default search action
BibTeX records: Ashish Gehani
@inproceedings{DBLP:conf/icde/ModiTMKGD24, author = {Aniket Modi and Rohan Tikmany and Tanu Malik and Raghavan Komondoor and Ashish Gehani and Deepak D'Souza}, title = {Kondo: Efficient Provenance-Driven Data Debloating}, booktitle = {40th {IEEE} International Conference on Data Engineering, {ICDE} 2024, Utrecht, The Netherlands, May 13-16, 2024}, pages = {4965--4978}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICDE60146.2024.00377}, doi = {10.1109/ICDE60146.2024.00377}, timestamp = {Mon, 29 Jul 2024 14:11:15 +0200}, biburl = {https://dblp.org/rec/conf/icde/ModiTMKGD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-11259, author = {Mohannad Alhanahnah and Yazan Boshmaf and Ashish Gehani}, title = {SoK: Software Debloating Landscape and Future Directions}, journal = {CoRR}, volume = {abs/2407.11259}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.11259}, doi = {10.48550/ARXIV.2407.11259}, eprinttype = {arXiv}, eprint = {2407.11259}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-11259.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NiddodiGMMR23, author = {Chaitra Niddodi and Ashish Gehani and Tanu Malik and Sibin Mohan and Michael Lee Rilee}, title = {IOSPReD: {I/O} Specialized Packaging of Reduced Datasets and Data-Intensive Applications for Efficient Reproducibility}, journal = {{IEEE} Access}, volume = {11}, pages = {1718--1731}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2022.3233787}, doi = {10.1109/ACCESS.2022.3233787}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/NiddodiGMMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/NavasG23, author = {Jorge A. Navas and Ashish Gehani}, title = {OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-Program Specialization}, journal = {Commun. {ACM}}, volume = {66}, number = {4}, pages = {40--47}, year = {2023}, url = {https://doi.org/10.1145/3583112}, doi = {10.1145/3583112}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/NavasG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/AlhanahnahMGCYJZ23, author = {Mohannad Alhanahnah and Shiqing Ma and Ashish Gehani and Gabriela F. Ciocarlie and Vinod Yegneswaran and Somesh Jha and Xiangyu Zhang}, title = {autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {4}, pages = {2761--2775}, year = {2023}, url = {https://doi.org/10.1109/TSE.2022.3231242}, doi = {10.1109/TSE.2022.3231242}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/AlhanahnahMGCYJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AliMKNHHNSSZYGR23, author = {Muaz Ali and Muhammad Muzammil and M. Faraz Karim and Ayesha Naeem and Rukhshan Haroon and Muhammad Haris and Huzaifah Nadeem and Waseem Sabir and Fahad Shaon and Fareed Zaffar and Vinod Yegneswaran and Ashish Gehani and Sazzadur Rahaman}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {SoK: {A} Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14347}, pages = {229--249}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51482-1\_12}, doi = {10.1007/978-3-031-51482-1\_12}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AliMKNHHNSSZYGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/AhmadMJGIG23, author = {Raza Ahmad and Aniket Modi and Eunjin Jung and Carolina de Senne Garcia and Hassaan Irshad and Ashish Gehani}, editor = {Jason Staggs and Sujeet Shenoi}, title = {Analyzing Discrepancies in Whole-Network Provenance}, booktitle = {Critical Infrastructure Protection {XVII} - 17th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2023, Arlington, VA, USA, March 13-14, 2023, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {686}, pages = {93--114}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49585-4\_5}, doi = {10.1007/978-3-031-49585-4\_5}, timestamp = {Tue, 30 Jan 2024 09:36:10 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/AhmadMJGIG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AliHGRU23, author = {Muaz Ali and Rumaisa Habib and Ashish Gehani and Sazzadur Rahaman and Zartash Afzal Uzmi}, title = {{BLADE:} Towards Scalable Source Code Debloating}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {75--87}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00022}, doi = {10.1109/SECDEV56634.2023.00022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/AliHGRU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HassanTFNNZSGR23, author = {Muhammad Hassan and Talha Tahir and Muhammad Farrukh and Abdullah Naveed and Anas Naeem and Fareed Zaffar and Fahad Shaon and Ashish Gehani and Sazzadur Rahaman}, title = {Evaluating Container Debloaters}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {88--98}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00023}, doi = {10.1109/SECDEV56634.2023.00023}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/HassanTFNNZSGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HussainMNBAZGPY23, author = {Shozab Hussain and Muhammad Musa and Turyal Neeshat and Rja Batool and Omer Ahmed and Fareed Zaffar and Ashish Gehani and Andy Poggio and Maneesh K. Yadav}, title = {Towards Reproducible Ransomware Analysis}, booktitle = {2023 Cyber Security Experimentation and Test Workshop, {CSET} 2023, Marina del Rey, CA, USA, August 7-8, 2023}, pages = {1--9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607505.3607510}, doi = {10.1145/3607505.3607510}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HussainMNBAZGPY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ModiRMG23, author = {Aniket Modi and Moaz Reyad and Tanu Malik and Ashish Gehani}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Querying Container Provenance}, booktitle = {Companion Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {1564--1567}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543873.3587568}, doi = {10.1145/3543873.3587568}, timestamp = {Mon, 28 Aug 2023 21:17:11 +0200}, biburl = {https://dblp.org/rec/conf/www/ModiRMG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/ManneSMBGC22, author = {Naga Nithin Manne and Shilvi Satpati and Tanu Malik and Amitabha Bagchi and Ashish Gehani and Amitabh Chaudhary}, title = {{CHEX:} Multiversion Replay with Ordered Checkpoints}, journal = {Proc. {VLDB} Endow.