Secure verification of location claims N Sastry, U Shankar, D Wagner Proceedings of the 2nd ACM workshop on Wireless security, 1-10, 2003 | 929 | 2003 |
Detecting format string vulnerabilities with type qualifiers U Shankar, K Talwar, JS Foster, D Wagner 10th USENIX Security Symposium (USENIX Security 01), 2001 | 634 | 2001 |
PRIMA: policy-reduced integrity measurement architecture T Jaeger, R Sailer, U Shankar Proceedings of the eleventh ACM symposium on Access control models and …, 2006 | 465 | 2006 |
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay DL Donoho, AG Flesia, U Shankar, V Paxson, J Coit, S Staniford Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002 | 286 | 2002 |
Cloud data protection for the masses D Song, E Shi, I Fischer, U Shankar Computer 45 (1), 39-45, 2012 | 263 | 2012 |
Active mapping: Resisting NIDS evasion without altering traffic U Shankar, V Paxson 2003 Symposium on Security and Privacy, 2003., 44-61, 2003 | 256 | 2003 |
Dynamic pharming attacks and locked same-origin policies for web browsers C Karlof, U Shankar, JD Tygar, D Wagner Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 229 | 2007 |
Side effects are not sufficient to authenticate software U Shankar, M Chew, JD Tygar USENIX Security Symposium 8 (3), 2004 | 113 | 2004 |
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. U Shankar, T Jaeger, R Sailer NDSS, 2006 | 108 | 2006 |
Doppelganger: Better browser privacy without the bother U Shankar, C Karlof Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 63 | 2006 |
A survey of security in online credit card payments U Shankar, M Walker policy 6, 7, 2001 | 15 | 2001 |
Network security architecture for demand response/sensor networks PA Subrahmanyam, D Wagner, D Mulligan, E Jones, U Shankar, J Lerner | 14 | 2005 |
Locked cookies: Web authentication security against phishing, pharming, and active attacks CK Karlof, U Shankar, D Tygar, D Wagner University of California at Berkeley, Technical Report UCB/EECS-2007-25, 2007 | 10 | 2007 |
TinySec: TinyOS Link Layer Security Proposal, version 1.0 C Karlof, N Sastry, U Shankar, D Wagner Unpublished manuscript, July, 2002 | 8 | 2002 |
Security for sensor networks: Cryptography and beyond D Wagner, C Karlof, D Molnar, N Sastry, U Shankar URL: http://www. cs. berkeley. edu/daw/talks/SANS03. ppt, 2003 | 7 | 2003 |
Preventing secret leakage from fork (): Securing privilege-separated applications U Shankar, D Wagner 2006 IEEE International Conference on Communications 5, 2268-2275, 2006 | 6 | 2006 |
CryptoBytes A Young, N Sastry, U Shankar, D Wagner, C Gehrmann, CJ Mitchell, ... RSA Laboratories 7 (1), 40, 2004 | 4 | 2004 |
Secure verification of location claims U Shankar, D Wagner Computer Science Division, University of California, 2003 | 4 | 2003 |
Bridging the gap between people and policies in security and privacy U Shankar University of California, Berkeley, 2006 | 2 | 2006 |
PRIMA T Jaeger, R Sailer, U Shankar Proceedings of the eleventh ACM symposium on Access control models and …, 2006 | 2 | 2006 |