Automatic creation of SQL injection and cross-site scripting attacks A Kieyzun, PJ Guo, K Jayaraman, MD Ernst 2009 IEEE 31st international conference on software engineering, 199-209, 2009 | 572 | 2009 |
Checking beliefs in dynamic networks NP Lopes, N Bjørner, P Godefroid, K Jayaraman, G Varghese 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015 | 237 | 2015 |
jFuzz: A concolic whitebox fuzzer for Java K Jayaraman, D Harvison, V Ganesh, A Kiezun Proceedings of the First NASA Formal Methods Symposium, 2009 | 114 | 2009 |
Automatic error finding in access-control policies K Jayaraman, V Ganesh, M Tripunitara, M Rinard, S Chapin Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 109 | 2011 |
Automated analysis and debugging of network connectivity policies K Jayaraman, N Bjørner, G Outhred, C Kaufman Microsoft Research 1, 1-11, 2014 | 77 | 2014 |
Validating datacenters at scale K Jayaraman, N Bjørner, J Padhye, A Agrawal, A Bhargava, ... Proceedings of the ACM Special Interest Group on Data Communication, 200-213, 2019 | 69 | 2019 |
Escudo: A fine-grained protection model for web browsers K Jayaraman, W Du, B Rajagopalan, SJ Chapin 2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010 | 58 | 2010 |
Mohawk: Abstraction-refinement and bound-estimation for verifying access control policies K Jayaraman, M Tripunitara, V Ganesh, M Rinard, S Chapin ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-28, 2013 | 43 | 2013 |
Checking cloud contracts in Microsoft Azure N Bjørner, K Jayaraman Distributed Computing and Internet Technology: 11th International Conference …, 2015 | 42 | 2015 |
Finding network misconfigurations by automatic template inference SKR Kakarla, A Tang, R Beckett, K Jayaraman, T Millstein, Y Tamir, ... 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2020 | 33 | 2020 |
Enhancing security education with hands-on laboratory exercises W Du, K Jayaraman, NB Gaubatz Proceedings of the 5th Annual Symposium on Information Assurance (ASIA'10 …, 2010 | 30 | 2010 |
System and method for compact form exhaustive analysis of security policies K Jayaraman, CW Kaufman, NS Bjorner US Patent 9,467,473, 2016 | 27 | 2016 |
Enforcing request integrity in web applications K Jayaraman, G Lewandowski, PG Talaga, SJ Chapin Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 …, 2010 | 19 | 2010 |
Position paper: why are there so many vulnerabilities in web applications? W Du, K Jayaraman, X Tan, T Luo, S Chapin Proceedings of the 2011 New Security Paradigms Workshop, 83-94, 2011 | 17 | 2011 |
Lightyear: Using modularity to scale bgp control plane verification A Tang, R Beckett, S Benaloh, K Jayaraman, T Patil, T Millstein, ... Proceedings of the ACM SIGCOMM 2023 Conference, 94-107, 2023 | 11 | 2023 |
Dna pairing: Using differential network analysis to find reachability bugs N Lopes, N Bjørner, P Godefroid, K Jayaraman, G Varghese Technical Report MSR-TR-2014-58, Microsoft Research, 2014 | 10 | 2014 |
Modeling user interactions for (fun and) profit: preventing request forgery attacks on web applications K Jayaraman, PG Talaga, G Lewandowski, SJ Chapin, M Hafiz Proceedings of the 16th Conference on Pattern Languages of Programs, 1-9, 2009 | 9 | 2009 |
Test coverage metrics for the network X Xu, R Beckett, K Jayaraman, R Mahajan, D Walker Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 775-787, 2021 | 6 | 2021 |
Banking on interoperability: Secure, interoperable credential management G Benson, SK Chin, S Croston, K Jayaraman, S Older Computer Networks 67, 235-251, 2014 | 6 | 2014 |
Invisinets: Removing Networking from Cloud Networks S McClure, Z Medley, D Bansal, K Jayaraman, A Narayanan, J Padhye, ... 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023 | 5 | 2023 |