The HTTP Garden: Discovering Parsing Vulnerabilities in HTTP/1.1 Implementations by Differential Fuzzing of Request Streams B Kallus, P Anantharaman, M Locasto, SW Smith arXiv preprint arXiv:2405.17737, 2024 | | 2024 |
Modeling cyber-physical attack paths in the internet-of-things GF Ciocarlie, I Agadakos, CY Chen, M Campanelli, P Anantharaman, ... US Patent 11,729,196, 2023 | | 2023 |
PolyDoc: Surveying PDF Files from the PolySwarm network P Anantharaman, R Lathrop, R Shapiro, ME Locasto 2023 IEEE Security and Privacy Workshops (SPW), 117-134, 2023 | | 2023 |
A format-aware reducer for scriptable rewriting of PDF files P Anantharaman, S Cheung, N Boorman, ME Locasto 2022 IEEE Security and Privacy Workshops (SPW), 136-151, 2022 | 2 | 2022 |
Capturing the iccMAX calculatorElement: a case study on format design VH Kothari, P Anantharaman, SW Smith, B Hitaj, P Mundkur, N Shankar, ... 2022 IEEE Security and Privacy Workshops (SPW), 176-197, 2022 | 3 | 2022 |
Protecting Systems from Exploits Using Language-Theoretic Security P Anantharaman Dartmouth College, 2022 | 3 | 2022 |
Deconstructing security and privacy issues: The development of a logic for capturing mismorphisms VH Kothari, P Anantharaman, SW Smith Cybersecurity and Cognitive Science, 115-136, 2022 | | 2022 |
A communications validity detector for SCADA networks P Anantharaman, A Chachra, S Sinha, M Millian, B Copos, S Smith, ... Critical Infrastructure Protection XV: 15th IFIP WG 11.10 International …, 2022 | 3 | 2022 |
Parsing PEGs with Length Fields in Software and Hardware ZS Lucas, JY Liu, P Anantharaman, SW Smith 2021 IEEE Security and Privacy Workshops (SPW), 128-133, 2021 | 2 | 2021 |
17 What We Have Here Is Failure to Validate: Summer of LangSec S Ali, P Anantharaman, Z Lucas, SW Smith, DM Nicol, A Rahman, ... | | 2021 |
What we have here is failure to validate: Summer of LangSec S Ali, P Anantharaman, Z Lucas, SW Smith IEEE Security & Privacy 19 (3), 17-23, 2021 | 6 | 2021 |
IoTHound: environment-agnostic device identification and monitoring P Anantharaman, L Song, I Agadakos, G Ciocarlie, B Copos, U Lindqvist, ... Proceedings of the 10th International Conference on the Internet of Things, 1-9, 2020 | 13 | 2020 |
Ghostbusting: Mitigating Spectre with intraprocess memory isolation IR Jenkins, P Anantharaman, R Shapiro, JP Brady, S Bratus, SW Smith Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-11, 2020 | 16 | 2020 |
Intent as a secure design primitive P Anantharaman, JP Brady, IR Jenkins, VH Kothari, MC Millian, K Palani, ... Modeling and Design of Secure Internet of Things, 529-562, 2020 | 4 | 2020 |
Securing Smart Cities: Implications and Challenges I Agadakos, P Anantharaman, GF Ciocarlie, B Copos, M Emmi, T Lepoint, ... Modeling and Design of Secure Internet of Things, 185-215, 2020 | 1 | 2020 |
Armor Within: Defending Against Vulnerabilities in Third-Party Libraries S Ali, P Anantharaman, SW Smith 2020 IEEE Security and Privacy Workshops (SPW), 291-299, 2020 | 3 | 2020 |
The Parsley data format definition language P Mundkur, L Briesemeister, N Shankar, P Anantharaman, S Ali, Z Lucas, ... 2020 IEEE Security and Privacy Workshops (SPW), 300-307, 2020 | 10 | 2020 |
Mismorphism: The Heart of the Weird Machine (Transcript of Discussion) P Anantharaman Security Protocols XXVII: 27th International Workshop, Cambridge, UK, April …, 2020 | 1 | 2020 |
On Session Languages P Anantharaman, SW Smith | | 2020 |
Human-computability boundaries V Kothari, P Anantharaman, IR Jenkins, MC Millian, JP Brady, S Ali, ... Security Protocols XXVII: 27th International Workshop, Cambridge, UK, April …, 2020 | 2 | 2020 |