7-10, 2013},
  pages        = {4930--4937},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/HICSS.2013.434},
  doi          = {10.1109/HICSS.2013.434},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LakhaniTAZTG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/WoodMJSKGGSG13,
  author       = {Samuel B. Wood and
                  James Mathewson and
                  Joshua Joy and
                  Mark{-}Oliver Stehr and
                  Minyoung Kim and
                  Ashish Gehani and
                  Mario Gerla and
                  Hamid R. Sadjadpour and
                  J. J. Garcia{-}Luna{-}Aceves},
  editor       = {Joe Senftle and
                  Mike Beltrani and
                  Kari Karwedsky},
  title        = {{ICEMAN:} {A} System for Efficient, Robust and Secure Situational
                  Awareness at the Network Edge},
  booktitle    = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San
                  Diego, CA, USA, November 18-20, 2013},
  pages        = {1512--1517},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/MILCOM.2013.255},
  doi          = {10.1109/MILCOM.2013.255},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/WoodMJSKGGSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KimGKTSK13,
  author       = {Minyoung Kim and
                  Ashish Gehani and
                  Je{-}Min Kim and
                  Dawood Tariq and
                  Mark{-}Oliver Stehr and
                  Jin{-}Soo Kim},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {Maximizing availability of content in disruptive environments by cross-layer
                  optimization},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {447--454},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480451},
  doi          = {10.1145/2480362.2480451},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/KimGKTSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/HustedQG13,
  author       = {Nathaniel Husted and
                  Sharjeel Quresi and
                  Ashish Gehani},
  editor       = {Alexandra Meliou and
                  Val Tannen},
  title        = {Android Provenance: Diagnosing Device Disorders},
  booktitle    = {5th Workshop on the Theory and Practice of Provenance, TaPP'13, Lombard,
                  IL, USA, April 2-3, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/tapp13/technical-sessions/presentation/husted},
  timestamp    = {Tue, 02 Feb 2021 08:04:54 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/HustedQG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/MooreG13,
  author       = {Scott Moore and
                  Ashish Gehani},
  editor       = {Alexandra Meliou and
                  Val Tannen},
  title        = {Declaratively Processing Provenance Metadata},
  booktitle    = {5th Workshop on the Theory and Practice of Provenance, TaPP'13, Lombard,
                  IL, USA, April 2-3, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/tapp13/technical-sessions/presentation/moore},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/MooreG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/GehaniT12,
  author       = {Ashish Gehani and
                  Dawood Tariq},
  editor       = {Priya Narasimhan and
                  Peter Triantafillou},
  title        = {{SPADE:} Support for Provenance Auditing in Distributed Environments},
  booktitle    = {Middleware 2012 - {ACM/IFIP/USENIX} 13th International Middleware
                  Conference, Montreal, QC, Canada, December 3-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7662},
  pages        = {101--120},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35170-9\_6},
  doi          = {10.1007/978-3-642-35170-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/GehaniT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/TariqAG12,
  author       = {Dawood Tariq and
                  Maisem Ali and
                  Ashish Gehani},
  editor       = {Umut A. Acar and
                  Todd J. Green},
  title        = {Towards Automated Collection of Application-Level Data Provenance},
  booktitle    = {4th Workshop on the Theory and Practice of Provenance, TaPP'12, Boston,
                  MA, USA, June 14-15, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/tapp12/workshop-program/presentation/tariq},
  timestamp    = {Tue, 02 Feb 2021 08:04:55 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/TariqAG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/GehaniZS11,
  author       = {Ashish Gehani and
                  Lee Zaniewski and
                  K. Subramani},
  editor       = {Gul Agha and
                  Olivier Danvy and
                  Jos{\'{e}} Meseguer},
  title        = {Algorithmic Aspects of Risk Management},
  booktitle    = {Formal Modeling: Actors, Open Systems, Biological Systems - Essays
                  Dedicated to Carolyn Talcott on the Occasion of Her 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {7000},
  pages        = {262--276},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24933-4\_13},
  doi          = {10.1007/978-3-642-24933-4\_13},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/GehaniZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/GehaniHRDD11,
  author       = {Ashish Gehani and
                  David Hanz and
                  John Rushby and
                  Grit Denker and
                  Rance DeLong},
  title        = {On the (f)utility of untrusted data sanitization},
  booktitle    = {{MILCOM} 2011 - 2011 {IEEE} Military Communications Conference, Baltimore,
                  MD, USA, November 7-10, 2011},
  pages        = {1261--1266},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/MILCOM.2011.6127475},
  doi          = {10.1109/MILCOM.2011.6127475},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/GehaniHRDD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/GehaniTBM11,
  author       = {Ashish Gehani and
                  Dawood Tariq and
                  Basim Baig and
                  Tanu Malik},
  title        = {Policy-Based Integration of Provenance Metadata},
  booktitle    = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Pisa, Italy, 6-8 June 2011},
  pages        = {149--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/POLICY.2011.12},
  doi          = {10.1109/POLICY.2011.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/GehaniTBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/TariqBGMTAZ11,
  author       = {Dawood Tariq and
                  Basim Baig and
                  Ashish Gehani and
                  Salman Mahmood and
                  Rashid Tahir and
                  Azeem Aqil and
