An automata based approach for verifying information flow properties D D'Souza, KR Raghavendra, B Sprick Electronic Notes in Theoretical Computer Science 135 (1), 39-58, 2005 | 19 | 2005 |
SEAL: a logic programming framework for specifying and verifying access control models P Naldurg, R KR Proceedings of the 16th ACM symposium on Access control models and …, 2011 | 15 | 2011 |
Model-checking trace-based information flow properties D D'Souza, R Holla, KR Raghavendra, B Sprick Journal of Computer Security 19 (1), 101-138, 2011 | 15 | 2011 |
An efficient tunable selective points-to analysis for large codebases B Hassanshahi, RK Ramesh, P Krishnan, B Scholz, Y Lu Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the …, 2017 | 11 | 2017 |
On the decidability of model-checking information flow properties D D’Souza, R Holla, J Kulkarni, R Ramesh, B Sprick International Conference on Information Systems and Security (ICISS) 5352, 26-40, 2008 | 11 | 2008 |
Modeling and analysis of a fuel-injection pump used in diesel engines P Sundarraman, SK Saha, NJ Vasa, R Baskaran, V Sunilkumar, ... International Journal of Automotive Technology 13 (2), 193-203, 2012 | 8 | 2012 |
Static program analysis method for detecting security bugs in programs that rely on code access control Y Lu, RK Ramesh US Patent 10,108,802, 2018 | 4 | 2018 |
Primal Infon Logic: Derivability in Polynomial Time. A Baskar, P Naldurg, KR Raghavendra, SP Suresh IARCS Annual Conference on Foundations of Software Technology and …, 2013 | 4 | 2013 |
Checking unwinding conditions for finite state systems D D’Souza, KR Raghavendra Proceedings of the VERIFY 2006 workshop, 85-94, 2006 | 3 | 2006 |
Static analysis of Java enterprise applications: frameworks and caches, the elephants in the room A Antoniadis, N Filippakis, P Krishnan, R Ramesh, N Allen, ... Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020 | 2 | 2020 |
Inferring security-sensitive entities in libraries Y Lu, P Krishnan, RK Ramesh, BAE Sora US Patent 9,807,101, 2017 | 2 | 2017 |
Scalable points-to analysis via multiple slicing P Krishnan, RK Ramesh US Patent App. 14/757,684, 2017 | 2 | 2017 |
Atomic Crosschain Transactions White Paper P Robinson, R Ramesh, J Brainard, S Johnson arXiv preprint arXiv:2003.00903, 2020 | 1 | 2020 |
Scalable provenance generation from points-to information S Sindelar, P Krishnan, B Scholz, RK Ramesh, Y Lu US Patent 9,811,322, 2017 | 1 | 2017 |
Inference of security-sensitive entities in libraries Y Lu, S Bae, P Krishnan, KR Raghavendra 2017 IEEE Security and Privacy Workshops (SPW), 102-109, 2017 | 1 | 2017 |
Model-checking bisimulation-based information flow properties for infinite state systems D D’Souza, KR Raghavendra European Symposium of Research in Computer Security 7459, 591-608, 2012 | 1 | 2012 |
Algorithm for Cross-shard Cross-EE Atomic User-level ETH Transfer in Ethereum 2 R Ramesh arXiv preprint arXiv:2102.09688, 2021 | | 2021 |
General Purpose Atomic Crosschain Transactions P Robinson, R Ramesh arXiv preprint arXiv:2011.12783, 2020 | | 2020 |
Detecting second-order security vulnerabilities via modelling information flow through persistent storage RK Ramesh, P Krishnan, Y Lu US Patent App. 16/277,625, 2020 | | 2020 |
Compositional string analysis P Krishnan, RK Ramesh, Y Zhao US Patent 10,719,424, 2020 | | 2020 |