Priyanka Bose
Priyanka Bose
Verified email at - Homepage
Cited by
Cited by
Understanding Security Issues in the NFT Ecosystem
D Das, P Bose, N Ruaro, C Kruegel, G Vigna
ACM Conference on Computer and Communications Security, ACM CCS, 2022
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
P Bose, D Das, Y Chen, Y Feng, C Kruegel, G Vigna
2022 IEEE Symposium on Security and Privacy (SP), 1235-1252, 2022
Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds
P Bose, VT Hoang, S Tessaro
Annual International Conference on the Theory and Applications of …, 2018
Unveiling the risks of NFT promotion scams
SS Roy, D Das, P Bose, C Kruegel, G Vigna, S Nilizadeh
Proceedings of the International AAAI Conference on Web and Social Media 18 …, 2024
Constant size ring signature without random oracle
P Bose, D Das, CP Rangan
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
Confusum contractum: confused deputy vulnerabilities in ethereum smart contracts
F Gritti, N Ruaro, R McLaughlin, P Bose, D Das, I Grishchenko, C Kruegel, ...
32nd USENIX Security Symposium (USENIX Security 23), 1793-1810, 2023
Bran: Reduce vulnerability search space in large open source repositories by learning bug symptoms
D Meng, M Guerriero, A Machiry, H Aghakhani, P Bose, A Continella, ...
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market
P Bose, D Das, F Gritti, N Ruaro, C Kruegel, G Vigna
arXiv preprint arXiv:2310.06844, 2023
{ACTOR}:{Action-Guided} Kernel Fuzzing
M Fleischer, D Das, P Bose, W Bai, K Lu, M Payer, C Kruegel, G Vigna
32nd USENIX Security Symposium (USENIX Security 23), 5003-5020, 2023
Hybrid pruning: Towards precise pointer and taint analysis
D Das, P Bose, A Machiry, S Mariani, Y Shoshitaishvili, G Vigna, ...
International Conference on Detection of Intrusions and Malware, and …, 2022
COLUMBUS: Android App Testing Through Systematic Callback Exploration
P Bose, D Das, S Vasan, S Mariani, I Grishchenko, A Continella, ...
ICSE '23: Proceedings of the 45th International Conference on Software …, 2023
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
D Das, P Bose, SS Vivek, SSD Selvi, CP Rangan
Cryptology ePrint Archive, 2015
The system can't perform the operation now. Try again later.
Articles 1–12