default search action
Ashish Gehani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c77]Rohan Tikmany, Aniket Modi, Raffay Atiq, Moaz Reyad, Ashish Gehani, Tanu Malik:
Access-Based Carving of Data for Efficient Reproducibility of Containers. CCGrid 2024: 557-566 - [c76]Aniket Modi, Rohan Tikmany, Tanu Malik, Raghavan Komondoor, Ashish Gehani, Deepak D'Souza:
Kondo: Efficient Provenance-Driven Data Debloating. ICDE 2024: 4965-4978 - [c75]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani, Zhiqiang Lin:
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service. NDSS 2024 - [i4]Mohannad Alhanahnah, Yazan Boshmaf, Ashish Gehani:
SoK: Software Debloating Landscape and Future Directions. CoRR abs/2407.11259 (2024) - 2023
- [j11]Chaitra Niddodi, Ashish Gehani, Tanu Malik, Sibin Mohan, Michael Lee Rilee:
IOSPReD: I/O Specialized Packaging of Reduced Datasets and Data-Intensive Applications for Efficient Reproducibility. IEEE Access 11: 1718-1731 (2023) - [j10]Jorge A. Navas, Ashish Gehani:
OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-Program Specialization. Commun. ACM 66(4): 40-47 (2023) - [j9]Mohannad Alhanahnah, Shiqing Ma, Ashish Gehani, Gabriela F. Ciocarlie, Vinod Yegneswaran, Somesh Jha, Xiangyu Zhang:
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning. IEEE Trans. Software Eng. 49(4): 2761-2775 (2023) - [c74]Muaz Ali, Muhammad Muzammil, M. Faraz Karim, Ayesha Naeem, Rukhshan Haroon, Muhammad Haris, Huzaifah Nadeem, Waseem Sabir, Fahad Shaon, Fareed Zaffar, Vinod Yegneswaran, Ashish Gehani, Sazzadur Rahaman:
SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions. ESORICS (4) 2023: 229-249 - [c73]Raza Ahmad, Aniket Modi, Eunjin Jung, Carolina de Senne Garcia, Hassaan Irshad, Ashish Gehani:
Analyzing Discrepancies in Whole-Network Provenance. Critical Infrastructure Protection 2023: 93-114 - [c72]Muaz Ali, Rumaisa Habib, Ashish Gehani, Sazzadur Rahaman, Zartash Afzal Uzmi:
BLADE: Towards Scalable Source Code Debloating. SecDev 2023: 75-87 - [c71]Muhammad Hassan, Talha Tahir, Muhammad Farrukh, Abdullah Naveed, Anas Naeem, Fareed Zaffar, Fahad Shaon, Ashish Gehani, Sazzadur Rahaman:
Evaluating Container Debloaters. SecDev 2023: 88-98 - [c70]Shozab Hussain, Muhammad Musa, Turyal Neeshat, Rja Batool, Omer Ahmed, Fareed Zaffar, Ashish Gehani, Andy Poggio, Maneesh K. Yadav:
Towards Reproducible Ransomware Analysis. CSET @ USENIX Security Symposium 2023: 1-9 - [c69]Aniket Modi, Moaz Reyad, Tanu Malik, Ashish Gehani:
Querying Container Provenance. WWW (Companion Volume) 2023: 1564-1567 - 2022
- [j8]Naga Nithin Manne, Shilvi Satpati, Tanu Malik, Amitabha Bagchi, Ashish Gehani, Amitabh Chaudhary:
CHEX: Multiversion Replay with Ordered Checkpoints. Proc. VLDB Endow. 15(6): 1297-1310 (2022) - [j7]Jorge A. Navas, Ashish Gehani:
OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-program Specialization: Leveraging scalable pointer analysis, value analysis, and dynamic analysis. ACM Queue 20(5): 58-85 (2022) - [j6]Aatira Anum Ahmad, Abdul Rafae Noor, Hashim Sharif, Usama Hameed, Shoaib Asif, Mubashir Anwar, Ashish Gehani, Fareed Zaffar, Junaid Haroon Siddiqui:
Trimmer: An Automated System for Configuration-Based Software Debloating. IEEE Trans. Software Eng. 48(9): 3485-3505 (2022) - [c68]Yuta Nakamura, Tanu Malik, Iyad Kanj, Ashish Gehani:
Provenance-based Workflow Diagnostics Using Program Specification. HIPC 2022: 292-301 - [c67]Mashal Abbas, Shahpar Khan, Abdul Monum, Fareed Zaffar, Rashid Tahir, David M. Eyers, Hassaan Irshad, Ashish Gehani, Vinod Yegneswaran, Thomas Pasquier:
PACED: Provenance-based Automated Container Escape Detection. IC2E 2022: 261-272 - [c66]Aatira Anum Ahmad, Mubashir Anwar, Hashim Sharif, Ashish Gehani, Fareed Zaffar:
Trimmer: Context-Specific Code Reduction. ASE 2022: 168:1-168:5 - [i3]Naga Nithin Manne, Shilvi Satpati, Tanu Malik, Amitabha Bagchi, Ashish Gehani, Amitabh Chaudhary:
CHEX: Multiversion Replay with Ordered Checkpoints. CoRR abs/2202.08429 (2022) - 2021
- [j5]Ashish Gehani, Raza Ahmad, Hassaan Irshad, Jianqiao Zhu, Jignesh M. Patel:
Digging into big provenance (with SPADE). Commun. ACM 64(12): 48-56 (2021) - [j4]Ashish Gehani, Raza Ahmad, Hassan Irshad, Jianqiao Zhu, Jignesh M. Patel:
