A survey on virtualization technologies SNT Chiueh, S Brook Rpe Report 142, 2005 | 419 | 2005 |
Viking: A multi-spanning-tree Ethernet architecture for metropolitan area and cluster networks S Sharma, K Gopalan, S Nanda, T Chiueh IEEE INFOCOM 2004 4, 2283-2294, 2004 | 222 | 2004 |
BIRD: Binary interpretation using runtime disassembly S Nanda, W Li, LC Lam, T Chiueh International Symposium on Code Generation and Optimization (CGO'06), 12 pp.-370, 2006 | 159 | 2006 |
Techniques for behavior based malware analysis SB Bhatkar, S Nanda, JS Wilhelm US Patent 8,555,385, 2013 | 154 | 2013 |
Security-as-a-service for microservices-based cloud applications Y Sun, S Nanda, T Jaeger 2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015 | 150 | 2015 |
A feather-weight virtual machine for windows applications Y Yu, F Guo, S Nanda, L Lam, T Chiueh Proceedings of the 2nd international conference on Virtual execution …, 2006 | 138 | 2006 |
Learning context-aware policies from multiple smart homes via federated multi-task learning T Yu, T Li, Y Sun, S Nanda, V Smith, V Sekar, S Seshan 2020 IEEE/ACM Fifth international conference on internet-of-things design …, 2020 | 91 | 2020 |
Systems and methods for monitoring virtual networks SK Nanda, Y Sun US Patent 9,961,105, 2018 | 83 | 2018 |
Looking from the mirror: Evaluating {IoT} device security through mobile companion apps X Wang, Y Sun, S Nanda, XF Wang 28th USENIX security symposium (USENIX security 19), 1151-1167, 2019 | 75 | 2019 |
Dynamic multi-process information flow tracking for web application security S Nanda, LC Lam, T Chiueh Proceedings of the 2007 ACM/IFIP/USENIX international conference on …, 2007 | 58 | 2007 |
{SketchLib}: Enabling efficient sketch-based monitoring on programmable switches H Namkung, Z Liu, D Kim, V Sekar, P Steenkiste 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022 | 43 | 2022 |
Security for IoT home voice assistants SK Nanda, Y Sun, S Shintre US Patent 10,887,351, 2021 | 43 | 2021 |
Systems and methods for protecting against unauthorized access of encrypted data during power-management modes S Nanda, K Griffin US Patent 8,555,083, 2013 | 38 | 2013 |
Systems and methods for data loss prevention on mobile computing systems J Casaburi, K Griffin, S Nanda, S Sawhney, M Conover US Patent 8,429,745, 2013 | 38 | 2013 |
Systems and methods for monitoring encrypted data transmission F Guo, SK Nanda US Patent 9,800,560, 2017 | 26 | 2017 |
Techniques for virtual environment-based web client management SK Nanda, T Chiueh US Patent 9,065,725, 2015 | 14 | 2015 |
Foreign code detection on the windows/x86 platform S Nanda, W Li, L Lam, T Chiueh 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 279-288, 2006 | 12 | 2006 |
Raregan: Generating samples for rare classes Z Lin, H Liang, G Fanti, V Sekar Proceedings of the AAAI Conference on Artificial Intelligence 36 (7), 7506-7515, 2022 | 11 | 2022 |
Execution trace-driven automated attack signature generation S Nanda, T Chiueh 2008 Annual Computer Security Applications Conference (ACSAC), 195-204, 2008 | 11 | 2008 |
Decrypting network traffic on a middlebox device using a trusted execution environment Y Sun, D Marino, SK Nanda, S Shintre, BT Witten, RA Frederick, Q Li US Patent 10,447,663, 2019 | 10 | 2019 |