Ashish Gehani
Ashish Gehani
Verified email at - Homepage
Cited by
Cited by
DNA-based Cryptography
A Gehani, T LaBean, J Reif
Aspects of Molecular Computing, Lecture Notes in Computer Science 2950, 2004
SPADE: Support for Provenance Auditing in Distributed Environments
A Gehani, D Tariq
13th ACM/IFIP/USENIX International Middleware Conference, 2012
Performance and Extension of User Space File Systems
A Rajgarhia, A Gehani
25th ACM Symposium on Applied Computing (SAC), 2010
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
25th Annual Network and Distributed System Security Symposium (NDSS), 2018
Trimmer: Application Specialization for Code Debloating
H Sharif, M Abubakar, A Gehani, F Zaffar
33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018
RheoStat: Real-time Risk Management
A Gehani, G Kedem
7th International Symposium on Recent Advances in Intrusion Detection (RAID …, 2004
Transcoding Characteristics of Web Images
S Chandra, A Gehani, C Ellis, A Vahdat
Multimedia Computing and Networking (MMCN) 4312, 2001
Data Mining-based Ethereum Fraud Detection
E Jung, M Le Tilly, A Gehani, Y Ge
2nd IEEE International Conference on Blockchain, 2019
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
29th USENIX Annual Technical Conference (ATC), 2018
Towards Automated Collection of Application-Level Data Provenance
D Tariq, M Ali, A Gehani
4th USENIX Workshop on the Theory and Practice of Provenance (TaPP …, 2012
Microflow Biomolecular Computation
A Gehani, J Reif
Biosystems, Journal of Biological and Information Processing Sciences 52 (1-3), 1999
Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem
S Ghosh, A Das, P Porras, V Yegneswaran, A Gehani
23rd ACM International Conference on Knowledge Discovery and Data Mining (KDD), 2017
Smartphone Security Limitations: Conflicting Traditions
N Husted, H Saidi, A Gehani
2nd Workshop on Governance of Technology, Information, and Policies …, 2011
Tracking and Sketching Distributed Data Provenance
T Malik, L Nistor, A Gehani
6th IEEE International Conference on e-Science, 2010
Automated Software Winnowing
G Malecha, A Gehani, N Shankar
30th ACM Symposium on Applied Computing (SAC), 2015
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection
H Irshad, G Ciocarlie, A Gehani, V Yegneswaran, KH Lee, J Patel, S Jha, ...
IEEE Transactions on Information Forensics and Security, 2021
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation
L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, V Urias, HW Lin, G Ciocarlie, ...
28th Network and Distributed System Security Symposium (NDSS), 2021
Mining Data Provenance to Detect Advanced Persistent Threats
M Barre, A Gehani, V Yegneswaran
11th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2019
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps
C Yang, G Yang, A Gehani, V Yegneswaran, D Tariq, G Gu
11th International Conference on Security and Privacy in Communication …, 2015
Sketching Distributed Data Provenance
T Malik, A Gehani, D Tariq, F Zaffar
Data Provenance and Data Management for eScience, Studies in Computational …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20