Follow
Hayawardh Vijayakumar
Hayawardh Vijayakumar
Samsung Research America
Verified email at samsung.com - Homepage
Title
Cited by
Cited by
Year
Sprobes: Enforcing kernel code integrity on the trustzone architecture
X Ge, H Vijayakumar, T Jaeger
Proceedings of the 3rd IEEE Mobile Security Technologies Workshop (MoST), 2014
1752014
Seeding clouds with trust anchors
J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010
1532010
Fuzzfactory: domain-specific fuzzing with waypoints
R Padhye, C Lemieux, K Sen, L Simon, H Vijayakumar
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-29, 2019
692019
Integrity walls: Finding attack surfaces from mandatory access control policies
H Vijayakumar, G Jakka, S Rueda, J Schiffman, T Jaeger
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
602012
PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
L Harrison, H Vijayakumar, R Padhye, K Sen, M Grace
Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020), 2020
582020
NORAX: Enabling execute-only memory for COTS binaries on AArch64
Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ...
2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017
552017
Cloud verifier: Verifiable auditing service for IaaS clouds
J Schiffman, Y Sun, H Vijayakumar, T Jaeger
2013 IEEE Ninth World Congress on Services, 239-246, 2013
462013
{JIGSAW}: Protecting resource access by inferring programmer expectations
H Vijayakumar, X Ge, M Payer, T Jaeger
23rd USENIX Security Symposium (USENIX Security 14), 973-988, 2014
402014
{ATtention} Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem
DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ...
27th USENIX security symposium (USENIX security 18), 273-290, 2018
382018
Verifying system integrity by proxy
J Schiffman, H Vijayakumar, T Jaeger
International Conference on Trust and Trustworthy Computing, 179-200, 2012
332012
{STING}: Finding Name Resolution Vulnerabilities in Programs
H Vijayakumar, J Schiffman, T Jaeger
21st USENIX Security Symposium (USENIX Security 12), 585-599, 2012
302012
Instaguard: Instantly deployable hot-patches for vulnerable system programs on android
Y Chen, Y Li, L Lu, YH Lin, H Vijayakumar, Z Wang, X Ou
2018 Network and Distributed System Security Symposium (NDSS'18), 2018
272018
Process firewalls: Protecting processes during resource access
H Vijayakumar, J Schiffman, T Jaeger
Proceedings of the 8th ACM European Conference on Computer Systems, 57-70, 2013
222013
Analysis of virtual machine system policies
S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 14th ACM symposium on Access control models and …, 2009
152009
{PolyScope}:{Multi-Policy} Access Control Analysis to Compute Authorized Attack Operations in Android Systems
YT Lee, W Enck, H Chen, H Vijayakumar, N Li, Z Qian, D Wang, ...
30th USENIX Security Symposium (USENIX Security 21), 2579-2596, 2021
142021
Transforming commodity security policies to enforce Clark-Wilson integrity
D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
132012
Cloud armor: Protecting cloud commands from compromised cloud services
Y Sun, G Petracca, T Jaeger, H Vijayakumar, J Schiffman
2015 IEEE 8th International Conference on Cloud Computing, 253-260, 2015
122015
A scalable parallelization of all-pairs shortest path algorithm for a high performance cluster environment
T Srinivasan, R Balakrishnan, SA Gangadharan, V Hayawardh
2007 International Conference on Parallel and Distributed Systems, 1-8, 2007
112007
Cut me some security
D Muthukumaran, S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 3rd ACM workshop on Assurable and Usable Security …, 2010
92010
The right files at the right time
H Vijayakumar, T Jaeger
Automated Security Management, 119-133, 2013
32013
The system can't perform the operation now. Try again later.
Articles 1–20