pith. sign in

N. Asokan

Identifiers

No identifiers captured yet.

Papers (40)

  1. PAL*M: Property Attestation for Large Generative Models cs.CR · 2026 · author #5
  2. Resolving Availability and Run-time Integrity Conflicts in Real-Time Embedded Systems cs.CR · 2025 · author #3
  3. Locket: Robust Feature-Locking Technique for Language Models cs.CR · 2025 · author #3
  4. Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? cs.CL · 2019 · author #2
  5. Exploitation Techniques and Defenses for Data-Oriented Attacks cs.CR · 2019 · author #7
  6. PAC it up: Towards Pointer Integrity using ARM Pointer Authentication cs.CR · 2018 · author #6
  7. All You Need is "Love": Evading Hate-speech Detection cs.CL · 2018 · author #5
  8. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices cs.CR · 2018 · author #1
  9. PRADA: Protecting against DNN Model Stealing Attacks cs.CR · 2018 · author #4
  10. Stay On-Topic: Generating Context-specific Fake Restaurant Reviews cs.CR · 2018 · author #4
  11. Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials cs.CR · 2018 · author #4
  12. D\"IoT: A Federated Self-learning Anomaly Detection System for IoT cs.CR · 2018 · author #5
  13. Migrating SGX Enclaves with Persistent State cs.CR · 2018 · author #4
  14. DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification cs.CR · 2018 · author #6
  15. SafeKeeper: Protecting Web Passwords using Trusted Execution Environments cs.CR · 2017 · author #5
  16. CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers cs.CR · 2017 · author #4
  17. LO-FAT: Low-Overhead Control Flow ATtestation in Hardware cs.CR · 2017 · author #7
  18. HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement cs.CR · 2017 · author #6
  19. Profiling Users by Modeling Web Transactions cs.CR · 2017 · author #3
  20. Scalable Byzantine Consensus via Hardware-assisted Secret Sharing cs.CR · 2016 · author #4
  21. IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT cs.CR · 2016 · author #4
  22. STASH: Securing transparent authentication schemes using prover-side proximity verification cs.CR · 2016 · author #5
  23. Towards Fairness of Cryptocurrency Payments cs.CR · 2016 · author #4
  24. SELint: an SEAndroid policy analysis tool cs.CR · 2016 · author #3
  25. The Circle Game: Scalable Private Membership Test Using Trusted Hardware cs.CR · 2016 · author #6
  26. C-FLAT: Control-FLow ATtestation for Embedded Systems Software cs.CR · 2016 · author #2
  27. OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices cs.CR · 2015 · author #8
  28. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems cs.CR · 2015 · author #3
  29. Know Your Phish: Novel Techniques for Detecting Phishing Sites and their Targets cs.CR · 2015 · author #4
  30. Characterizing SEAndroid Policies in the Wild cs.CR · 2015 · author #5
  31. On Making Emerging Trusted Execution Environments Accessible to Developers cs.CR · 2015 · author #3
  32. Open-TEE - An Open Virtual Trusted Execution Environment cs.CR · 2015 · author #4
  33. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks cs.CR · 2015 · author #6
  34. LookAhead: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling cs.CR · 2015 · author #3
  35. How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL cs.CR · 2014 · author #4
  36. Citizen Electronic Identities using TPM 2.0 cs.CR · 2014 · author #3
  37. Security of OS-level virtualization technologies: Technical report cs.CR · 2014 · author #4
  38. The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators cs.CR · 2013 · author #6
  39. ConXsense - Automated Context Classification for Context-Aware Access Control cs.CR · 2013 · author #5
  40. PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts cs.CR · 2013 · author #2

Mentions

No mention provenance yet.

Frequent Coauthors