}, volume = {15}, number = {6}, pages = {1297--1310}, year = {2022}, url = {https://www.vldb.org/pvldb/vol15/p1297-malik.pdf}, doi = {10.14778/3514061.3514075}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/ManneSMBGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/NavasG22, author = {Jorge A. Navas and Ashish Gehani}, title = {OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-program Specialization: Leveraging scalable pointer analysis, value analysis, and dynamic analysis}, journal = {{ACM} Queue}, volume = {20}, number = {5}, pages = {58--85}, year = {2022}, url = {https://doi.org/10.1145/3570922}, doi = {10.1145/3570922}, timestamp = {Fri, 06 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/NavasG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/AhmadNSHAAGZS22, author = {Aatira Anum Ahmad and Abdul Rafae Noor and Hashim Sharif and Usama Hameed and Shoaib Asif and Mubashir Anwar and Ashish Gehani and Fareed Zaffar and Junaid Haroon Siddiqui}, title = {Trimmer: An Automated System for Configuration-Based Software Debloating}, journal = {{IEEE} Trans. Software Eng.}, volume = {48}, number = {9}, pages = {3485--3505}, year = {2022}, url = {https://doi.org/10.1109/TSE.2021.3095716}, doi = {10.1109/TSE.2021.3095716}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/AhmadNSHAAGZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipc/NakamuraMKG22, author = {Yuta Nakamura and Tanu Malik and Iyad Kanj and Ashish Gehani}, title = {Provenance-based Workflow Diagnostics Using Program Specification}, booktitle = {29th {IEEE} International Conference on High Performance Computing, Data, and Analytics, HiPC 2022, Bengaluru, India, December 18-21, 2022}, pages = {292--301}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HiPC56025.2022.00046}, doi = {10.1109/HIPC56025.2022.00046}, timestamp = {Wed, 03 May 2023 17:27:40 +0200}, biburl = {https://dblp.org/rec/conf/hipc/NakamuraMKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/AbbasKMZTEIGYP22, author = {Mashal Abbas and Shahpar Khan and Abdul Monum and Fareed Zaffar and Rashid Tahir and David M. Eyers and Hassaan Irshad and Ashish Gehani and Vinod Yegneswaran and Thomas Pasquier}, title = {{PACED:} Provenance-based Automated Container Escape Detection}, booktitle = {{IEEE} International Conference on Cloud Engineering, {IC2E} 2022, Pacific Grove, CA, USA, September 26-30, 2022}, pages = {261--272}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IC2E55432.2022.00035}, doi = {10.1109/IC2E55432.2022.00035}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic2e/AbbasKMZTEIGYP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/AhmadASGZ22, author = {Aatira Anum Ahmad and Mubashir Anwar and Hashim Sharif and Ashish Gehani and Fareed Zaffar}, title = {Trimmer: Context-Specific Code Reduction}, booktitle = {37th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2022, Rochester, MI, USA, October 10-14, 2022}, pages = {168:1--168:5}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3551349.3559529}, doi = {10.1145/3551349.3559529}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/AhmadASGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-08429, author = {Naga Nithin Manne and Shilvi Satpati and Tanu Malik and Amitabha Bagchi and Ashish Gehani and Amitabh Chaudhary}, title = {{CHEX:} Multiversion Replay with Ordered Checkpoints}, journal = {CoRR}, volume = {abs/2202.08429}, year = {2022}, url = {https://arxiv.org/abs/2202.08429}, eprinttype = {arXiv}, eprint = {2202.08429}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-08429.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GehaniAIZP21, author = {Ashish Gehani and Raza Ahmad and Hassaan Irshad and Jianqiao Zhu and Jignesh M. Patel}, title = {Digging into big provenance (with {SPADE)}}, journal = {Commun. {ACM}}, volume = {64}, number = {12}, pages = {48--56}, year = {2021}, url = {https://doi.org/10.1145/3475358}, doi = {10.1145/3475358}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/GehaniAIZP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/GehaniAIZP21, author = {Ashish Gehani and Raza Ahmad and Hassan Irshad and Jianqiao Zhu and Jignesh M. Patel}, title = {Digging into Big Provenance (with {SPADE):} {A} user interface for querying provenance}, journal = {{ACM} Queue}, volume = {19}, number = {3}, pages = {77--106}, year = {2021}, url = {https://doi.org/10.1145/3475965.3476885}, doi = {10.1145/3475965.3476885}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/GehaniAIZP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IrshadCGYLPJKXZ21, author = {Hassaan Irshad and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran and Kyu Hyung Lee and Jignesh M. Patel and Somesh Jha and Yonghwi Kwon and Dongyan Xu and Xiangyu Zhang}, title = {{TRACE:} Enterprise-Wide Provenance Tracking for Real-Time {APT} Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4363--4376}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3098977}, doi = {10.1109/TIFS.2021.3098977}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/IrshadCGYLPJKXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/YuMZT0XULCYG21, author = {Le Yu and Shiqing Ma and Zhuo Zhang and Guanhong Tao and Xiangyu Zhang and Dongyan Xu and Vincent E. Urias and Han Wei Lin and Gabriela F. Ciocarlie and Vinod Yegneswaran and Ashish Gehani}, title = {ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/alchemist-fusing-application-and-audit-logs-for-precise-attack-provenance-without-instrumentation/}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/YuMZT0XULCYG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/GehaniAI21, author = {Ashish Gehani and Raza Ahmad and Hassaan Irshad}, editor = {Tanu Malik and Thomas Pasquier}, title = {Practical Provenance Privacy Protection}, booktitle = {13th International Workshop on Theory and Practice of Provenance, TaPP 2021, July 19-20, 2021}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/tapp2021/presentation/gehani}, timestamp = {Fri, 05 Nov 2021 13:25:52 +0100}, biburl = {https://dblp.org/rec/conf/tapp/GehaniAI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenI0GY21, author = {Xutong Chen and Hassaan Irshad and Yan Chen and Ashish Gehani and Vinod Yegneswaran}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CLARION:} Sound and Clear Provenance Tracking for Microservice Deployments}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3989--4006}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-xutong}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChenI0GY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpdc/NiddodiGMNM20, author = {Chaitra Niddodi and Ashish Gehani and Tanu Malik and Jorge A. Navas and Sibin Mohan}, editor = {Ivo Jimenez and Carlos Maltzahn and Jay F. Lofstead}, title = {MiDas: Containerizing Data-Intensive Applications with {I/O} Specialization}, booktitle = {Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems, P-RECS@HPDC 2020, Stockholm, Sweden, June 23, 2020}, pages = {21--25}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3391800.3398174}, doi = {10.1145/3391800.3398174}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpdc/NiddodiGMNM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpdc/HanMGSP20, author = {Xueyuan Han and James Mickens and Ashish Gehani and Margo I. Seltzer and Thomas F. J.{-}M. Pasquier}, editor = {Ivo Jimenez and Carlos Maltzahn and Jay F. Lofstead}, title = {Xanthus: Push-button Orchestration of Host Provenance Data Collection}, booktitle = {Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems, P-RECS@HPDC 2020, Stockholm, Sweden, June 23, 2020}, pages = {27--32}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3391800.3398175}, doi = {10.1145/3391800.3398175}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpdc/HanMGSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KaanicheBLGR20, author = {Nesrine Kaaniche and Sana Belguith and Maryline Laurent and Ashish Gehani and Giovanni Russello}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {225--237}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009889302250237}, doi = {10.5220/0009889302250237}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/KaanicheBLGR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/AhmadJGIG20, author = {Raza Ahmad and Eunjin Jung and Carolina de Senne Garcia and Hassaan Irshad and Ashish Gehani}, editor = {Thomas Pasquier}, title = {Discrepancy Detection in Whole Network Provenance}, booktitle = {12th International Workshop on Theory and Practice of Provenance, TaPP 2020, June 22, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/tapp2020/presentation/ahmad}, timestamp = {Fri, 05 Nov 2021 13:25:41 +0100}, biburl = {https://dblp.org/rec/conf/tapp/AhmadJGIG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/ChanGIC20, author = {Sheung Chi Chan and Ashish Gehani and Hassaan Irshad and James Cheney}, editor = {Thomas Pasquier}, title = {Integrity Checking and Abnormality Detection of Provenance Records}, booktitle = {12th International Workshop on Theory and Practice of Provenance, TaPP 2020, June 22, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/tapp2020/presentation/chan}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tapp/ChanGIC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/NakamuraMG20, author = {Yuta Nakamura and Tanu Malik and Ashish Gehani}, editor = {Thomas Pasquier}, title = {Efficient Provenance Alignment in Reproduced Executions}, booktitle = {12th International Workshop on Theory and Practice of Provenance, TaPP 2020, June 22, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/tapp2020/presentation/nakamura}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tapp/NakamuraMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-04717, author = {Xueyuan Han and James Mickens and Ashish Gehani and Margo I. Seltzer and Thomas F. J.{-}M. Pasquier}, title = {Xanthus: Push-button Orchestration of Host Provenance Data Collection}, journal = {CoRR}, volume = {abs/2005.04717}, year = {2020}, url = {https://arxiv.org/abs/2005.04717}, eprinttype = {arXiv}, eprint = {2005.04717}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-04717.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/EldefrawyGM19, author = {Karim Eldefrawy and Ashish Gehani and Alexandre Matton}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Longitudinal Analysis of Misuse of Bitcoin}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {259--278}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_13}, doi = {10.1007/978-3-030-21568-2\_13}, timestamp = {Wed, 29 May 2019 12:25:55 +0200}, biburl = {https://dblp.org/rec/conf/acns/EldefrawyGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/JungTGG19, author = {Eunjin Jung and Marion Le Tilly and Ashish Gehani and Yunjie Ge}, title = {Data Mining-Based Ethereum Fraud Detection}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {266--273}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00042}, doi = {10.1109/BLOCKCHAIN.2019.00042}, timestamp = {Wed, 08 Jan 2020 16:20:56 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/JungTGG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/ChanCBPGICS19, author = {Sheung Chi Chan and James Cheney and Pramod Bhatotia and Thomas F. J.{-}M. Pasquier and Ashish Gehani and Hassaan Irshad and Lucian Carata and Margo I. Seltzer}, title = {ProvMark: {A} Provenance Expressiveness Benchmarking System}, booktitle = {Proceedings of the 20th International Middleware Conference, Middleware 2019, Davis, CA, USA, December 9-13, 2019}, pages = {268--279}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3361525.3361552}, doi = {10.1145/3361525.3361552}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/ChanCBPGICS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/BarreGY19, author = {Mathieu Barr{\'{e}} and Ashish Gehani and Vinod Yegneswaran}, editor = {Thomas Moyer and Sudeepa Roy}, title = {Mining Data Provenance to Detect Advanced Persistent Threats}, booktitle = {11th International Workshop on Theory and Practice of Provenance, TaPP 2019, Philadelphia, PA, USA, June 3, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/tapp2019/presentation/barre}, timestamp = {Fri, 05 Nov 2021 13:25:28 +0100}, biburl = {https://dblp.org/rec/conf/tapp/BarreGY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-11187, author = {Sheung Chi Chan and James Cheney and Pramod Bhatotia and Thomas F. J.