Somesh Jha [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking UsenixATCBoston-2018 - Boston, USA
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS-2018 - san diego,usa
Locally Differentially Private Protocols for Frequency Estimation usenixsecurity-2017 - vancouver,canada
Practical DIFC Enforcement on Android USENIX-2016 - austin,usa
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing ATC-2015 - Santa Clara,USA
Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection CCS-2014 - Scottsdale,USA
Formatted Encryption Beyond Regular Languages CCS-2014 - Scottsdale,USA
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing usenix-2014 - san diego,usa
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes usenix-2014 - san diego,usa
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution USENIX-2013 - Washington, D.C.
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis USENIX-2013 - Washington, D.C.
Automatic Generation Of Remediation Procedures For Malware Infections 19th USENIX Security Symposium-2010 - Washington DC, USA Security Malware
An Architecture For Generating Semantic Aware Signatures 14th USENIX Security Symposium-2005 - Baltimore, USA Security
Building Secure Systems 14th USENIX Security Symposium-2005 - Baltimore, USA Security
Static Analysis Of Executables To Detect Malicious Patterns 12th USENIX Security Symposium-2003 - Washington DC, USA Security Analysis
Detecting Manipulated Remote Call Streams 11th USENIX Security Symposium-2002 - San Francisco, USA Security