Detecting mobile malware threats to homeland security through static analysis SH Seo, A Gupta, AM Sallam, E Bertino, K Yim Journal of Network and Computer Applications 38, 43-53, 2014 | 209 | 2014 |
Method and apparatus for adjusting context-based factors for selecting a security policy MJ Miettinen, N Asokan, A Gupta US Patent 8,898,793, 2014 | 177 | 2014 |
Intuitive security policy configuration in mobile devices using context profiling A Gupta, M Miettinen, N Asokan, M Nagy Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on …, 2012 | 82 | 2012 |
Marlin: A fine grained randomization approach to defend against ROP attacks A Gupta, S Kerr, MS Kirkpatrick, E Bertino International Conference on Network and System Security, 293-306, 2013 | 57 | 2013 |
MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles J Habibi, A Gupta, S Carlsony, A Panicker, E Bertino Distributed Computing Systems (ICDCS), 2015 IEEE 35th International …, 2015 | 37 | 2015 |
A formal proximity model for RBAC systems A Gupta, MS Kirkpatrick, E Bertino Computers & Security 41, 52-67, 2014 | 34 | 2014 |
DisARM: mitigating buffer overflow attacks on embedded devices J Habibi, A Panicker, A Gupta, E Bertino International Conference on Network and System Security, 112-129, 2015 | 29 | 2015 |
Marlin: Mitigating code reuse attacks using code randomization A Gupta, J Habibi, MS Kirkpatrick, E Bertino IEEE, 2014 | 28 | 2014 |
Using context-profiling to aid access control decisions in mobile devices A Gupta, M Miettinen, N Asokan Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 …, 2011 | 23 | 2011 |
Minimal credential disclosure in trust negotiations F Paci, D Bauer, E Bertino, DM Blough, A Squicciarini, A Gupta Identity in the Information Society 2 (3), 221-239, 2009 | 15 | 2009 |
Marlin: making it harder to fish for gadgets A Gupta, S Kerr, MS Kirkpatrick, E Bertino Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 11 | 2012 |
PeerSense: Who is near you? A Gupta, M Miettinen, M Nagy, N Asokan, A Wetzel Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 …, 2012 | 11 | 2012 |
A selective encryption approach to fine-grained access control for P2P file sharing A Gupta, S Sultana, M Kirkpatrick, E Bertino Collaborative Computing: Networking, Applications and Worksharing …, 2010 | 5 | 2010 |
A secure architecture design based on application isolation, code minimization and randomization A Gupta, MS Kirkpatrick, E Bertino Communications and Network Security (CNS), 2013 IEEE Conference on, 423-429, 2013 | 3 | 2013 |
Secure platforms for enforcing contextual access control A Gupta PURDUE UNIVERSITY, 2014 | | 2014 |
A secure architecture design based on code minimization and application isolation A Gupta, MS Kirkpatrick, E Bertino Purdue University, CERIAS TR 4 (7), 2013 | | 2013 |