{-}M. Pasquier and Ashish Gehani and Hassaan Irshad and Lucian Carata and Margo I. Seltzer}, title = {ProvMark: {A} Provenance Expressiveness Benchmarking System}, journal = {CoRR}, volume = {abs/1909.11187}, year = {2019}, url = {http://arxiv.org/abs/1909.11187}, eprinttype = {arXiv}, eprint = {1909.11187}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-11187.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataservice/KaanicheJG18, author = {Nesrine Kaaniche and Eunjin Jung and Ashish Gehani}, title = {Efficiently Validating Aggregated IoT Data Integrity}, booktitle = {Fourth {IEEE} International Conference on Big Data Computing Service and Applications, BigDataService 2018, Bamberg, Germany, March 26-29, 2018}, pages = {260--265}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/BigDataService.2018.00046}, doi = {10.1109/BIGDATASERVICE.2018.00046}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataservice/KaanicheJG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmics/GelleSG18, author = {Loic Gelle and Hassen Sa{\"{\i}}di and Ashish Gehani}, editor = {Falk Howar and Jiri Barnat}, title = {Wholly!: {A} Build System For The Modern Software Stack}, booktitle = {Formal Methods for Industrial Critical Systems - 23rd International Conference, {FMICS} 2018, Maynooth, Ireland, September 3-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11119}, pages = {242--257}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00244-2\_16}, doi = {10.1007/978-3-030-00244-2\_16}, timestamp = {Sat, 19 Oct 2019 20:28:59 +0200}, biburl = {https://dblp.org/rec/conf/fmics/GelleSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipaw/AhmadBG18, author = {Raza Ahmad and Melanie Bru and Ashish Gehani}, editor = {Khalid Belhajjame and Ashish Gehani and Pinar Alper}, title = {Streaming Provenance Compression}, booktitle = {Provenance and Annotation of Data and Processes - 7th International Provenance and Annotation Workshop, {IPAW} 2018, London, UK, July 9-10, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11017}, pages = {236--240}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98379-0\_27}, doi = {10.1007/978-3-319-98379-0\_27}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ipaw/AhmadBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/SharifAGZ18, author = {Hashim Sharif and Muhammad Abubakar and Ashish Gehani and Fareed Zaffar}, editor = {Marianne Huchard and Christian K{\"{a}}stner and Gordon Fraser}, title = {{TRIMMER:} application specialization for code debloating}, booktitle = {Proceedings of the 33rd {ACM/IEEE} International Conference on Automated Software Engineering, {ASE} 2018, Montpellier, France, September 3-7, 2018}, pages = {329--339}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3238147.3238160}, doi = {10.1145/3238147.3238160}, timestamp = {Thu, 23 Jun 2022 19:54:17 +0200}, biburl = {https://dblp.org/rec/conf/kbse/SharifAGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Kwon0WLLM0XJCGY18, author = {Yonghwi Kwon and Fei Wang and Weihang Wang and Kyu Hyung Lee and Wen{-}Chuan Lee and Shiqing Ma and Xiangyu Zhang and Dongyan Xu and Somesh Jha and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran}, title = {{MCI} : Modeling-based Causality Inference in Audit Logging for Attack Investigation}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_07B-2\_Kwon\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Kwon0WLLM0XJCGY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/MaZKL0CGYXJ18, author = {Shiqing Ma and Juan Zhai and Yonghwi Kwon and Kyu Hyung Lee and Xiangyu Zhang and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran and Dongyan Xu and Somesh Jha}, editor = {Haryadi S. Gunawi and Benjamin C. Reed}, title = {Kernel-Supported Cost-Effective Audit Logging for Causality Tracking}, booktitle = {Proceedings of the 2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston, MA, USA, July 11-13, 2018}, pages = {241--254}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/atc18/presentation/ma-shiqing}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/MaZKL0CGYXJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ipaw/2018, editor = {Khalid Belhajjame and Ashish Gehani and Pinar Alper}, title = {Provenance and Annotation of Data and Processes - 7th International Provenance and Annotation Workshop, {IPAW} 2018, London, UK, July 9-10, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11017}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98379-0}, doi = {10.1007/978-3-319-98379-0}, isbn = {978-3-319-98378-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipaw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-manifestos/AllenABCCCCCGGG17, author = {Alice Allen and Cecilia R. Aragon and Christoph Becker and Jeffrey C. Carver and Andrei Chis and Beno{\^{\i}}t Combemale and Mike Croucher and Kevin Crowston and Daniel Garijo and Ashish Gehani and Carole A. Goble and Robert Haines and Robert Hirschfeld and James Howison and Kathryn D. Huff and Caroline Jay and Daniel S. Katz and Claude Kirchner and Katie Kuksenok and Ralf L{\"{a}}mmel and Oscar Nierstrasz and Matthew J. Turk and Rob van Nieuwpoort and Matthew Vaughn and Jurgen J. Vinju}, title = {Engineering Academic Software (Dagstuhl Perspectives Workshop 16252)}, journal = {Dagstuhl Manifestos}, volume = {6}, number = {1}, pages = {1--20}, year = {2017}, url = {https://doi.org/10.4230/DagMan.6.1.1}, doi = {10.4230/DAGMAN.6.1.1}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-manifestos/AllenABCCCCCGGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KrellCG017, author = {Fernando Krell and Gabriela F. Ciocarlie and Ashish Gehani and Mariana Raykova}, editor = {Helena Handschuh}, title = {Low-Leakage Secure Search for Boolean Expressions}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {397--413}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_23}, doi = {10.1007/978-3-319-52153-4\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KrellCG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/GhoshDPYG17, author = {Shalini Ghosh and Ariyam Das and Phillip A. Porras and Vinod Yegneswaran and Ashish Gehani}, title = {Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem}, booktitle = {Proceedings of the 23rd {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13 - 17, 2017}, pages = {1793--1802}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3097983.3098193}, doi = {10.1145/3097983.3098193}, timestamp = {Fri, 25 Dec 2020 01:14:16 +0100}, biburl = {https://dblp.org/rec/conf/kdd/GhoshDPYG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/ChanGCSI17, author = {Sheung Chi Chan and Ashish Gehani and James Cheney and Ripduman Sohan and Hassaan Irshad}, editor = {Adam Bates and Bill Howe}, title = {Expressiveness Benchmarking for System-Level Provenance}, booktitle = {9th {USENIX} Workshop on the Theory and Practice of Provenance, TaPP 2017, Seattle, WA, USA, June 23, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/tapp17/workshop-program/presentation/chan}, timestamp = {Tue, 02 Feb 2021 08:04:55 +0100}, biburl = {https://dblp.org/rec/conf/tapp/ChanGCSI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/debs/JoyYGGLK16, author = {Joshua Joy and Yu{-}Ting Yu and Mario Gerla and Ashish Gehani and Hasnain Lakhani and Minyoung Kim}, editor = {Avigdor Gal and Matthias Weidlich and Vana Kalogeraki and Nalini Venkasubramanian}, title = {Energy efficient, context-aware cache coding for mobile information-centric networks}, booktitle = {Proceedings of the 10th {ACM} International Conference on Distributed and Event-based Systems, {DEBS} '16, Irvine, CA, USA, June 20 - 24, 2016}, pages = {270--280}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2933267.2940322}, doi = {10.1145/2933267.2940322}, timestamp = {Fri, 26 May 2023 07:40:34 +0200}, biburl = {https://dblp.org/rec/conf/debs/JoyYGGLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipaw/Stamatogiannakis16, author = {Manolis Stamatogiannakis and Hasanat Kazmi and Hashim Sharif and Remco Vermeulen and Ashish Gehani and Herbert Bos and Paul Groth}, editor = {Marta Mattoso and Boris Glavic}, title = {Trade-Offs in Automatic Provenance Capture}, booktitle = {Provenance and Annotation of Data and Processes - 6th International Provenance and Annotation Workshop, {IPAW} 2016, McLean, VA, USA, June 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9672}, pages = {29--41}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40593-3\_3}, doi = {10.1007/978-3-319-40593-3\_3}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipaw/Stamatogiannakis16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/KazmiLGTZ16, author = {Hasanat Kazmi and Hasnain Lakhani and Ashish Gehani and Rashid Tahir and Fareed Zaffar}, editor = {Alessandro Pellegrini and Aris Gkoulalas{-}Divanis and Pierangelo di Sanzo and Dimiter R. Avresky}, title = {To route or to secure: Tradeoffs in ICNs over MANETs}, booktitle = {15th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2016, Cambridge, Boston, MA, USA, October 31 - November 2, 2016}, pages = {367--374}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/NCA.2016.7778643}, doi = {10.1109/NCA.2016.7778643}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/KazmiLGTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/GehaniKI16, author = {Ashish Gehani and Hasanat Kazmi and Hassaan Irshad}, editor = {Sarah Cohen Boulakia}, title = {Scaling {SPADE} to "Big Provenance"}, booktitle = {8th {USENIX} Workshop on the Theory and Practice of Provenance, TaPP 2016, Washington, D.C., USA, June 8-9, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/tapp16/workshop-program/presentation/gehani}, timestamp = {Tue, 02 Feb 2021 08:04:57 +0100}, biburl = {https://dblp.org/rec/conf/tapp/GehaniKI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RaykovaLKG15, author = {Mariana Raykova and Hasnain Lakhani and Hasanat Kazmi and Ashish Gehani}, title = {Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {31--40}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818001}, doi = {10.1145/2818000.2818001}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RaykovaLKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/WoodMJSKGGSG15, author = {Samuel B. Wood and James Mathewson and Joshua Joy and Mark{-}Oliver Stehr and Minyoung Kim and Ashish Gehani and Mario Gerla and Hamid R. Sadjadpour and J. J. Garcia{-}Luna{-}Aceves}, editor = {Narciso Mart{\'{\i}}{-}Oliet and Peter Csaba {\"{O}}lveczky and Carolyn L. Talcott}, title = {{ICEMAN:} {A} Practical Architecture for Situational Awareness at the Network Edge}, booktitle = {Logic, Rewriting, and Concurrency - Essays dedicated to Jos{\'{e}} Meseguer on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9200}, pages = {617--631}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23165-5\_29}, doi = {10.1007/978-3-319-23165-5\_29}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/WoodMJSKGGSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/MalechaGS15, author = {Gregory Malecha and Ashish Gehani and Natarajan Shankar}, editor = {Roger L. Wainwright and Juan Manuel Corchado and Alessio Bechini and Jiman Hong}, title = {Automated software winnowing}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015}, pages = {1504--1511}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2695664.2695751}, doi = {10.1145/2695664.2695751}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/MalechaGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/YangYGYTG15, author = {Chao Yang and Guangliang Yang and Ashish Gehani and Vinod Yegneswaran and Dawood Tariq and Guofei Gu}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {58--77}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_4}, doi = {10.1007/978-3-319-28865-9\_4}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/YangYGYTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AsgharGCR14, author = {Muhammad Rizwan Asghar and Ashish Gehani and Bruno Crispo and Giovanni Russello}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {{PIDGIN:} privacy-preserving interest and content sharing in opportunistic networks}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {135--146}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590303}, doi = {10.1145/2590296.2590303}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AsgharGCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/GehaniT14, author = {Ashish Gehani and Dawood Tariq}, editor = {Adriane Chapman and Bertram Lud{\"{a}}scher and Andreas Schreiber}, title = {Provenance Integration}, booktitle = {6th Workshop on the Theory and Practice of Provenance, TaPP'14, Cologne, Germany, June 12-13, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/tapp2014/agenda/presentation/gehani}, timestamp = {Tue, 02 Feb 2021 08:04:56 +0100}, biburl = {https://dblp.org/rec/conf/tapp/GehaniT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CaskurluGBS13, author = {Bugra {\c{C}}askurlu and Ashish Gehani and Cemal {\c{C}}agatay Bilgin and K. Subramani}, title = {Analytical models for risk-based intrusion response}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2181--2192}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.012}, doi = {10.1016/J.COMNET.2013.03.012}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CaskurluGBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/GehaniT13, author = {Ashish Gehani and Dawood Tariq}, editor = {Giovanna Guerrini}, title = {Cross-platform provenance}, booktitle = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT/ICDT} '13, Genoa, Italy, March 22, 2013, Workshop Proceedings}, pages = {335--336}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2457317.2457378}, doi = {10.1145/2457317.2457378}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/GehaniT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LakhaniTAZTG13, author = {Hasnain Lakhani and Rashid Tahir and Azeem Aqil and Fareed Zaffar and Dawood Tariq and Ashish Gehani}, title = {Optimized Rollback and Re-computation}, booktitle = {46th Hawaii International Conference on System Sciences, {HICSS} 2013, Wailea, HI, USA, January 7-10, 2013}, pages = {4930--4937}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/HICSS.2013.434}, doi = {10.1109/HICSS.2013.434}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LakhaniTAZTG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/WoodMJSKGGSG13, author = {Samuel B. Wood and James Mathewson and Joshua Joy and Mark{-}Oliver Stehr and Minyoung Kim and Ashish Gehani and Mario Gerla and Hamid R. Sadjadpour and J. J. Garcia{-}Luna{-}Aceves}, editor = {Joe Senftle and Mike Beltrani and Kari Karwedsky}, title = {{ICEMAN:} {A} System for Efficient, Robust and Secure Situational Awareness at the Network Edge}, booktitle = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San Diego, CA, USA, November 18-20, 2013}, pages = {1512--1517}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/MILCOM.2013.255}, doi = {10.1109/MILCOM.2013.255}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/WoodMJSKGGSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KimGKTSK13, author = {Minyoung Kim and Ashish Gehani and Je{-}Min Kim and Dawood Tariq and Mark{-}Oliver Stehr and Jin{-}Soo Kim}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {Maximizing availability of content in disruptive environments by cross-layer optimization}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {447--454}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480451}, doi = {10.1145/2480362.2480451}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/KimGKTSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/HustedQG13, author = {Nathaniel Husted and Sharjeel Quresi and Ashish Gehani}, editor = {Alexandra Meliou and Val Tannen}, title = {Android Provenance: Diagnosing Device Disorders}, booktitle = {5th Workshop on the Theory and Practice of Provenance, TaPP'13, Lombard, IL, USA, April 2-3, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/tapp13/technical-sessions/presentation/husted}, timestamp = {Tue, 02 Feb 2021 08:04:54 +0100}, biburl = {https://dblp.org/rec/conf/tapp/HustedQG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/MooreG13, author = {Scott Moore and Ashish Gehani}, editor = {Alexandra Meliou and Val Tannen}, title = {Declaratively Processing Provenance Metadata}, booktitle = {5th Workshop on the Theory and Practice of Provenance, TaPP'13, Lombard, IL, USA, April 2-3, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/tapp13/technical-sessions/presentation/moore}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tapp/MooreG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/GehaniT12, author = {Ashish Gehani and Dawood Tariq}, editor = {Priya Narasimhan and Peter Triantafillou}, title = {{SPADE:} Support for Provenance Auditing in Distributed Environments}, booktitle = {Middleware 2012 - {ACM/IFIP/USENIX} 13th International Middleware Conference, Montreal, QC, Canada, December 3-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7662}, pages = {101--120}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35170-9\_6}, doi = {10.1007/978-3-642-35170-9\_6}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/middleware/GehaniT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/TariqAG12, author = {Dawood Tariq and Maisem Ali and Ashish Gehani}, editor = {Umut A. Acar and Todd J. Green}, title = {Towards Automated Collection of Application-Level Data Provenance}, booktitle = {4th Workshop on the Theory and Practice of Provenance, TaPP'12, Boston, MA, USA, June 14-15, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/tapp12/workshop-program/presentation/tariq}, timestamp = {Tue, 02 Feb 2021 08:04:55 +0100}, biburl = {https://dblp.org/rec/conf/tapp/TariqAG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/GehaniZS11, author = {Ashish Gehani and Lee Zaniewski and K. Subramani}, editor = {Gul Agha and Olivier Danvy and Jos{\'{e}} Meseguer}, title = {Algorithmic Aspects of Risk Management}, booktitle = {Formal Modeling: Actors, Open Systems, Biological Systems - Essays Dedicated to Carolyn Talcott on the Occasion of Her 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {7000}, pages = {262--276}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24933-4\_13}, doi = {10.1007/978-3-642-24933-4\_13}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/GehaniZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/GehaniHRDD11, author = {Ashish Gehani and David Hanz and John Rushby and Grit Denker and Rance DeLong}, title = {On the (f)utility of untrusted data sanitization}, booktitle = {{MILCOM} 2011 - 2011 {IEEE} Military Communications Conference, Baltimore, MD, USA, November 7-10, 2011}, pages = {1261--1266}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/MILCOM.2011.6127475}, doi = {10.1109/MILCOM.2011.6127475}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/GehaniHRDD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/GehaniTBM11, author = {Ashish Gehani and Dawood Tariq and Basim Baig and Tanu Malik}, title = {Policy-Based Integration of Provenance Metadata}, booktitle = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011}, pages = {149--152}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/POLICY.2011.12}, doi = {10.1109/POLICY.2011.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/GehaniTBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/TariqBGMTAZ11, author = {Dawood Tariq and Basim Baig and Ashish Gehani and Salman Mahmood and Rashid Tahir and Azeem Aqil and Fareed Zaffar}, editor = {William C. Chu and W. Eric Wong and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Identifying the provenance of correlated anomalies}, booktitle = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}, pages = {224--229}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1982185.1982236}, doi = {10.1145/1982185.1982236}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/TariqBGMTAZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/KimSGT11, author = {Minyoung Kim and Mark{-}Oliver Stehr and Ashish Gehani and Carolyn L. Talcott}, editor = {Ching{-}Hsien Hsu and Laurence Tianruo Yang and Jianhua Ma and Chunsheng Zhu}, title = {Ensuring Security and Availability through Model-Based Cross-Layer Adaptation}, booktitle = {Ubiquitous Intelligence and Computing - 8th International Conference, {UIC} 2011, Banff, Canada, September 2-4, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6905}, pages = {310--325}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23641-9\_26}, doi = {10.1007/978-3-642-23641-9\_26}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/KimSGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eScience/MalikNG10, author = {Tanu Malik and Ligia Nistor and Ashish Gehani}, title = {Tracking and Sketching Distributed Data Provenance}, booktitle = {Sixth International Conference on e-Science, e-Science 2010, 7-10 December 2010, Brisbane, QLD, Australia}, pages = {190--197}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/eScience.2010.51}, doi = {10.1109/ESCIENCE.2010.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eScience/MalikNG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grid/GehaniBMTZ10, author = {Ashish Gehani and Basim Baig and Salman Mahmood and Dawood Tariq and Fareed Zaffar}, title = {Fine-grained tracking of Grid infections}, booktitle = {Proceedings of the 2010 11th {IEEE/ACM} International Conference on Grid Computing, Brussels, Belgium, October 25-29, 2010}, pages = {73--80}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/GRID.2010.5697969}, doi = {10.1109/GRID.2010.5697969}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/grid/GehaniBMTZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpdc/GehaniK10, author = {Ashish Gehani and Minyoung Kim}, editor = {Salim Hariri and Kate Keahey}, title = {Mendel: efficiently verifying the lineage of data modified in multiple trust domains}, booktitle = {Proceedings of the 19th {ACM} International Symposium on High Performance Distributed Computing, {HPDC} 2010, Chicago, Illinois, USA, June 21-25, 2010}, pages = {227--239}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1851476.1851503}, doi = {10.1145/1851476.1851503}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpdc/GehaniK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpdc/GehaniKM10, author = {Ashish Gehani and Minyoung Kim and Tanu Malik}, editor = {Salim Hariri and Kate Keahey}, title = {Efficient querying of distributed provenance stores}, booktitle = {Proceedings of the 19th {ACM} International Symposium on High Performance Distributed Computing, {HPDC} 2010, Chicago, Illinois, USA, June 21-25, 2010}, pages = {613--621}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1851476.1851567}, doi = {10.1145/1851476.1851567}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpdc/GehaniKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/DenkerGKH10, author = {Grit Denker and Ashish Gehani and Minyoung Kim and David Hanz}, title = {Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies}, booktitle = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010}, pages = {120--128}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/POLICY.2010.33}, doi = {10.1109/POLICY.2010.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/DenkerGKH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/RajgarhiaG10, author = {Aditya Rajgarhia and Ashish Gehani}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Performance and extension of user space file systems}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {206--213}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774130}, doi = {10.1145/1774088.1774130}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/RajgarhiaG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/GehaniKZ09, author = {Ashish Gehani and Minyoung Kim and Jian Zhang}, editor = {James Cheney}, title = {Steps Toward Managing Lineage Metadata in Grid Clusters}, booktitle = {First Workshop on the Theory and Practice of Provenance, TaPP'09, San Francisco, CA, USA, February 23, 2009, Proceedings}, publisher = {{USENIX}}, year = {2009}, url = {http://www.usenix.org/events/tapp09/tech/full\_papers/gehani/gehani.