Amit Vasudevan
Amit Vasudevan
Software Engineering Institute, Carnegie Mellon University
Verified email at acm.org - Homepage
Title
Cited by
Cited by
Year
Cobra: Fine-grained malware analysis using stealth localized-executions
A Vasudevan, R Yerraballi
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-279, 2006
1532006
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta
2013 IEEE Symposium on Security and Privacy, 430-444, 2013
1402013
Stealth breakpoints
A Vasudevan, R Yerraballi
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-392, 2005
982005
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
International Conference on Trust and Trustworthy Computing, 159-178, 2012
902012
OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms
E Owusu, J Guajardo, J McCune, J Newsome, A Perrig, A Vasudevan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
872013
Spike: engineering malware analysis tools using unobtrusive binary-instrumentation
A Vasudevan, R Yerraballi
Proceedings of the 29th Australasian Computer Science Conference-Volume 48 …, 2006
762006
Towards verifiable resource accounting for outsourced computation
C Chen, P Maniatis, A Perrig, A Vasudevan, V Sekar
Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on …, 2013
612013
Down to the bare metal: Using processor features for binary analysis
C Willems, R Hund, A Fobian, D Felsch, T Holz, A Vasudevan
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
552012
CARMA: A hardware tamper-resistant isolated execution environment on commodity x86 platforms
A Vasudevan, J McCune, J Newsome, A Perrig, L Van Doorn
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
522012
Lockdown: Towards a safe and practical architecture for security applications on commodity platforms
A Vasudevan, B Parno, N Qu, VD Gligor, A Perrig
International Conference on Trust and Trustworthy Computing, 34-54, 2012
492012
Xtrec: Secure real-time execution trace recording on commodity platforms
A Vasudevan, N Qu, A Perrig
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
432011
Systems and methods for maintaining integrity and secrecy in untrusted computing platforms
JG Merchan, EK Owusu, JM Mccune, JD Newsome, A Vasudevan, ...
US Patent 9,367,701, 2016
372016
Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture
A Vasudevan, JM McCune, N Qu, L Van Doorn, A Perrig
International Conference on Trust and Trustworthy Computing, 141-165, 2010
342010
Lockdown: A safe and practical environment for security applications
A Vasudevan, B Parno, N Qu, VD Gligor, A Perrig
CMU-CyLab-09-011 14, 2009
342009
MalTRAK: Tracking and eliminating unknown malware
A Vasudevan
2008 Annual Computer Security Applications Conference (ACSAC), 311-321, 2008
322008
Methods and apparatuses for user-verifiable execution of security-sensitive code
JM McCune, AM Perrig, A Datta, VD Gligor, Y Li, BJ Parno, A Vasudevan, ...
US Patent 8,627,414, 2014
302014
überspark: Enforcing verifiable object abstractions for automated compositional security analysis of a hypervisor
A Vasudevan, S Chaki, P Maniatis, L Jia, A Datta
25th {USENIX} Security Symposium ({USENIX} Security 16), 87-104, 2016
292016
Framework for stealth dynamic coarse and fine-grained malware analysis
A Vasudevan
US Patent App. 11/998,347, 2008
242008
Parametric verification of address space separation
J Franklin, S Chaki, A Datta, JM McCune, A Vasudevan
International Conference on Principles of Security and Trust, 51-68, 2012
202012
Trustworthy execution on mobile devices
A Vasudevan, JM McCune, J Newsome
Springer New York, 2014
162014
The system can't perform the operation now. Try again later.
Articles 1–20