Bhargava Shastry
Bhargava Shastry
Security researcher
No verified email - Homepage
Title
Cited by
Cited by
Year
Towards Taming Privilege-Escalation Attacks on Android.
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry
NDSS 17, 19, 2012
5092012
Practical and lightweight domain isolation on android
S Bugiel, L Davi, A Dmitrienko, S Heuser, AR Sadeghi, B Shastry
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
2632011
Taking control of sdn-based cloud systems via the data plane
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
Proceedings of the Symposium on SDN Research, 1-15, 2018
382018
Static program analysis as a fuzzing aid
B Shastry, M Leutner, T Fiebig, K Thimmaraju, F Yamaguchi, K Rieck, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 26-47, 2017
282017
Poster: the quest for security against privilege escalation attacks on android
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry
Proceedings of the 18th ACM conference on Computer and communications …, 2011
142011
Static exploration of taint-style vulnerabilities found by fuzzing
B Shastry, F Maggi, F Yamaguchi, K Rieck, JP Seifert
arXiv preprint arXiv:1706.00206, 2017
122017
Static exploration of taint-style vulnerabilities found by fuzzing
B Shastry, F Maggi, F Yamaguchi, K Rieck, JP Seifert
arXiv preprint arXiv:1706.00206, 2017
122017
Leveraging flawed tutorials for seeding large-scale web vulnerability discovery
T Unruh, B Shastry, M Skoruppa, F Maggi, K Rieck, JP Seifert, ...
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
122017
The vamp attack: Taking control of cloud systems via the unified packet parser
K Thimmaraju, B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, ...
Proceedings of the 2017 on Cloud Computing Security Workshop, 11-15, 2017
92017
A First Look at Firefox OS Security
D DeFreez, B Shastry, H Chen, JP Seifert
Mobile Security Technologies, 2014
92014
Towards Vulnerability Discovery Using Staged Program Analysis
B Shastry, F Yamaguchi, K Rieck, JP Seifert
13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8 …, 2016
62016
What Does the Fox Say? On the Security Architecture of Firefox OS
M Piekarska, B Shastry, R Borgaonkar
2014 Ninth International Conference on Availability, Reliability and …, 2014
42014
Taking Control of SDN-based Cloud Systems via the Data Plane
B Shastry, T Fiebig, F Hetzelt, JP Seifert, A Feldmann, S Schmid
2018
Compiler assisted vulnerability assessment
B Shastry
2018
DPA Attacks on Certain Cryptographic Primitives on a Common 8-bit Microcontroller
B Shastry, AG Bayrak
2010
Advanced Educational Tools for Modeling, Simulation, Impleme-ntation and Real-Time Testing of Modern Power System Protection Schemes-Particular Reference to Distance Protection
UJ Shenoy, KR Satheesh, BS Kavyashree, BS Shastry
2007
MATLAB Based Evaluation Study of Adaptive Technique and Three Sample Fixed Data Window Algorithm with Particular Reference to development of DSP Based Fast Distance Protection
BS Shastry, UJ Shenoy, K Parthasarathy, HP Khincha
2007
The system can't perform the operation now. Try again later.
Articles 1–17