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fast/GehaniKZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/GehaniKS09, author = {Ashish Gehani and Florent Kirchner and Natarajan Shankar}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {System Support for Forensic Inference}, booktitle = {Advances in Digital Forensics {V} - Fifth {IFIP} {WG} 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {306}, pages = {301--316}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04155-6\_23}, doi = {10.1007/978-3-642-04155-6\_23}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/GehaniKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GehaniC08, author = {Ashish Gehani and Surendar Chandra}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Parameterized access control: from design to prototype}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {35}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460922}, doi = {10.1145/1460877.1460922}, timestamp = {Tue, 06 Nov 2018 16:58:12 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/GehaniC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GehaniL07, author = {Ashish Gehani and Ulf Lindqvist}, title = {Bonsai: Balanced Lineage Authentication}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {363--373}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.45}, doi = {10.1109/ACSAC.2007.45}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GehaniL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ChandraGY07, author = {Surendar Chandra and Ashish Gehani and Xuwen Yu}, title = {Automated Storage Reclamation Using Temporal Importance Annotations}, booktitle = {27th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2007), June 25-29, 2007, Toronto, Ontario, Canada}, pages = {12}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICDCS.2007.86}, doi = {10.1109/ICDCS.2007.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ChandraGY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/GehaniR07, author = {Ashish Gehani and John H. Reif}, editor = {Philip Craiger and Sujeet Shenoi}, title = {Super-Resolution Video Analysis for Forensic Investigations}, booktitle = {Advances in Digital Forensics {III} - {IFIP} International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007}, series = {{IFIP}}, volume = {242}, pages = {281--299}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73742-3\_20}, doi = {10.1007/978-0-387-73742-3\_20}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/GehaniR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism/GehaniL07, author = {Ashish Gehani and Ulf Lindqvist}, title = {{VEIL:} {A} System for Certifying Video Provenance}, booktitle = {Ninth {IEEE} International Symposium on Multimedia, {ISM} 2007, Taichung, Taiwan, December 10-12, 2007}, pages = {263--272}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ISM.2007.4412382}, doi = {10.1109/ISM.2007.4412382}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ism/GehaniL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GehaniC07, author = {Ashish Gehani and Surendar Chandra}, title = {Parameterizing access control for heterogeneous peer-to-peer applications}, booktitle = {Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007}, pages = {269--278}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SECCOM.2007.4550343}, doi = {10.1109/SECCOM.2007.4550343}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/GehaniC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GehaniC06, author = {Ashish Gehani and Surendar Chandra}, title = {{PAST:} Probabilistic Authentication of Sensor Timestamps}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {439--448}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.37}, doi = {10.1109/ACSAC.2006.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GehaniC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GehaniCK06, author = {Ashish Gehani and Surendar Chandra and Gershon Kedem}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Augmenting storage with an intrusion response primitive to ensure the security of critical data}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {114--124}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128836}, doi = {10.1145/1128817.1128836}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GehaniCK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZaffarKG05, author = {Fareed Zaffar and Gershon Kedem and Ashish Gehani}, title = {Paranoid: {A} Global Secure File Access Control System}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {322--332}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.42}, doi = {10.1109/CSAC.2005.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZaffarKG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/GehaniLR04, author = {Ashish Gehani and Thomas H. LaBean and John H. Reif}, editor = {Natasa Jonoska and Gheorghe Paun and Grzegorz Rozenberg}, title = {DNA-based Cryptography}, booktitle = {Aspects of Molecular Computing, Essays Dedicated to Tom Head on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {2950}, pages = {167--188}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24635-0\_12}, doi = {10.1007/978-3-540-24635-0\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/GehaniLR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GehaniK04, author = {Ashish Gehani and Gershon Kedem}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {RheoStat: Real-Time Risk Management}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {296--314}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_16}, doi = {10.1007/978-3-540-30143-1\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GehaniK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/GehaniLR99, author = {Ashish Gehani and Thomas H. LaBean and John H. Reif}, editor = {Erik Winfree and David K. Gifford}, title = {DNA-based cryptography}, booktitle = {{DNA} Based Computers, Proceedings of a {DIMACS} Workshop, New Brunswick, New Jersey, USA, June 14-15, 1999}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {54}, pages = {233--249}, publisher = {{DIMACS/AMS}}, year = {1999}, url = {https://doi.org/10.1090/dimacs/054/19}, doi = {10.1090/DIMACS/054/19}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/GehaniLR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.