Raghavendra Ramesh
Raghavendra Ramesh
Consensys Software R&D
Verified email at consensys.net
Cited by
Cited by
An automata based approach for verifying information flow properties
D D'Souza, KR Raghavendra, B Sprick
Electronic Notes in Theoretical Computer Science 135 (1), 39-58, 2005
SEAL: a logic programming framework for specifying and verifying access control models
P Naldurg, R KR
Proceedings of the 16th ACM symposium on Access control models and …, 2011
Model-checking trace-based information flow properties
D D'Souza, R Holla, KR Raghavendra, B Sprick
Journal of Computer Security 19 (1), 101-138, 2011
An efficient tunable selective points-to analysis for large codebases
B Hassanshahi, RK Ramesh, P Krishnan, B Scholz, Y Lu
Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the …, 2017
On the decidability of model-checking information flow properties
D D’Souza, R Holla, J Kulkarni, R Ramesh, B Sprick
International Conference on Information Systems and Security (ICISS) 5352, 26-40, 2008
Modeling and analysis of a fuel-injection pump used in diesel engines
P Sundarraman, SK Saha, NJ Vasa, R Baskaran, V Sunilkumar, ...
International Journal of Automotive Technology 13 (2), 193-203, 2012
Static program analysis method for detecting security bugs in programs that rely on code access control
Y Lu, RK Ramesh
US Patent 10,108,802, 2018
Primal Infon Logic: Derivability in Polynomial Time.
A Baskar, P Naldurg, KR Raghavendra, SP Suresh
IARCS Annual Conference on Foundations of Software Technology and …, 2013
Checking unwinding conditions for finite state systems
D D’Souza, KR Raghavendra
Proceedings of the VERIFY 2006 workshop, 85-94, 2006
Static analysis of Java enterprise applications: frameworks and caches, the elephants in the room
A Antoniadis, N Filippakis, P Krishnan, R Ramesh, N Allen, ...
Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020
Inferring security-sensitive entities in libraries
Y Lu, P Krishnan, RK Ramesh, BAE Sora
US Patent 9,807,101, 2017
Scalable points-to analysis via multiple slicing
P Krishnan, RK Ramesh
US Patent App. 14/757,684, 2017
Atomic Crosschain Transactions White Paper
P Robinson, R Ramesh, J Brainard, S Johnson
arXiv preprint arXiv:2003.00903, 2020
Scalable provenance generation from points-to information
S Sindelar, P Krishnan, B Scholz, RK Ramesh, Y Lu
US Patent 9,811,322, 2017
Inference of security-sensitive entities in libraries
Y Lu, S Bae, P Krishnan, KR Raghavendra
2017 IEEE Security and Privacy Workshops (SPW), 102-109, 2017
Model-checking bisimulation-based information flow properties for infinite state systems
D D’Souza, KR Raghavendra
European Symposium of Research in Computer Security 7459, 591-608, 2012
Algorithm for Cross-shard Cross-EE Atomic User-level ETH Transfer in Ethereum 2
R Ramesh
arXiv preprint arXiv:2102.09688, 2021
General Purpose Atomic Crosschain Transactions
P Robinson, R Ramesh
arXiv preprint arXiv:2011.12783, 2020
Detecting second-order security vulnerabilities via modelling information flow through persistent storage
RK Ramesh, P Krishnan, Y Lu
US Patent App. 16/277,625, 2020
Compositional string analysis
P Krishnan, RK Ramesh, Y Zhao
US Patent 10,719,424, 2020
The system can't perform the operation now. Try again later.
Articles 1–20