Adwait Nadkarni
Adwait Nadkarni
Verified email at - Homepage
Cited by
Cited by
{ASM}: A Programmable Interface for Extending Android Security
S Heuser, A Nadkarni, W Enck, AR Sadeghi
23rd USENIX Security Symposium (USENIX Security 14), 1005-1019, 2014
Preventing accidental data disclosure in modern operating systems
A Nadkarni, W Enck
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Practical {DIFC} Enforcement on Android
A Nadkarni, B Andow, W Enck, S Jha
25th USENIX Security Symposium (USENIX Security 16), 1119-1136, 2016
A study of security isolation techniques
R Shu, P Wang, SA Gorski III, B Andow, A Nadkarni, L Deshotels, J Gionta, ...
ACM Computing Surveys (CSUR) 49 (3), 1-37, 2016
A study of grayware on google play
B Andow, A Nadkarni, B Bassett, W Enck, T Xie
2016 IEEE Security and Privacy Workshops (SPW), 224-233, 2016
Discovering Flaws in {Security-Focused} Static Analysis Tools for Android using Systematic Mutation
R Bonett, K Kafle, K Moran, A Nadkarni, D Poshyvanyk
27th USENIX Security Symposium (USENIX Security 18), 1263-1280, 2018
A Study of Data Store-based Home Automation
K Kafle, K Moran, S Manandhar, A Nadkarni, D Poshyvanyk
arXiv preprint arXiv:1812.01597, 2018
Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses
S Manandhar, K Moran, K Kafle, R Tang, D Poshyvanyk, A Nadkarni
Acminer: Extraction and analysis of authorization checks in android's middleware
SA Gorski, B Andow, A Nadkarni, S Manandhar, W Enck, E Bodden, ...
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
Nativewrap: Ad hoc smartphone application creation for end users
A Nadkarni, V Tendulkar, W Enck
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Security in centralized data store-based home automation platforms: A systematic analysis of nest and hue
K Kafle, K Moran, S Manandhar, A Nadkarni, D Poshyvanyk
ACM Transactions on Cyber-Physical Systems 5 (1), 1-27, 2020
Programmable interface for extending security of application-based operating system
WH Enck, AP Nadkarni, AR Sadeghi, S Heuser
US Patent 9,916,475, 2018
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques
AS Ami, N Cooper, K Kafle, K Moran, D Poshyvanyk, A Nadkarni
2022 IEEE Symposium on Security and Privacy (SP), 614-631, 2022
Systematic mutation-based evaluation of the soundness of security-focused android static analysis techniques
AS Ami, K Kafle, K Moran, A Nadkarni, D Poshyvanyk
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-37, 2021
Policy by example: an approach for security policy specification
A Nadkarni, W Enck, S Jha, J Staddon
arXiv preprint arXiv:1707.03967, 2017
Helion: Enabling a Natural Perspective of Home Automation
S Manandhar, K Moran, K Kafle, R Tang, D Poshyvanyk, A Nadkarni
arXiv preprint arXiv:1907.00124, 2019
Towards Practical Integrity in the Smart Home with HomeEndorser
K Kafle, K Jagtap, M Ahmed-Rengers, T Jaeger, A Nadkarni
arXiv preprint arXiv:2109.05139, 2021
Workflow Based Information Flow Control (IFC) in Modern Operating Systems.
AP Nadkarni
Android's Security Framework-Understanding the Security of Mobile Phone Platforms.
W Enck, A Nadkarni
Encyclopedia of Cryptography and Security (2nd Ed.), 34-37, 2011
Understanding IoT Security from a Market-Scale Perspective
X Jin, S Manandhar, K Kafle, Z Lin, A Nadkarni
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
The system can't perform the operation now. Try again later.
Articles 1–20