                  Fareed Zaffar},
  editor       = {William C. Chu and
                  W. Eric Wong and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Identifying the provenance of correlated anomalies},
  booktitle    = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC),
                  TaiChung, Taiwan, March 21 - 24, 2011},
  pages        = {224--229},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982185.1982236},
  doi          = {10.1145/1982185.1982236},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/TariqBGMTAZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/KimSGT11,
  author       = {Minyoung Kim and
                  Mark{-}Oliver Stehr and
                  Ashish Gehani and
                  Carolyn L. Talcott},
  editor       = {Ching{-}Hsien Hsu and
                  Laurence Tianruo Yang and
                  Jianhua Ma and
                  Chunsheng Zhu},
  title        = {Ensuring Security and Availability through Model-Based Cross-Layer
                  Adaptation},
  booktitle    = {Ubiquitous Intelligence and Computing - 8th International Conference,
                  {UIC} 2011, Banff, Canada, September 2-4, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6905},
  pages        = {310--325},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23641-9\_26},
  doi          = {10.1007/978-3-642-23641-9\_26},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/KimSGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eScience/MalikNG10,
  author       = {Tanu Malik and
                  Ligia Nistor and
                  Ashish Gehani},
  title        = {Tracking and Sketching Distributed Data Provenance},
  booktitle    = {Sixth International Conference on e-Science, e-Science 2010, 7-10
                  December 2010, Brisbane, QLD, Australia},
  pages        = {190--197},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/eScience.2010.51},
  doi          = {10.1109/ESCIENCE.2010.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eScience/MalikNG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grid/GehaniBMTZ10,
  author       = {Ashish Gehani and
                  Basim Baig and
                  Salman Mahmood and
                  Dawood Tariq and
                  Fareed Zaffar},
  title        = {Fine-grained tracking of Grid infections},
  booktitle    = {Proceedings of the 2010 11th {IEEE/ACM} International Conference on
                  Grid Computing, Brussels, Belgium, October 25-29, 2010},
  pages        = {73--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/GRID.2010.5697969},
  doi          = {10.1109/GRID.2010.5697969},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/grid/GehaniBMTZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/GehaniK10,
  author       = {Ashish Gehani and
                  Minyoung Kim},
  editor       = {Salim Hariri and
                  Kate Keahey},
  title        = {Mendel: efficiently verifying the lineage of data modified in multiple
                  trust domains},
  booktitle    = {Proceedings of the 19th {ACM} International Symposium on High Performance
                  Distributed Computing, {HPDC} 2010, Chicago, Illinois, USA, June 21-25,
                  2010},
  pages        = {227--239},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1851476.1851503},
  doi          = {10.1145/1851476.1851503},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpdc/GehaniK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/GehaniKM10,
  author       = {Ashish Gehani and
                  Minyoung Kim and
                  Tanu Malik},
  editor       = {Salim Hariri and
                  Kate Keahey},
  title        = {Efficient querying of distributed provenance stores},
  booktitle    = {Proceedings of the 19th {ACM} International Symposium on High Performance
                  Distributed Computing, {HPDC} 2010, Chicago, Illinois, USA, June 21-25,
                  2010},
  pages        = {613--621},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1851476.1851567},
  doi          = {10.1145/1851476.1851567},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpdc/GehaniKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/DenkerGKH10,
  author       = {Grit Denker and
                  Ashish Gehani and
                  Minyoung Kim and
                  David Hanz},
  title        = {Policy-Based Data Downgrading: Toward a Semantic Framework and Automated
                  Tools to Balance Need-to-Protect and Need-to-Share Policies},
  booktitle    = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Fairfax, VA, USA, 21-23 July 2010},
  pages        = {120--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/POLICY.2010.33},
  doi          = {10.1109/POLICY.2010.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/DenkerGKH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/RajgarhiaG10,
  author       = {Aditya Rajgarhia and
                  Ashish Gehani},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Performance and extension of user space file systems},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {206--213},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774130},
  doi          = {10.1145/1774088.1774130},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/RajgarhiaG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/GehaniKZ09,
  author       = {Ashish Gehani and
                  Minyoung Kim and
                  Jian Zhang},
  editor       = {James Cheney},
  title        = {Steps Toward Managing Lineage Metadata in Grid Clusters},
  booktitle    = {First Workshop on the Theory and Practice of Provenance, TaPP'09,
                  San Francisco, CA, USA, February 23, 2009, Proceedings},
  publisher    = {{USENIX}},
  year         = {2009},
  url          = {http://www.usenix.org/events/tapp09/tech/full\_papers/gehani/gehani.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fast/GehaniKZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/GehaniKS09,
  author       = {Ashish Gehani and
                  Florent Kirchner and
                  Natarajan Shankar},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {System Support for Forensic Inference},
  booktitle    = {Advances in Digital Forensics {V} - Fifth {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Orlando, Florida, USA, January 26-28,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {306},
  pages        = {301--316},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04155-6\_23},
  doi          = {10.1007/978-3-642-04155-6\_23},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/GehaniKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GehaniC08,
  author       = {Ashish Gehani and
                  Surendar Chandra},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Parameterized access control: from design to prototype},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {35},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460922},
  doi          = {10.1145/1460877.1460922},
  timestamp    = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/GehaniC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GehaniL07,
  author       = {Ashish Gehani and
                  Ulf Lindqvist},
  title        = {Bonsai: Balanced Lineage Authentication},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {363--373},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.45},
  doi          = {10.1109/ACSAC.2007.45},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GehaniL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ChandraGY07,
  author       = {Surendar Chandra and
                  Ashish Gehani and
                  Xuwen Yu},
  title        = {Automated Storage Reclamation Using Temporal Importance Annotations},
  booktitle    = {27th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2007), June 25-29, 2007, Toronto, Ontario, Canada},
  pages        = {12},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICDCS.2007.86},
  doi          = {10.1109/ICDCS.2007.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ChandraGY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/GehaniR07,
  author       = {Ashish Gehani and
                  John H. Reif},
  editor       = {Philip Craiger and
                  Sujeet Shenoi},
  title        = {Super-Resolution Video Analysis for Forensic Investigations},
  booktitle    = {Advances in Digital Forensics {III} - {IFIP} International Conference
                  on Digital Forensics, National Centre for Forensic Science, Orlando,
                  Florida, USA, January 28-31, 2007},
  series       = {{IFIP}},
  volume       = {242},
  pages        = {281--299},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-73742-3\_20},
  doi          = {10.1007/978-0-387-73742-3\_20},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/GehaniR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ism/GehaniL07,
  author       = {Ashish Gehani and
                  Ulf Lindqvist},
  title        = {{VEIL:} {A} System for Certifying Video Provenance},
  booktitle    = {Ninth {IEEE} International Symposium on Multimedia, {ISM} 2007, Taichung,
                  Taiwan, December 10-12, 2007},
  pages        = {263--272},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISM.2007.4412382},
  doi          = {10.1109/ISM.2007.4412382},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ism/GehaniL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GehaniC07,
  author       = {Ashish Gehani and
                  Surendar Chandra},
  title        = {Parameterizing access control for heterogeneous peer-to-peer applications},
  booktitle    = {Third International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
                  2007},
  pages        = {269--278},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECCOM.2007.4550343},
  doi          = {10.1109/SECCOM.2007.4550343},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/GehaniC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GehaniC06,
  author       = {Ashish Gehani and
                  Surendar Chandra},
  title        = {{PAST:} Probabilistic Authentication of Sensor Timestamps},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {439--448},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.37},
  doi          = {10.1109/ACSAC.2006.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GehaniC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GehaniCK06,
  author       = {Ashish Gehani and
                  Surendar Chandra and
                  Gershon Kedem},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Augmenting storage with an intrusion response primitive to ensure
                  the security of critical data},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {114--124},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128836},
  doi          = {10.1145/1128817.1128836},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GehaniCK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZaffarKG05,
  author       = {Fareed Zaffar and
                  Gershon Kedem and
                  Ashish Gehani},
  title        = {Paranoid: {A} Global Secure File Access Control System},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {322--332},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.42},
  doi          = {10.1109/CSAC.2005.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZaffarKG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/GehaniLR04,
  author       = {Ashish Gehani and
                  Thomas H. LaBean and
                  John H. Reif},
  editor       = {Natasa Jonoska and
                  Gheorghe Paun and
                  Grzegorz Rozenberg},
  title        = {DNA-based Cryptography},
  booktitle    = {Aspects of Molecular Computing, Essays Dedicated to Tom Head on the
                  Occasion of His 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {2950},
  pages        = {167--188},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24635-0\_12},
  doi          = {10.1007/978-3-540-24635-0\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/GehaniLR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GehaniK04,
  author       = {Ashish Gehani and
                  Gershon Kedem},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {RheoStat: Real-Time Risk Management},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {296--314},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_16},
  doi          = {10.1007/978-3-540-30143-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GehaniK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/GehaniLR99,
  author       = {Ashish Gehani and
                  Thomas H. LaBean and
                  John H. Reif},
  editor       = {Erik Winfree and
                  David K. Gifford},
  title        = {DNA-based cryptography},
  booktitle    = {{DNA} Based Computers, Proceedings of a {DIMACS} Workshop, New Brunswick,
                  New Jersey, USA, June 14-15, 1999},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {54},
  pages        = {233--249},
  publisher    = {{DIMACS/AMS}},
  year         = {1999},
  url          = {https://doi.org/10.1090/dimacs/054/19},
  doi          = {10.1090/DIMACS/054/19},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/GehaniLR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics