Sruthi Bandhakavi
Sruthi Bandhakavi
Verified email at google.com
TitleCited byYear
A logic for information flow in object-oriented programs
T Amtoft, S Bandhakavi, A Banerjee
ACM SIGPLAN Notices 41 (1), 91-102, 2006
1702006
CANDID: preventing sql injection attacks using dynamic candidate evaluations
S Bandhakavi, P Bisht, P Madhusudan, VN Venkatakrishnan
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1652007
VEX: Vetting Browser Extensions for Security Vulnerabilities.
S Bandhakavi, ST King, P Madhusudan, M Winslett
USENIX Security Symposium 10, 339-354, 2010
1352010
Programming goes back to school
A Repenning
Communications of the ACM 55 (5), 38-40, 2012
101*2012
Vetting browser extensions for security vulnerabilities with vex
S Bandhakavi, N Tiku, W Pittman, ST King, P Madhusudan, M Winslett
Communications of the ACM 54 (9), 91-99, 2011
562011
Beyond viral
M Cebrian, I Rahwan, AS Pentland
Communications of the ACM 59 (4), 36-39, 2016
43*2016
Super-sticky and declassifiable release policies for flexible information dissemination control
S Bandhakavi, CC Zhang, M Winslett
Proceedings of the 5th ACM workshop on Privacy in electronic society, 51-58, 2006
312006
A trust management approach for flexible policy management in security-typed languages
S Bandhakavi, W Winsborough, M Winslett
2008 21st IEEE Computer Security Foundations Symposium, 33-47, 2008
212008
Towards static flow-based declassification for legacy and untrusted programs
BPS Rocha, S Bandhakavi, J den Hartog, WH Winsborough, S Etalle
2010 IEEE Symposium on Security and Privacy, 93-108, 2010
202010
Analyzing end-to-end network reachability
S Bandhakavi, S Bhatt, C Okita, P Rao
2009 IFIP/IEEE International Symposium on Integrated Network Management, 585-590, 2009
92009
End-to-end network access analysis
S Bandhakavi, S Bhatt, C Okita, P Rao
HP Laboratories Technical Report HPL-2008-28R1. HP Labs, 2008
72008
A logic for information flow analysis of pointer programs
T Amtoft, S Bandhakavi, A Banerjee
Proc. POPL 6, 2005
62005
CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations, 2007
S Bandhakavi, P Bisht, P Madhusudan
USA, ACM, 0
5
SIFEX: tool for static analysis of browser extensions for security vulnerabilities
S Agarwal, S Bandhakavi, M Winslett
Poster at annual computer security applications conference, 2010
22010
Automated detection of injection vulnerabilities in web applications
S Bandhakavi
University of Illinois at Urbana-Champaign, 2012
12012
Information flow and declassification analysis for legacy and untrusted programs
B Pontes Soares Rocha
Technische Universiteit Eindhoven, 2012
2012
Static Flow-based Declassification for Legacy and Untrusted Programs
BPS Rocha, S Bandhakavi, J den Hartog, WH Winsborough, S Etalle
2010
Informal presentation: a trust management perspective on managing policy updates in security-typed languages
S Bandhakavi, W Winsborough, M Winslett
Proceedings of the 2007 workshop on Programming languages and analysis for …, 2007
2007
Modular Reasoning about Information Flow in Object-oriented Programs
S Bandhakavi
Kansas State University, 2005
2005
Fine Grained Access Control using Information Flow Analysis
S Bandhakavi
The system can't perform the operation now. Try again later.
Articles 1–20