Susanta Nanda
Susanta Nanda
Verified email at symantec.com
Title
Cited by
Cited by
Year
A survey on virtualization technologies
SNT Chiueh, S Brook
Rpe Report 142, 2005
2992005
Viking: A multi-spanning-tree Ethernet architecture for metropolitan area and cluster networks
S Sharma, K Gopalan, S Nanda, T Chiueh
IEEE INFOCOM 2004 4, 2283-2294, 2004
2112004
BIRD: Binary interpretation using runtime disassembly
S Nanda, W Li, LC Lam, T Chiueh
International Symposium on Code Generation and Optimization (CGO'06), 12 pp.-370, 2006
1402006
A feather-weight virtual machine for windows applications
Y Yu, F Guo, S Nanda, L Lam, T Chiueh
Proceedings of the 2nd international conference on Virtual execution …, 2006
1352006
Techniques for behavior based malware analysis
SB Bhatkar, S Nanda, JS Wilhelm
US Patent 8,555,385, 2013
772013
Security-as-a-service for microservices-based cloud applications
Y Sun, S Nanda, T Jaeger
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
732015
Dynamic multi-process information flow tracking for web application security
S Nanda, LC Lam, T Chiueh
Proceedings of the 2007 ACM/IFIP/USENIX international conference on …, 2007
482007
Systems and methods for monitoring virtual networks
SK Nanda, Y Sun
US Patent 9,961,105, 2018
402018
Systems and methods for protecting against unauthorized access of encrypted data during power-management modes
S Nanda, K Griffin
US Patent 8,555,083, 2013
282013
Foreign code detection on the windows/x86 platform
S Nanda, W Li, LC Lam, T Chiueh
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 279-288, 2006
132006
Systems and methods for data loss prevention on mobile computing systems
J Casaburi, K Griffin, S Nanda, S Sawhney, M Conover
US Patent 8,429,745, 2013
122013
Techniques for virtual environment-based web client management
SK Nanda, T Chiueh
US Patent 9,065,725, 2015
112015
Execution trace-driven automated attack signature generation
S Nanda, T Chiueh
2008 Annual Computer Security Applications Conference (ACSAC), 195-204, 2008
112008
Web application attack prevention for tiered internet services
S Nanda, L Lam, T Chiueh
2008 The Fourth International Conference on Information Assurance and …, 2008
112008
Systems and methods for monitoring encrypted data transmission
F Guo, SK Nanda
US Patent 9,800,560, 2017
62017
Systems and methods for detecting malicious documents based on component-object reuse
S Bhatkar, F Guo, S Nanda
US Patent 9,317,679, 2016
62016
Looking from the mirror: evaluating IoT device security through mobile companion apps
X Wang, Y Sun, S Nanda, XF Wang
28th {USENIX} Security Symposium ({USENIX} Security 19), 1151-1167, 2019
52019
Learning Context-Aware Policies from Multiple Smart Homes via Federated Multi-Task Learning
T Yu, T Li, Y Sun, S Nanda, V Smith, V Sekar, S Seshan
2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design …, 2020
32020
Systems and methods for deploying a pre-boot environment to enable an address offset mode after execution of system bios for booting a operating system in a protected area
S Nanda, KE Griffin
US Patent 9,135,447, 2015
32015
Security for IoT Home Voice Assistants
SK Nanda, Y Sun, S Shintre
US Patent App. 15/969,193, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20