Susanta Nanda
Susanta Nanda
Verified email at
Cited by
Cited by
A survey on virtualization technologies
SNT Chiueh, S Brook
Rpe Report 142, 2005
Viking: A multi-spanning-tree Ethernet architecture for metropolitan area and cluster networks
S Sharma, K Gopalan, S Nanda, T Chiueh
IEEE INFOCOM 2004 4, 2283-2294, 2004
BIRD: Binary interpretation using runtime disassembly
S Nanda, W Li, LC Lam, T Chiueh
International Symposium on Code Generation and Optimization (CGO'06), 12 pp.-370, 2006
Techniques for behavior based malware analysis
SB Bhatkar, S Nanda, JS Wilhelm
US Patent 8,555,385, 2013
Security-as-a-service for microservices-based cloud applications
Y Sun, S Nanda, T Jaeger
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
A feather-weight virtual machine for windows applications
Y Yu, F Guo, S Nanda, L Lam, T Chiueh
Proceedings of the 2nd international conference on Virtual execution …, 2006
Learning context-aware policies from multiple smart homes via federated multi-task learning
T Yu, T Li, Y Sun, S Nanda, V Smith, V Sekar, S Seshan
2020 IEEE/ACM Fifth international conference on internet-of-things design …, 2020
Systems and methods for monitoring virtual networks
SK Nanda, Y Sun
US Patent 9,961,105, 2018
Looking from the Mirror: Evaluating {IoT} Device Security through Mobile Companion Apps
X Wang, Y Sun, S Nanda, XF Wang
28th USENIX security symposium (USENIX security 19), 1151-1167, 2019
Dynamic multi-process information flow tracking for web application security
S Nanda, LC Lam, T Chiueh
Proceedings of the 2007 ACM/IFIP/USENIX international conference on …, 2007
Systems and methods for data loss prevention on mobile computing systems
J Casaburi, K Griffin, S Nanda, S Sawhney, M Conover
US Patent 8,429,745, 2013
{SketchLib}: Enabling efficient sketch-based monitoring on programmable switches
H Namkung, Z Liu, D Kim, V Sekar, P Steenkiste
19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022
Systems and methods for protecting against unauthorized access of encrypted data during power-management modes
S Nanda, K Griffin
US Patent 8,555,083, 2013
Security for IoT home voice assistants
SK Nanda, Y Sun, S Shintre
US Patent 10,887,351, 2021
Systems and methods for monitoring encrypted data transmission
F Guo, SK Nanda
US Patent 9,800,560, 2017
Techniques for virtual environment-based web client management
SK Nanda, T Chiueh
US Patent 9,065,725, 2015
Foreign code detection on the windows/x86 platform
S Nanda, W Li, L Lam, T Chiueh
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 279-288, 2006
Execution trace-driven automated attack signature generation
S Nanda, T Chiueh
2008 Annual Computer Security Applications Conference (ACSAC), 195-204, 2008
Decrypting network traffic on a middlebox device using a trusted execution environment
Y Sun, D Marino, SK Nanda, S Shintre, BT Witten, RA Frederick, Q Li
US Patent 10,447,663, 2019
Web application attack prevention for tiered internet services
S Nanda, L Lam, T Chiueh
2008 The Fourth International Conference on Information Assurance and …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20