default search action
Atul Prakash 0001
Person information
- affiliation: University of Michigan, Department of Electrical Engineering and Computer Science, Ann Arbor, MI, USA
- affiliation (PhD): University of California, Berkeley, CA, USA
Other persons with the same name
- Atul Prakash 0002 — Birla Institute of Technology, Department of Electronics and Communication Engineering, Ranchi, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c102]Neal Mangaokar, Ashish Hooda, Jihye Choi, Shreyas Chandrashekaran, Kassem Fawaz, Somesh Jha, Atul Prakash:
PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails. ACL (1) 2024: 10960-10976 - [c101]Haizhong Zheng, Jiachen Sun, Shutong Wu, Bhavya Kailkhura, Z. Morley Mao, Chaowei Xiao, Atul Prakash:
Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation. ECCV (24) 2024: 166-182 - [c100]Jiachen Sun, Haizhong Zheng, Qingzhao Zhang, Atul Prakash, Zhuoqing Mao, Chaowei Xiao:
CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception. ICLR 2024 - [c99]Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi:
Modeling and Detecting Internet Censorship Events. NDSS 2024 - [c98]Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash:
D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles. WACV 2024: 3800-3810 - [i34]Haizhong Zheng, Xiaoyan Bai, Beidi Chen, Fan Lai, Atul Prakash:
Learn To be Efficient: Build Structured Sparsity in Large Language Models. CoRR abs/2402.06126 (2024) - [i33]Shuowei Jin, Yongji Wu, Haizhong Zheng, Qingzhao Zhang, Matthew Lentz, Z. Morley Mao, Atul Prakash, Feng Qian, Danyang Zhuo:
Adaptive Skeleton Graph Decoding. CoRR abs/2402.12280 (2024) - [i32]Neal Mangaokar, Ashish Hooda, Jihye Choi, Shreyas Chandrashekaran, Kassem Fawaz, Somesh Jha, Atul Prakash:
PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails. CoRR abs/2402.15911 (2024) - [i31]Haizhong Zheng, Elisa Tsai, Yifu Lu, Jiachen Sun, Brian R. Bartoldson, Bhavya Kailkhura, Atul Prakash:
ELFS: Enhancing Label-Free Coreset Selection via Clustering-based Pseudo-Labeling. CoRR abs/2406.04273 (2024) - 2023
- [c97]Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash:
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks. CCS 2023: 786-800 - [c96]Haizhong Zheng, Rui Liu, Fan Lai, Atul Prakash:
Coverage-centric Coreset Selection for High Pruning Rates. ICLR 2023 - [c95]Jihye Choi, Jayaram Raghuram, Ryan Feng, Jiefeng Chen, Somesh Jha, Atul Prakash:
Concept-based Explanations for Out-of-Distribution Detectors. ICML 2023: 5817-5837 - [i30]Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash:
Investigating Stateful Defenses Against Black-Box Adversarial Examples. CoRR abs/2303.06280 (2023) - [i29]Jiachen Sun, Haizhong Zheng, Qingzhao Zhang, Atul Prakash, Z. Morley Mao, Chaowei Xiao:
CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception. CoRR abs/2306.00349 (2023) - [i28]Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash:
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks. CoRR abs/2307.16331 (2023) - [i27]Haizhong Zheng, Jiachen Sun, Shutong Wu, Bhavya Kailkhura, Zhuoqing Mao, Chaowei Xiao, Atul Prakash:
Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation. CoRR abs/2310.07506 (2023) - 2022
- [j32]Neal Mangaokar, Atul Prakash:
Dispelling Misconceptions and Characterizing the Failings of Deepfake Detection. IEEE Secur. Priv. 20(2): 61-67 (2022) - [c94]Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash:
GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems. EuroS&P 2022: 664-683 - [c93]Renuka Kumar, Apurva Virkud, Ram Sundara Raman, Atul Prakash, Roya Ensafi:
A Large-scale Investigation into Geodifferences in Mobile Apps. USENIX Security Symposium 2022: 1203-1220 - [i26]Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash:
Towards Adversarially Robust Deepfake Detection: An Ensemble Approach. CoRR abs/2202.05687 (2022) - [i25]Jihye Choi, Jayaram Raghuram, Ryan Feng, Jiefeng Chen, Somesh Jha, Atul Prakash:
Concept-based Explanations for Out-Of-Distribution Detectors. CoRR abs/2203.02586 (2022) - [i24]Ryan Feng, Somesh Jha, Atul Prakash:
Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing. CoRR abs/2205.08989 (2022) - [i23]Haizhong Zheng, Rui Liu, Fan Lai, Atul Prakash:
Coverage-centric Coreset Selection for High Pruning Rates. CoRR abs/2210.15809 (2022) - 2021
- [j31]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j30]Szu-Yun Lin, Andrew W. Hlynka, Lichao Xu, Hao Lu, Omar A. Sediek, Sherif El-Tawil, Vineet R. Kamat, Jason McCormick, Carol C. Menassa, Seymour M. J. Spence, Atul Prakash, Benigno Aguirre:
Simple Run-Time Infrastructure (SRTI): An accessible distributed computing platform for interdisciplinary simulation. J. Comput. Sci. 55: 101455 (2021) - [c92]Sanjay Kariyappa, Atul Prakash, Moinuddin K. Qureshi:
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation. CVPR 2021: 13814-13823 - [c91]Sanjay Kariyappa, Atul Prakash, Moinuddin K. Qureshi:
Protecting DNNs from Theft using an Ensemble of Diverse Models. ICLR 2021 - [i22]Nelson Manohar-Alers, Ryan Feng, Sahib Singh, Jiguo Song, Atul Prakash:
Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples. CoRR abs/2107.00561 (2021) - 2020
- [c90]Haizhong Zheng, Ziqi Zhang, Juncheng Gu, Honglak Lee, Atul Prakash:
Efficient Adversarial Training With Transferable Adversarial Examples. CVPR 2020: 1178-1187 - [c89]Renuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash:
Security Analysis of Unified Payments Interface and Payment Apps in India. USENIX Security Symposium 2020: 1499-1516 - [i21]Ryan Feng, Jiefeng Chen, Nelson R. Manohar, Earlence Fernandes, Somesh Jha, Atul Prakash:
Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification. CoRR abs/2002.07088 (2020) - [i20]Sanjay Kariyappa, Atul Prakash, Moinuddin K. Qureshi:
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation. CoRR abs/2005.03161 (2020) - [i19]Liang Tong, Minzhe Guo, Atul Prakash, Yevgeniy Vorobeychik:
Towards Robustness against Unsuspicious Adversarial Examples. CoRR abs/2005.04272 (2020) - [i18]Haizhong Zheng, Ziqi Zhang, Honglak Lee, Atul Prakash:
Understanding and Diagnosing Vulnerability under Adversarial Attacks. CoRR abs/2007.08716 (2020) - [i17]Ryan Feng, Wu-chi Feng, Atul Prakash:
Essential Features: Reducing the Attack Surface of Adversarial Perturbations with Robust Content-Aware Image Preprocessing. CoRR abs/2012.01699 (2020)
2010 – 2019
- 2019
- [c88]Brandon Carlson, Kevin Leach, Darko Marinov, Meiyappan Nagappan, Atul Prakash:
Open Source Vulnerability Notification. OSS 2019: 12-23 - [c87]Davino Mauro Junior, Luis Melo, Hao Lu, Marcelo d'Amorim, Atul Prakash:
A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion Apps. IEEE Symposium on Security and Privacy Workshops 2019: 181-186 - [i16]Davino Mauro Junior, Luis Melo, Harvey Lu, Marcelo d'Amorim, Atul Prakash:
Beware of the App! On the Vulnerability Surface of Smart Devices through their Companion Apps. CoRR abs/1901.10062 (2019) - [i15]Kevin Eykholt, Swati Gupta, Atul Prakash, Haizhong Zheng:
Robust Classification using Robust Feature Augmentation. CoRR abs/1905.10904 (2019) - [i14]Haizhong Zheng, Earlence Fernandes, Atul Prakash:
Analyzing the Interpretability Robustness of Self-Explaining Models. CoRR abs/1905.12429 (2019) - [i13]Pratik Vaishnavi, Kevin Eykholt, Atul Prakash, Amir Rahmati:
Transferable Adversarial Robustness using Adversarially Trained Autoencoders. CoRR abs/1909.05921 (2019) - [i12]Pratik Vaishnavi, Tianji Cong, Kevin Eykholt, Atul Prakash, Amir Rahmati:
Can Attention Masks Improve Adversarial Robustness? CoRR abs/1911.11946 (2019) - [i11]Haizhong Zheng, Ziqi Zhang, Juncheng Gu, Honglak Lee, Atul Prakash:
Efficient Adversarial Training with Transferable Adversarial Examples. CoRR abs/1912.11969 (2019) - 2018
- [c86]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Robust Physical-World Attacks on Deep Learning Visual Classification. CVPR 2018: 1625-1634 - [c85]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Decentralized Action Integrity for Trigger-Action IoT Platforms. NDSS 2018 - [c84]Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash:
Tyche: A Risk-Based Permission Model for Smart Homes. SecDev 2018: 29-36 - [c83]Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno:
Physical Adversarial Examples for Object Detectors. WOOT @ USENIX Security Symposium 2018 - [i10]Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash:
Tyche: Risk-Based Permissions for Smart Home Platforms. CoRR abs/1801.04609 (2018) - [i9]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Physical Adversarial Examples for Object Detectors. CoRR abs/1807.07769 (2018) - [i8]Davino Mauro Junior, Kiev Gama, Atul Prakash:
Securing IoT Apps with Fine-grained Control of Information Flows. CoRR abs/1810.13367 (2018) - [i7]Kevin Eykholt, Atul Prakash:
Designing Adversarially Resilient Classifiers using Resilient Feature Engineering. CoRR abs/1812.06626 (2018) - 2017
- [j29]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Security Implications of Permission Models in Smart-Home Application Frameworks. IEEE Secur. Priv. 15(2): 24-30 (2017) - [j28]Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash:
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? IEEE Secur. Priv. 15(4): 79-84 (2017) - [c82]Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Xinheng Chen, Atul Prakash:
Heimdall: A Privacy-Respecting Implicit Preference Collection Framework. MobiSys 2017: 453-463 - [c81]Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash:
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms. NDSS 2017 - [c80]Kevin Eykholt, Atul Prakash, Barzan Mozafari:
Ensuring Authorized Updates in Multi-user Database-Backed Applications. USENIX Security Symposium 2017: 1445-1462 - [i6]Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash:
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? CoRR abs/1705.08522 (2017) - [i5]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things. CoRR abs/1707.00405 (2017) - [i4]Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, Dawn Song:
Robust Physical-World Attacks on Machine Learning Models. CoRR abs/1707.08945 (2017) - [i3]Amir Rahmati, Earlence Fernandes, Jaeyeon Jung, Atul Prakash:
IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks. CoRR abs/1709.02788 (2017) - [i2]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Dawn Song, Tadayoshi Kohno, Amir Rahmati, Atul Prakash, Florian Tramèr:
Note on Attacking Object Detectors with Adversarial Stickers. CoRR abs/1712.08062 (2017) - 2016
- [j27]Yilan Zhang, Sean M. O'connor, Gwendolyn W. van der Linden, Atul Prakash, Jerome P. Lynch:
SenStore: A Scalable Cyberinfrastructure Platform for Implementation of Data-to-Decision Frameworks for Infrastructure Health Management. J. Comput. Civ. Eng. 30(5) (2016) - [c79]Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Zhuoqing Morley Mao, Atul Prakash:
Android UI Deception Revisited: Attacks and Defenses. Financial Cryptography 2016: 41-59 - [c78]Amir Rahmati, Earlence Fernandes, Atul Prakash:
Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications. SecDev 2016: 88-93 - [c77]Earlence Fernandes, Jaeyeon Jung, Atul Prakash:
Security Analysis of Emerging Smart Home Applications. IEEE Symposium on Security and Privacy 2016: 636-654 - [c76]Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash:
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. USENIX Security Symposium 2016: 531-548 - 2015
- [j26]Manu Akula, Atul Sandur, Vineet R. Kamat, Atul Prakash:
Context-Aware Framework for Highway Bridge Inspections. J. Comput. Civ. Eng. 29(1) (2015) - [c75]Earlence Fernandes, Ajit Aluri, Alexander Crowell, Atul Prakash:
Decomposable Trust for Android Applications. DSN 2015: 343-354 - [c74]Justin Paupore, Earlence Fernandes, Atul Prakash, Sankardas Roy, Xinming Ou:
Practical Always-on Taint Tracking on Mobile Devices. HotOS 2015 - 2014
- [j25]Biswajit Panja, David Morrison, Priyanka Meharia, Bharat Bharat, Atul Prakash:
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services. Int. J. Next Gener. Comput. 5(3) (2014) - [c73]Mauro Conti, Earlence Fernandes, Justin Paupore, Atul Prakash, Daniel Simionato:
OASIS: Operational Access Sandboxes for Information Security. SPSM@CCS 2014: 105-110 - [c72]Jiaan Zeng, Guangchen Ruan, Alexander Crowell, Atul Prakash, Beth Plale:
Cloud computing data capsules for non-consumptiveuse of texts. ScienceCloud@HPDC 2014: 9-16 - [e2]Atul Prakash, Rudrapatna K. Shyamasundar:
Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings. Lecture Notes in Computer Science 8880, Springer 2014, ISBN 978-3-319-13840-4 [contents] - [i1]Earlence Fernandes, Alexander Crowell, Ajit Aluri, Atul Prakash:
Anception: Application Virtualization For Android. CoRR abs/1401.6726 (2014) - 2013
- [j24]Alexander Crowell, Beng Heng Ng, Earlence Fernandes, Atul Prakash:
The Confinement Problem: 40 Years Later. J. Inf. Process. Syst. 9(2): 189-204 (2013) - [c71]Beng Heng Ng, Atul Prakash:
Expose: Discovering Potential Binary Code Re-use. COMPSAC 2013: 492-501 - [c70]Beng Heng Ng, Atul Prakash:
Let the Right One in: Discovering and Mitigating Permission Gaps. ICISS 2013: 297-313 - 2012
- [c69]Beng Heng Ng, Alexander Crowell, Atul Prakash:
Adaptive semi-private email aliases. AsiaCCS 2012: 69-70 - [c68]Biswajit Panja, Atul Prakash, Priyanka Meharia, Bradley Schneider:
Security in sensor network based SCADA system for adaptive traffic signal operation. CTS 2012: 195-202 - 2011
- [c67]Heqing Huang, Su Zhang, Xinming Ou, Atul Prakash, Karem A. Sakallah:
Distilling critical attack graph surface iteratively through minimum-cost SAT solving. ACSAC 2011: 31-40 - [c66]Billy Lau, Atul Prakash, Venkatanathan Annamalai:
Accessing Trusted Web Sites from Low-Integrity Systems without End-Host Snooping. SocialCom/PASSAT 2011: 1012-1019 - 2010
- [c65]Jordan Crain, Lukasz Opyrchal, Atul Prakash:
Fighting Phishing with Trusted Email. ARES 2010: 462-467 - [c64]Beng Heng Ng, Xin Hu, Atul Prakash:
A Study on Latent Vulnerabilities. SRDS 2010: 333-337 - [c63]Mark W. Newman, Mark S. Ackerman, Jungwoo Kim, Atul Prakash, Zhenan Hong, Jacob Mandel, Tao Dong:
Bringing the field into the lab: supporting capture and replay of contextual data for the design of context-aware applications. UIST 2010: 105-108
2000 – 2009
- 2009
- [j23]Mark S. Ackerman, Tao Dong, Scott Gifford, Jungwoo Kim, Mark W. Newman, Atul Prakash, Sarah Qidwai, David García, Paulo Villegas, Alejandro Cadenas, Antonio Sánchez-Esguevillas, Javier M. Aguiar, Belén Carro, Sean Mailander, Ronald Schroeter, Marcus Foth, Amiya Bhattacharya, Partha Dasgupta:
Location-Aware Computing, Virtual Networks. IEEE Pervasive Comput. 8(4): 28-32 (2009) - [c62]Feng Qian, Zhiyun Qian, Zhuoqing Morley Mao, Atul Prakash:
Ensemble: Community-Based Anomaly Detection for Popular Applications. SecureComm 2009: 163-184 - [c61]Kevin Borders, Atul Prakash:
Quantifying Information Leaks in Outbound Web Traffic. SP 2009: 129-140 - [c60]Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash:
Protecting Confidential Data on Personal Computers with Storage Capsules. USENIX Security Symposium 2009: 367-382 - [e1]Atul Prakash, Indranil Gupta:
Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings. Lecture Notes in Computer Science 5905, Springer 2009, ISBN 978-3-642-10771-9 [contents] - 2008
- [c59]Garrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash, Kevin Borders:
Social networks and context-aware spam. CSCW 2008: 403-412 - [c58]Xin Zhao, Kevin Borders, Atul Prakash:
Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers. Middleware 2008: 388-407 - [c57]Laura Falk, Atul Prakash, Kevin Borders:
Analyzing websites for user-visible security design flaws. SOUPS 2008: 117-126 - [c56]Kevin Borders, Atul Prakash:
Towards Quantification of Network-Based Information Leaks via HTTP. HotSec 2008 - [p2]Lukasz Opyrchal, Atul Prakash:
Large-Scale Group Collaboration Systems. Wiley Encyclopedia of Computer Science and Engineering 2008 - [p1]Hyong Sop Shim, Atul Prakash, Jang Ho Lee:
Distributed and Collaborative Development. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [j22]Xin Zhao, Kevin Borders, Atul Prakash:
Using a virtual machine to protect sensitive Grid resources. Concurr. Comput. Pract. Exp. 19(14): 1917-1935 (2007) - [j21]Lukasz Opyrchal, Atul Prakash, Amit Agrawal:
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments. J. Networks 2(1): 17-26 (2007) - [c55]Kevin Borders, Atul Prakash, Mark Zielinski:
Spector: Automatically Analyzing Shell Code. ACSAC 2007: 501-514 - [c54]Atul Prakash:
Security in Practice - Security-Usability Chasm. ICISS 2007: 1-9 - [c53]Kevin Borders, Laura Falk, Atul Prakash:
OpenFire: Using deception to reduce network attacks. SecureComm 2007: 224-233 - [c52]Kevin Borders, Atul Prakash:
Securing Network Input via a Trusted Input Proxy. HotSec 2007 - 2006
- [j20]Patrick D. McDaniel, Atul Prakash:
Enforcing provisioning and authorization policy in the Antigone system. J. Comput. Secur. 14(6): 483-511 (2006) - [j19]Patrick D. McDaniel, Atul Prakash:
Methods and limitations of security policy reconciliation. ACM Trans. Inf. Syst. Secur. 9(3): 259-291 (2006) - [c51]Scott Gifford, Jim Knox, Jonathan James, Atul Prakash:
Introduction to the talking points project. ASSETS 2006: 271-272 - [c50]Kevin Borders, Xin Zhao, Atul Prakash:
Securing sensitive content in a view-only file system. Digital Rights Management Workshop 2006: 27-36 - [c49]Lukasz Opyrchal, Atul Prakash, Amit Agrawal:
Designing a Publish-Subscribe Substrate for Privacy/Security in Pervasive Environments. ICPS 2006: 313-316 - [c48]Kevin Borders, Xin Zhao, Atul Prakash:
Siren: Catching Evasive Malware (Short Paper). S&P 2006: 78-85 - 2005
- [c47]Kevin Borders, Xin Zhao, Atul Prakash:
CPOL: high-performance policy evaluation. CCS 2005: 147-157 - [c46]Xin Zhao, Kevin Borders, Atul Prakash:
SVGrid: a secure virtual environment for untrusted grid applications. MGC@Middleware 2005: 2:1-2:6 - [c45]Xin Zhao, Atul Prakash:
WSF: An HTTP-Level Firewall for Hardening Web Servers. IASTED PDCS 2005: 248-253 - [c44]Pavan Verma, Atul Prakash:
FACE: A Firewall Analysis and Configuration Engine. SAINT 2005: 74-81 - [c43]Xin Zhao, Kevin Borders, Atul Prakash:
Towards Protecting Sensitive Files in a Compromised System. IEEE Security in Storage Workshop 2005: 21-28 - 2004
- [c42]Kevin Borders, Atul Prakash:
Web tap: detecting covert web traffic. CCS 2004: 110-120 - 2003
- [c41]Xin Zhao, Atul Prakash:
Source Authentication in Group Communication Systems. DEXA Workshops 2003: 455-459 - [c40]