Follow
Aravind Prakash
Aravind Prakash
Associate Professor, Binghamton University
Verified email at binghamton.edu - Homepage
Title
Cited by
Cited by
Year
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
A Prakash, X Hu, H Yin
NDSS, 2015
1482015
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform
A Henderson, A Prakash, LK Yan, X Hu, X Wang, R Zhou, H Yin
Proceedings of the 2014 international symposium on software testing and …, 2014
1402014
Debloating software through {Piece-Wise} compilation and loading
A Quach, A Prakash, L Yan
27th USENIX security symposium (USENIX Security 18), 869-886, 2018
1372018
Decaf: A platform-neutral whole-system dynamic binary analysis platform
A Henderson, LK Yan, X Hu, A Prakash, H Yin, S McCamant
IEEE Transactions on Software Engineering 43 (2), 164-184, 2016
622016
Os-sommelier: Memory-only operating system fingerprinting in the cloud
Y Gu, Y Fu, A Prakash, Z Lin, H Yin
Proceedings of the Third ACM Symposium on Cloud Computing, 1-13, 2012
472012
A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments
A Quach, R Erinfolami, D Demicco, A Prakash
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
432017
Enforcing system-wide control flow integrity for exploit detection and diagnosis
A Prakash, H Yin, Z Liang
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
432013
Mace: High-coverage and robust memory analysis for commodity operating systems
Q Feng, A Prakash, H Yin, Z Lin
Proceedings of the 30th annual computer security applications conference …, 2014
322014
Manipulating semantic values in kernel data structures: Attack assessments and implications
A Prakash, E Venkataramani, H Yin, Z Lin
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
322013
Defeating rop through denial of stack pivot
A Prakash, H Yin
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
282015
Identifying and analyzing pointer misuses for sophisticated memory-corruption exploit diagnosis
M Zhang, A Prakash, X Li, Z Liang, H Yin
272012
Multi-aspect, robust, and memory exclusive guest os fingerprinting
Y Gu, Y Fu, A Prakash, Z Lin, H Yin
IEEE Transactions on Cloud Computing 2 (4), 380-394, 2014
262014
On the trustworthiness of memory analysis—an empirical study from the perspective of binary execution
A Prakash, E Venkataramani, H Yin, Z Lin
IEEE Transactions on Dependable and Secure Computing 12 (5), 557-570, 2014
242014
Origen: Automatic extraction of offset-revealing instructions for cross-version memory analysis
Q Feng, A Prakash, M Wang, C Carmony, H Yin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
182016
Bloat factors and binary specialization
A Quach, A Prakash
Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software …, 2019
162019
DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries
RA Erinfolami, A Prakash
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
92019
Supplementing modern software defenses with stack-pointer sanity
A Quach, M Cole, A Prakash
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
82017
Control flow and pointer integrity enforcement in a secure tagged architecture
RT Gollapudi, G Yuksek, D Demicco, M Cole, G Kothari, R Kulkarni, ...
2023 IEEE Symposium on Security and Privacy (SP), 2974-2989, 2023
72023
Devil is virtual: Reversing virtual inheritance in c++ binaries
RA Erinfolami, A Prakash
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
32020
Simplex: Repurposing Intel memory protection extensions for information hiding
M Cole, A Prakash
arXiv preprint arXiv:2009.06490, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20