Adwait Nadkarni
Adwait Nadkarni
Verified email at - Homepage
Cited by
Cited by
{ASM}: a programmable interface for extending android security
S Heuser, A Nadkarni, W Enck, AR Sadeghi
23rd USENIX Security Symposium (USENIX Security 14), 1005-1019, 2014
Preventing accidental data disclosure in modern operating systems
A Nadkarni, W Enck
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Practical {DIFC} Enforcement on Android
A Nadkarni, B Andow, W Enck, S Jha
25th USENIX Security Symposium (USENIX Security 16), 1119-1136, 2016
A study of security isolation techniques
R Shu, P Wang, SA Gorski III, B Andow, A Nadkarni, L Deshotels, J Gionta, ...
ACM Computing Surveys (CSUR) 49 (3), 1-37, 2016
A study of grayware on google play
B Andow, A Nadkarni, B Bassett, W Enck, T Xie
2016 IEEE Security and Privacy Workshops (SPW), 224-233, 2016
Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses
S Manandhar, K Moran, K Kafle, R Tang, D Poshyvanyk, A Nadkarni
Discovering Flaws in {Security-Focused} Static Analysis Tools for Android using Systematic Mutation
R Bonett, K Kafle, K Moran, A Nadkarni, D Poshyvanyk
27th USENIX Security Symposium (USENIX Security 18), 1263-1280, 2018
A Study of Data Store-based Home Automation
K Kafle, K Moran, S Manandhar, A Nadkarni, D Poshyvanyk
arXiv preprint arXiv:1812.01597, 2018
Acminer: Extraction and analysis of authorization checks in android's middleware
SA Gorski, B Andow, A Nadkarni, S Manandhar, W Enck, E Bodden, ...
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
Security in centralized data store-based home automation platforms: A systematic analysis of nest and hue
K Kafle, K Moran, S Manandhar, A Nadkarni, D Poshyvanyk
ACM Transactions on Cyber-Physical Systems 5 (1), 1-27, 2020
Why crypto-detectors fail: A systematic evaluation of cryptographic misuse detection techniques
AS Ami, N Cooper, K Kafle, K Moran, D Poshyvanyk, A Nadkarni
2022 IEEE Symposium on Security and Privacy (SP), 614-631, 2022
Understanding iot security from a market-scale perspective
X Jin, S Manandhar, K Kafle, Z Lin, A Nadkarni
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Systematic mutation-based evaluation of the soundness of security-focused android static analysis techniques
AS Ami, K Kafle, K Moran, A Nadkarni, D Poshyvanyk
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-37, 2021
Programmable interface for extending security of application-based operating system
WH Enck, AP Nadkarni, AR Sadeghi, S Heuser
US Patent 9,916,475, 2018
Nativewrap: Ad hoc smartphone application creation for end users
A Nadkarni, V Tendulkar, W Enck
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage
S Manandhar, K Kafle, B Andow, K Singh, A Nadkarni
31st USENIX Security Symposium (USENIX Security 22), 3521-3538, 2022
" False negative--that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing
AS Ami, K Moran, D Poshyvanyk, A Nadkarni
arXiv preprint arXiv:2307.16325, 2023
Policy by example: an approach for security policy specification
A Nadkarni, W Enck, S Jha, J Staddon
arXiv preprint arXiv:1707.03967, 2017
A study of grayware on google play. In 2016 IEEE Security and Privacy Workshops (SPW)
B Andow, A Nadkarni, B Bassett, W Enck, T Xie
IEEE, 2016
µse: Mutation-based evaluation of security-focused static analysis tools for android
AS Ami, K Kafle, A Nadkarni, D Poshyvanyk, K Moran
2021 IEEE/ACM 43rd International Conference on Software Engineering …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20