HTTPi for Practical End-to-End Web Content Integrity

Alexander Moshchuk , Kapil Singh , Helen J. Wang , Collin Jackson

3
2011
Understanding precision in host based intrusion detection: formal analysis and practical models

Jonathon Giffin , Kapil Singh , Wenke Lee , Monirul Sharif
recent advances in intrusion detection 21 -41

14
2007
xBook: redesigning privacy control in social networking platforms

Kapil Singh , Wenke Lee , Sumeer Bhola
usenix security symposium 249 -266

80
2009
Designing security policies and frameworks for web applications

Kapil Singh , Wenke Lee
Designing security policies and frameworks for web applications 189 -189

2011
On the Disparity of Display Security in Mobile and Traditional Web Browsers

Chaitrali Amrutkar , Kapil Singh , Arunabh Verma , Patrick Traynor
Georgia Institute of Technology

3
2011
I Own, I Provide, I Decide: Generalized User-Centric Access Control Framework for Web Applications

Wenke Lee , Ikpeme Erete , Kapil Singh
Georgia Institute of Technology

3
2010
Policylint: Investigating internal privacy policy contradictions on google play

Tao Xie , William Enck , Kapil Singh , Bradley Reaves
usenix security symposium 585 -602

81
2019
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck

William Enck , Kapil Singh , Bradley Reaves , Benjamin Andow
usenix security symposium 985 -1002

5
2020
Owner-Centric Protection of Unstructured Data on Smartphones

Yajin Zhou , Kapil Singh , Xuxian Jiang
trust and trustworthy computing 55 -73

10
2014
Evaluating Bluetooth as a medium for botnet command and control

Kapil Singh , Samrit Sangal , Nehil Jain , Patrick Traynor
international conference on detection of intrusions and malware and vulnerability assessment 61 -80

76
2010
AppShell: Making data protection practical for lost or stolen Android devices

Xuxian Jiang , Kapil Singh , Yajin Zhou
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium 502 -508

2
2016
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.

Hasini Gunasinghe , Ashish Kundu , Elisa Bertino , Hugo Krawczyk
the web conference 594 -604

14
2019
CCS'14 Co-Located Workshop Summary for SPSM 2014

Kapil Singh , Zhenkai Liang ,
computer and communications security 1558 -1559

2014
Perceptions of Risk in Mobile Transaction

Shari Trewin , Cal Swart , Larry Koved , Kapil Singh
ieee symposium on security and privacy 214 -223

5
2016
Practical end-to-end web content integrity

Kapil Singh , Helen J. Wang , Alexander Moshchuk , Collin Jackson
the web conference 659 -668

16
2012
Practical out-of-band authentication for mobile applications

Kapil Singh , Larry Koved
Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference on - Middleware Industry '13 3

1
2013
Practical Context-Aware Permission Control for Hybrid Mobile Applications

Kapil Singh
recent advances in intrusion detection 307 -327

27
2013
Evaluating email’s feasibility for botnet command and control

Kapil Singh , Abhinav Srivastava , Jonathon Giffin , Wenke Lee
dependable systems and networks 376 -385

30
2008
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers

Christopher Neasbitt , Bo Li , Roberto Perdisci , Long Lu
computer and communications security 133 -145

15
2015
What is wrecking your data plan? A measurement study of mobile web overhead

Abner Mendoza , Kapil Singh , Guofei Gu
2015 IEEE Conference on Computer Communications (INFOCOM) 2740 -2748

5
2015