default search action
Prateek Saxena
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c83]Sarthak Choudhary, Aashish Kolluri, Prateek Saxena:
Attacking Byzantine Robust Aggregation in High Dimensions. SP 2024: 1325-1344 - 2023
- [j7]Bo Wang, Aashish Kolluri, Ivica Nikolic, Teodora Baluta, Prateek Saxena:
User-Customizable Transpilation of Scripting Languages. Proc. ACM Program. Lang. 7(OOPSLA1): 201-229 (2023) - [c82]Teodora Baluta, Ivica Nikolic, Racchit Jain, Divesh Aggarwal, Prateek Saxena:
Unforgeability in Stochastic Gradient Descent. CCS 2023: 1138-1152 - [c81]Bo Wang, Ruishi Li, Mingkai Li, Prateek Saxena:
TransMap: Pinpointing Mistakes in Neural Code Translation. ESEC/SIGSOFT FSE 2023: 999-1011 - [c80]Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena:
Capstone: A Capability-based Foundation for Trustless Secure Memory Access. USENIX Security Symposium 2023: 787-804 - [i37]Bo Wang, Aashish Kullori, Ivica Nikolic, Teodora Baluta, Prateek Saxena:
User-customizable Transpilation of Scripting Languages. CoRR abs/2301.11220 (2023) - [i36]Aashish Kolluri, Sarthak Choudhary, Bryan Hooi, Prateek Saxena:
RETEXO: Scalable Neural Network Training over Distributed Graphs. CoRR abs/2302.13053 (2023) - [i35]Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena:
Capstone: A Capability-based Foundation for Trustless Secure Memory Access (Extended Version). CoRR abs/2302.13863 (2023) - [i34]Sarthak Choudhary, Aashish Kolluri, Prateek Saxena:
Attacking Byzantine Robust Aggregation in High Dimensions. CoRR abs/2312.14461 (2023) - 2022
- [j6]Jinhua Cui, Shweta Shinde, Satyaki Sen, Prateek Saxena, Pinghai Yuan:
Dynamic Binary Translation for SGX Enclaves. ACM Trans. Priv. Secur. 25(4): 32:1-32:40 (2022) - [c79]Teodora Baluta, Shiqi Shen, S. Hitarth, Shruti Tople, Prateek Saxena:
Membership Inference Attacks and Generalization: A Causal Perspective. CCS 2022: 249-262 - [c78]Aashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena:
LPGNet: Link Private Graph Networks for Node Classification. CCS 2022: 1813-1827 - [c77]Ruomu Hou, Haifeng Yu, Prateek Saxena:
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains. SP 2022: 1263-1280 - [c76]Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, Abhik Roychoudhury:
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation. USENIX Security Symposium 2022: 2567-2584 - [c75]Jason Zhijingcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena:
Elasticlave: An Efficient Memory Model for Enclaves. USENIX Security Symposium 2022: 4111-4128 - [i33]Aashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena:
LPGNet: Link Private Graph Networks for Node Classification. CoRR abs/2205.03105 (2022) - [i32]Teodora Baluta, Shiqi Shen, S. Hitarth, Shruti Tople, Prateek Saxena:
Membership Inference Attacks and Generalization: A Causal Perspective. CoRR abs/2209.08615 (2022) - 2021
- [c74]Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury:
Localizing Vulnerabilities Statistically From One Exploit. AsiaCCS 2021: 537-549 - [c73]Jinhua Cui, Jason Zhijingcheng Yu, Shweta Shinde, Prateek Saxena, Zhiping Cai:
SmashEx: Smashing SGX Enclaves Using Exceptions. CCS 2021: 779-793 - [c72]Aashish Kolluri, Teodora Baluta, Prateek Saxena:
Private Hierarchical Clustering in Federated Networks. CCS 2021: 2342-2360 - [c71]Ivica Nikolic, Radu Mantu, Shiqi Shen, Prateek Saxena:
Refined Grey-Box Fuzzing with Sivo. DIMVA 2021: 106-129 - [c70]Teodora Baluta, Zheng Leong Chua, Kuldeep S. Meel, Prateek Saxena:
Scalable Quantitative Verification for Deep Neural Networks. ICSE (Companion Volume) 2021: 248-249 - [c69]Teodora Baluta, Zheng Leong Chua, Kuldeep S. Meel, Prateek Saxena:
Scalable Quantitative Verification For Deep Neural Networks. ICSE 2021: 312-323 - [c68]Bo Wang, Teodora Baluta, Aashish Kolluri, Prateek Saxena:
SynGuar: guaranteeing generalization in programming by example. ESEC/SIGSOFT FSE 2021: 677-689 - [c67]Prateek Saxena, Soma Paul:
Labelled EPIE: A Dataset for Idiom Sense Disambiguation. TDS 2021: 210-221 - [i31]Ivica Nikolic, Radu Mantu, Shiqi Shen, Prateek Saxena:
Refined Grey-Box Fuzzing with SIVO. CoRR abs/2102.02394 (2021) - [i30]Jinhua Cui, Shweta Shinde, Satyaki Sen, Prateek Saxena, Pinghai Yuan:
Dynamic Binary Translation for SGX Enclaves. CoRR abs/2103.15289 (2021) - [i29]Aashish Kolluri, Teodora Baluta, Prateek Saxena:
Private Hierarchical Clustering in Federated Networks. CoRR abs/2105.09057 (2021) - [i28]Bo Wang, Teodora Baluta, Aashish Kolluri, Prateek Saxena:
SynGuar: Guaranteeing Generalization in Programming by Example. CoRR abs/2106.11610 (2021) - [i27]Ruomu Hou, Haifeng Yu, Prateek Saxena:
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains. CoRR abs/2108.01341 (2021) - [i26]Jinhua Cui, Jason Zhijingcheng Yu, Shweta Shinde, Prateek Saxena, Zhiping Cai:
SmashEx: Smashing SGX Enclaves Using Exceptions. CoRR abs/2110.06657 (2021) - 2020
- [j5]Ni Trieu, Kareem Shehata, Prateek Saxena, Reza Shokri, Dawn Song:
Epione: Lightweight Contact Tracing with Strong Privacy. IEEE Data Eng. Bull. 43(2): 95-107 (2020) - [j4]Ruomu Hou, Irvan Jahja, Loi Luu, Prateek Saxena, Haifeng Yu:
Randomized View Reconciliation in Permissionless Distributed Systems. IEEE/ACM Trans. Netw. 28(5): 1925-1938 (2020) - [c66]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust P2P Primitives Using SGX Enclaves. ICDCS 2020: 1185-1186 - [c65]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust P2P Primitives Using SGX Enclaves. RAID 2020: 209-224 - [c64]Haifeng Yu, Ivica Nikolic, Ruomu Hou, Prateek Saxena:
OHIE: Blockchain Scaling Made Simple. SP 2020: 90-105 - [c63]Prateek Saxena, Soma Paul:
EPIE Dataset: A Corpus for Possible Idiomatic Expressions. TDS 2020: 87-94 - [c62]Shweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena:
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof. USENIX Security Symposium 2020: 523-540 - [i25]Teodora Baluta, Zheng Leong Chua, Kuldeep S. Meel, Prateek Saxena:
Scalable Quantitative Verification For Deep Neural Networks. CoRR abs/2002.06864 (2020) - [i24]Ni Trieu, Kareem Shehata, Prateek Saxena, Reza Shokri, Dawn Song:
Epione: Lightweight Contact Tracing with Strong Privacy. CoRR abs/2004.13293 (2020) - [i23]Prateek Saxena, Soma Paul:
EPIE Dataset: A Corpus For Possible Idiomatic Expressions. CoRR abs/2006.09479 (2020) - [i22]Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury:
Localizing Patch Points From One Exploit. CoRR abs/2008.04516 (2020) - [i21]Shweta Shinde, Jinhua Cui, Satyaki Sen, Pinghai Yuan, Prateek Saxena:
Binary Compatibility For SGX Enclaves. CoRR abs/2009.01144 (2020) - [i20]Zhijingcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena:
Elasticlave: An Efficient Memory Model for Enclaves. CoRR abs/2010.08440 (2020)
2010 – 2019
- 2019
- [c61]Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena:
Quantitative Verification of Neural Networks and Its Security Applications. CCS 2019: 1249-1264 - [c60]Deli Gong, Muoi Tran, Shweta Shinde, Hao Jin, Vyas Sekar, Prateek Saxena, Min Suk Kang:
Practical Verifiable In-network Filtering for DDoS Defense. ICDCS 2019: 1161-1174 - [c59]Aashish Kolluri, Ivica Nikolic, Ilya Sergey, Aquinas Hobor, Prateek Saxena:
Exploiting the laws of order in smart contracts. ISSTA 2019: 363-373 - [c58]Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, Purui Su:
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics. NDSS 2019 - [c57]Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Abhik Roychoudhury, Prateek Saxena:
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints. NDSS 2019 - [c56]Shruti Tople, Yaoqi Jia, Prateek Saxena:
PRO-ORAM: Practical Read-Only Oblivious RAM. RAID 2019: 197-211 - [i19]Deli Gong, Muoi Tran, Shweta Shinde, Hao Jin, Vyas Sekar, Prateek Saxena, Min Suk Kang:
Practical Verifiable In-network Filtering for DDoS defense. CoRR abs/1901.00955 (2019) - [i18]Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena:
Quantitative Verification of Neural Networks And its Security Applications. CoRR abs/1906.10395 (2019) - 2018
- [c55]Shruti Tople, Soyeon Park, Min Suk Kang, Prateek Saxena:
VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation. ACNS 2018: 657-677 - [c54]Ivica Nikolic, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor:
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. ACSAC 2018: 653-663 - [c53]Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena:
Obscuro: A Bitcoin Mixer using Trusted Execution Environments. ACSAC 2018: 692-701 - [c52]Sourav Das, Aashish Kolluri, Prateek Saxena, Haifeng Yu:
(Invited Paper) on the Security of Blockchain Consensus Protocols. ICISS 2018: 465-480 - [c51]Ruomu Hou, Irvan Jahja, Loi Luu, Prateek Saxena, Haifeng Yu:
Randomized View Reconciliation in Permissionless Distributed Systems. INFOCOM 2018: 2528-2536 - [i17]Ivica Nikolic, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor:
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. CoRR abs/1802.06038 (2018) - [i16]Shweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena:
BesFS: Mechanized Proof of an Iago-Safe Filesystem for Enclaves. CoRR abs/1807.00477 (2018) - [i15]Shiqi Shen, Soundarya Ramesh, Shweta Shinde, Abhik Roychoudhury, Prateek Saxena:
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution. CoRR abs/1807.00575 (2018) - [i14]Aashish Kolluri, Ivica Nikolic, Ilya Sergey, Aquinas Hobor, Prateek Saxena:
Exploiting The Laws of Order in Smart Contracts. CoRR abs/1810.11605 (2018) - [i13]Haifeng Yu, Ivica Nikolic, Ruomu Hou, Prateek Saxena:
OHIE: Blockchain Scaling Made Simple. CoRR abs/1811.12628 (2018) - [i12]Shruti Tople, Yaoqi Jia, Prateek Saxena:
PRO-ORAM: Constant Latency Read-Only Oblivious RAM. IACR Cryptol. ePrint Arch. 2018: 220 (2018) - 2017
- [c50]Shruti Tople, Prateek Saxena:
On the Trade-Offs in Oblivious Execution Techniques. DIMVA 2017: 25-47 - [c49]Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena:
A Traceability Analysis of Monero's Blockchain. ESORICS (2) 2017: 153-173 - [c48]Shweta Shinde, Dat Le Tien, Shruti Tople, Prateek Saxena:
Panoply: Low-TCB Linux Applications With SGX Enclaves. NDSS 2017 - [c47]Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang:
Neural Nets Can Learn Function Type Signatures From Binaries. USENIX Security Symposium 2017: 99-116 - [c46]Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena:
SmartPool: Practical Decentralized Pooled Mining. USENIX Security Symposium 2017: 1409-1426 - [i11]Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena:
SMART POOL : Practical Decentralized Pooled Mining. IACR Cryptol. ePrint Arch. 2017: 19 (2017) - [i10]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust Synchronous P2P Primitives Using SGX Enclaves. IACR Cryptol. ePrint Arch. 2017: 180 (2017) - [i9]Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena:
A Traceability Analysis of Monero's Blockchain. IACR Cryptol. ePrint Arch. 2017: 338 (2017) - [i8]Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang:
PermuteRam: Optimizing Oblivious Computation for Efficiency. IACR Cryptol. ePrint Arch. 2017: 885 (2017) - [i7]Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena:
Obscuro: A Bitcoin Mixer using Trusted Execution Environments. IACR Cryptol. ePrint Arch. 2017: 974 (2017) - 2016
- [j3]Yaoqi Jia, Guangdong Bai, Prateek Saxena, Zhenkai Liang:
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation. Proc. Priv. Enhancing Technol. 2016(4): 294-314 (2016) - [c45]Shiqi Shen, Shruti Tople, Prateek Saxena:
Auror: defending against poisoning attacks in collaborative deep learning systems. ACSAC 2016: 508-519 - [c44]Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, Prateek Saxena:
A Secure Sharding Protocol For Open Blockchains. CCS 2016: 17-30 - [c43]Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor:
Making Smart Contracts Smarter. CCS 2016: 254-269 - [c42]Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena:
Preventing Page Faults from Telling Your Secrets. AsiaCCS 2016: 317-328 - [c41]Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang:
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing. CCS 2016: 791-804 - [c40]Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, Roger Wattenhofer:
On Scaling Decentralized Blockchains - (A Position Paper). Financial Cryptography Workshops 2016: 106-125 - [c39]Jason Teutsch, Sanjay Jain, Prateek Saxena:
When Cryptocurrencies Mine Their Own Business. Financial Cryptography 2016: 499-514 - [c38]Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, Zhenkai Liang:
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. IEEE Symposium on Security and Privacy 2016: 969-986 - [c37]Yaoqi Jia, Tarik Moataz, Shruti Tople, Prateek Saxena:
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System. USENIX Security Symposium 2016: 945-962 - [i6]Sanjay Jain, Prateek Saxena, Frank Stephan, Jason Teutsch:
How to verify computation with a rational network. CoRR abs/1606.05917 (2016) - [i5]Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor:
Making Smart Contracts Smarter. IACR Cryptol. ePrint Arch. 2016: 633 (2016) - 2015
- [j2]Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao, Zhenkai Liang:
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning. Comput. Secur. 55: 62-80 (2015) - [j1]Yaoqi Jia, Xinshu Dong, Zhenkai Liang, Prateek Saxena:
I Know Where You've Been: Geo-Inference Attacks via the Browser Cache. IEEE Internet Comput. 19(1): 44-53 (2015) - [c36]Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena:
Demystifying Incentives in the Consensus Computer. CCS 2015: 706-719 - [c35]Pratik Soni, Enrico Budianto, Prateek Saxena:
The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript. CCS 2015: 1542-1557 - [c34]Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor:
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. CSF 2015: 397-411 - [c33]Hong Hu, Zheng Leong Chua, Zhenkai Liang, Prateek Saxena:
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software. ESORICS (2) 2015: 312-331 - [c32]Behnaz Hassanshahi, Yaoqi Jia, Roland H. C. Yap, Prateek Saxena, Zhenkai Liang:
Web-to-Application Injection Attacks on Android: Characterization and Detection. ESORICS (2) 2015: 577-598 - [c31]Mattia Fazzini, Prateek Saxena, Alessandro Orso:
AutoCSP: Automatically Retrofitting CSP to Web Applications. ICSE (1) 2015: 336-346 - [c30]Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena:
Auto-patching DOM-based XSS at scale. ESEC/SIGSOFT FSE 2015: 272-283 - [c29]Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena:
DexterJS: robust testing platform for DOM-based XSS vulnerabilities. ESEC/SIGSOFT FSE 2015: 946-949 - [c28]Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, Zhenkai Liang:
Automatic Generation of Data-Oriented Exploits. USENIX Security Symposium 2015: 177-192 - [c27]Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, Chunwang Zhang:
M2R: Enabling Stronger Privacy in MapReduce Computation. USENIX Security Symposium 2015: 447-462 - [i4]Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena:
Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks. CoRR abs/1506.04832 (2015) - [i3]Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor:
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. IACR Cryptol. ePrint Arch. 2015: 155 (2015) - [i2]Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena:
Demystifying incentives in the consensus computer. IACR Cryptol. ePrint Arch. 2015: 702 (2015) - 2014
- [c26]Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena:
DroidVault: A Trusted Data Vault for Android Devices. ICECCS 2014: 29-38 - [c25]Loi Luu, Shweta Shinde, Prateek Saxena, Brian Demsky:
A model counter for constraints over unbounded strings. PLDI 2014: 565-576 - [c24]Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang:
You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers. RAID 2014: 150-171 - [c23]Stevens Le Blond, Adina Uritesc, Cédric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda:
A Look at Targeted Attacks Through the Lense of an NGO. USENIX Security Symposium 2014: 543-558 - [i1]Hoon Wei Lim, Shruti Tople, Prateek Saxena, Ee-Chien Chang:
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2014: 539 (2014) - 2013
- [c22]Akshay Narayan, Prateek Saxena:
The curse of 140 characters: evaluating the efficacy of SMS spam detection on android. SPSM@CCS 2013: 33-42 - [c21]Shruti Tople, Shweta Shinde, Zhaofeng Chen, Prateek Saxena:
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content. CCS 2013: 1297-1310 - [c20]Xinshu Dong, Zhaofeng Chen, Hossein Siadati, Shruti Tople, Prateek Saxena, Zhenkai Liang:
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS. CCS 2013: 1311-1324 - [c19]Zhaofeng Chen, Xinshu Dong, Prateek Saxena, Zhenkai Liang:
CRYPTSERVER: strong data protection in commodity LAMP servers. CCS 2013: 1457-1460 - [c18]Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang:
A Quantitative Evaluation of Privilege Separation in Web Browser Designs. ESORICS 2013: 75-93 - [c17]Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena, Dawn Song:
Data-Confined HTML5 Applications. ESORICS 2013: 736-754 - [c16]Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu, Jin Song Dong:
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations. NDSS 2013 - [c15]Prateek Saxena, Vinay B. Y. Kumar, Dilawar Singh, H. Narayanan, Sachin B. Patkar:
Hardware-software Scalable Architectures for Gaussian Elimination over GF(2) and Higher Galois Fields. PECCS 2013: 195-201 - [c14]Pankai Gael, Mahesh Chandra, Prateek Saxena, Vijay Kumar Gupta:
Comparative analysis of speech enhancement methods. WOCN 2013: 1-5 - 2012
- [b1]Prateek Saxena:
Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities. University of California, Berkeley, USA, 2012 - [c13]Devdatta Akhawe, Prateek Saxena, Dawn Song:
Privilege Separation in HTML5 Applications. USENIX Security Symposium 2012: 429-444 - 2011
- [c12]Mike Samuel, Prateek Saxena, Dawn Song:
Context-sensitive auto-sanitization in web templating languages using type qualifiers. CCS 2011: 587-600 - [c11]Prateek Saxena, David Molnar, Benjamin Livshits:
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications. CCS 2011: 601-614 - [c10]Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Eui Chul Richard Shin, Dawn Song:
A Systematic Analysis of XSS Sanitization in Web Application Frameworks. ESORICS 2011: 150-171 - [c9]Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes:
Fast and Precise Sanitizer Analysis with BEK. USENIX Security Symposium 2011 - 2010
- [c8]Adam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron Boodman:
Protecting Browsers from Extension Vulnerabilities. NDSS 2010 - [c7]Prateek Saxena, Steve Hanna, Pongsin Poosankam, Dawn Song:
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. NDSS 2010 - [c6]Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng Mao, Stephen McCamant, Dawn Song:
A Symbolic Execution Framework for JavaScript. IEEE Symposium on Security and Privacy 2010: 513-528
2000 – 2009
- 2009
- [c5]Prateek Saxena, Pongsin Poosankam, Stephen McCamant, Dawn Song:
Loop-extended symbolic execution on binary programs. ISSTA 2009: 225-236 - [c4]Yacin Nadji, Prateek Saxena, Dawn Song:
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. NDSS 2009 - 2008
- [c3]Prateek Saxena, R. Sekar, Varun Puranik:
Efficient fine-grained binary instrumentationwith applications to taint-tracking. CGO 2008: 74-83 - [c2]Lorenzo Cavallaro, Prateek Saxena, R. Sekar:
On the Limits of Information Flow Techniques for Malware Analysis and Containment. DIMVA 2008: 143-163 - [c1]Dawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint