Takip et
Prateek Saxena
Prateek Saxena
comp.nus.edu.sg üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Making smart contracts smarter
L Luu, DH Chu, H Olickel, P Saxena, A Hobor
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
23442016
On Scaling Decentralized Blockchains: (A Position Paper)
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
15632016
A secure sharding protocol for open blockchains
L Luu, V Narayanan, C Zheng, K Baweja, S Gilbert, P Saxena
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
15322016
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
10792008
Finding the greedy, prodigal, and suicidal contracts at scale
I Nikolić, A Kolluri, I Sergey, P Saxena, A Hobor
Proceedings of the 34th annual computer security applications conference …, 2018
6412018
A symbolic execution framework for javascript
P Saxena, D Akhawe, S Hanna, F Mao, S McCamant, D Song
2010 IEEE Symposium on Security and Privacy, 513-528, 2010
6102010
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016
4952016
Auror: defending against poisoning attacks in collaborative deep learning systems
S Shen, S Tople, P Saxena
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
3352016
Preventing page faults from telling your secrets
S Shinde, ZL Chua, V Narayanan, P Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
3022016
Demystifying incentives in the consensus computer
L Luu, J Teutsch, R Kulkarni, P Saxena
Proceedings of the 22Nd acm sigsac conference on computer and communications …, 2015
2942015
PANOPLY: Low-TCB Linux Applications with SGX Enclaves
S Shinde, D Le Tien, S Tople, P Saxena
Network and Distributed Systems Security (NDSS), 2017
2852017
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Y Nadji, P Saxena, D Song
NDSS 20, 2009
2792009
On the limits of information flow techniques for malware analysis and containment
L Cavallaro, P Saxena, R Sekar
International conference on Detection of Intrusions and Malware, and …, 2008
257*2008
Protecting Browsers from Extension Vulnerabilities.
A Barth, AP Felt, P Saxena, A Boodman
Ndss, 2010
2432010
Automatic Generation of {Data-Oriented} Exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th USENIX Security Symposium (USENIX Security 15), 177-192, 2015
2422015
Loop-extended symbolic execution on binary programs
P Saxena, P Poosankam, S McCamant, D Song
Proceedings of the eighteenth international symposium on Software testing …, 2009
2402009
A traceability analysis of monero’s blockchain
A Kumar, C Fischer, S Tople, P Saxena
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
2252017
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications
P Saxena, D Molnar, B Livshits
Proceedings of the 18th ACM conference on Computer and communications …, 2011
224*2011
Fast and precise sanitizer analysis with BEK
P Hooimeijer, B Livhsits, D Molnar, P Saxena, M Veanes
Proceedings of the Usenix Security Symposium, 2011
223*2011
A systematic analysis of XSS sanitization in web application frameworks
J Weinberger, P Saxena, D Akhawe, M Finifter, R Shin, D Song
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
215*2011
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20