Reliable computing with ultra-reduced instruction set co-processors

Patel , Ananthanarayanan , Rajendiran , Garg
design automation conference 697 -702

2012
A middleware approach to asynchronous and backward compatible detection and prevention of ARP cache poisoning

M.V. Tripunitara , P. Dutta
annual computer security applications conference 303 -309

66
1999
On safety in discretionary access control

Ninghui Li , M.V. Tripunitara
ieee symposium on security and privacy 96 -109

40
2005
Towards Formal Verification of Role-Based Access Control Policies

S. Jha , Ninghui Li , M. Tripunitara , Qihua Wang
IEEE Transactions on Dependable and Secure Computing 5 ( 4) 242 -255

111
2008
Foundational and applied research in access control

Ninghui Li , Mahesh Tripunitara
annual information security symposium 23

2004
Non-deterministic timers for hardware Trojan activation (or how a little randomness can go the wrong way)

Frank Imeson , Siddharth Garg , Mahesh Tripunitara , Saeed Nejati
WOOT'16 Proceedings of the 10th USENIX Conference on Offensive Technologies 118 -129

2
2016
Reverse engineering camouflaged sequential circuits without scan access

Siddharth Garg , Mahesh Tripunitara , Mohamed El Massad
international conference on computer aided design 33 -40

36
2017
The Need for Declarative Properties in Digital IC Security

Mohamed El Massad , Frank Imeson , Siddharth Garg , Mahesh Tripunitara
great lakes symposium on vlsi 333 -338

2017
Automatic error finding in access-control policies

Karthick Jayaraman , Vijay Ganesh , Mahesh Tripunitara , Martin Rinard
Proceedings of the 18th ACM conference on Computer and communications security - CCS '11 163 -174

101
2011
Fair Payments for Outsourced Computations

Bogdan Carbunar , Mahesh Tripunitara
sensor mesh and ad hoc communications and networks 1 -9

22
2010
The use of mTags for mandatory security: a case study

Ahmad Saif Ur Rehman , Augusto Born de Oliveira , Mahesh Tripunitara , Sebastian Fischmeister
Software - Practice and Experience 44 ( 12) 1511 -1523

2014
Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF)

Zhiyuan Lin , Mahesh Tripunitara
conference on data and application security and privacy 337 -348

2
2017
Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes.

Mohamed El Massad , Siddharth Garg , Mahesh Tripunitara
network and distributed system security symposium

98
2015
A computational complexity analysis of tunable type inference for Generic Universe Types

Nahid Juma , Werner Dietl , Mahesh Tripunitara
Theoretical Computer Science 814 189 -209

1
2020
A Correctness Proof of a Mesh Security Architecture

Doug Kuhlman , Ryan Moriarty , Tony Braskich , Steve Emeott
ieee computer security foundations symposium 315 -330

12
2008
Conditional Payments for Computing Markets

Bogdan Carbunar , Mahesh Tripunitara
cryptology and network security 317 -331

12
2008
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC)

Marko Komlenovic , Mahesh Tripunitara , Toufik Zitouni
Proceedings of the first ACM conference on Data and application security and privacy - CODASPY '11 121 -132

14
2011
Constructing cascade bloom filters for efficient access enforcement

Nima Mousavi , Mahesh Tripunitara
Computers & Security 81 1 -14

3
2019
Hard Instances for Verification Problems in Access Control

Nima Mousavi , Mahesh Tripunitara
symposium on access control models and technologies 161 -164

1
2015