Digging into Big Provenance (with SPADE): A user interface for querying provenance. ACM Queue 19(3): 77-106 (2021) - [j3]Hassaan Irshad, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh M. Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, Xiangyu Zhang:
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection. IEEE Trans. Inf. Forensics Secur. 16: 4363-4376 (2021) - [c65]Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani:
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. NDSS 2021 - [c64]Ashish Gehani, Raza Ahmad, Hassaan Irshad:
Practical Provenance Privacy Protection. TaPP 2021 - [c63]Xutong Chen, Hassaan Irshad, Yan Chen, Ashish Gehani, Vinod Yegneswaran:
CLARION: Sound and Clear Provenance Tracking for Microservice Deployments. USENIX Security Symposium 2021: 3989-4006 - 2020
- [c62]Chaitra Niddodi, Ashish Gehani, Tanu Malik, Jorge A. Navas, Sibin Mohan:
MiDas: Containerizing Data-Intensive Applications with I/O Specialization. P-RECS@HPDC 2020: 21-25 - [c61]Xueyuan Han, James Mickens, Ashish Gehani, Margo I. Seltzer, Thomas F. J.-M. Pasquier:
Xanthus: Push-button Orchestration of Host Provenance Data Collection. P-RECS@HPDC 2020: 27-32 - [c60]Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello:
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System. ICETE (2) 2020: 225-237 - [c59]Raza Ahmad, Eunjin Jung, Carolina de Senne Garcia, Hassaan Irshad, Ashish Gehani:
Discrepancy Detection in Whole Network Provenance. TaPP 2020 - [c58]Sheung Chi Chan, Ashish Gehani, Hassaan Irshad, James Cheney:
Integrity Checking and Abnormality Detection of Provenance Records. TaPP 2020 - [c57]Yuta Nakamura, Tanu Malik, Ashish Gehani:
Efficient Provenance Alignment in Reproduced Executions. TaPP 2020 - [i2]Xueyuan Han, James Mickens, Ashish Gehani, Margo I. Seltzer, Thomas F. J.-M. Pasquier:
Xanthus: Push-button Orchestration of Host Provenance Data Collection. CoRR abs/2005.04717 (2020)
2010 – 2019
- 2019
- [c56]Karim Eldefrawy, Ashish Gehani, Alexandre Matton:
Longitudinal Analysis of Misuse of Bitcoin. ACNS 2019: 259-278 - [c55]Eunjin Jung, Marion Le Tilly, Ashish Gehani, Yunjie Ge:
Data Mining-Based Ethereum Fraud Detection. Blockchain 2019: 266-273 - [c54]Sheung Chi Chan, James Cheney, Pramod Bhatotia, Thomas F. J.-M. Pasquier, Ashish Gehani, Hassaan Irshad, Lucian Carata, Margo I. Seltzer:
ProvMark: A Provenance Expressiveness Benchmarking System. Middleware 2019: 268-279 - [c53]Mathieu Barré, Ashish Gehani, Vinod Yegneswaran:
Mining Data Provenance to Detect Advanced Persistent Threats. TaPP 2019 - [i1]Sheung Chi Chan, James Cheney, Pramod Bhatotia, Thomas F. J.-M. Pasquier, Ashish Gehani, Hassaan Irshad, Lucian Carata, Margo I. Seltzer:
ProvMark: A Provenance Expressiveness Benchmarking System. CoRR abs/1909.11187 (2019) - 2018
- [c52]Nesrine Kaaniche, Eunjin Jung, Ashish Gehani:
Efficiently Validating Aggregated IoT Data Integrity. BigDataService 2018: 260-265 - [c51]Loic Gelle, Hassen Saïdi, Ashish Gehani:
Wholly!: A Build System For The Modern Software Stack. FMICS 2018: 242-257 - [c50]Raza Ahmad, Melanie Bru, Ashish Gehani:
Streaming Provenance Compression. IPAW 2018: 236-240 - [c49]Hashim Sharif, Muhammad Abubakar, Ashish Gehani, Fareed Zaffar:
TRIMMER: application specialization for code debloating. ASE 2018: 329-339 - [c48]Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS 2018 - [c47]Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha:
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. USENIX ATC 2018: 241-254 - [e1]Khalid Belhajjame, Ashish Gehani, Pinar Alper:
Provenance and Annotation of Data and Processes - 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedings. Lecture Notes in Computer Science 11017, Springer 2018, ISBN 978-3-319-98378-3 [contents] - 2017
- [j2]Alice Allen, Cecilia R. Aragon, Christoph Becker, Jeffrey C. Carver, Andrei Chis, Benoît Combemale, Mike Croucher, Kevin Crowston, Daniel Garijo, Ashish Gehani, Carole A. Goble, Robert Haines, Robert Hirschfeld, James Howison, Kathryn D. Huff, Caroline Jay, Daniel S. Katz, Claude Kirchner, Katie Kuksenok, Ralf Lämmel, Oscar Nierstrasz, Matthew J. Turk, Rob van Nieuwpoort, Matthew Vaughn, Jurgen J. Vinju:
Engineering Academic Software (Dagstuhl Perspectives Workshop 16252). Dagstuhl Manifestos 6(1): 1-20 (2017) - [c46]Fernando Krell, Gabriela F. Ciocarlie, Ashish Gehani, Mariana Raykova:
Low-Leakage Secure Search for Boolean Expressions. CT-RSA 2017: 397-413 - [c45]Shalini Ghosh, Ariyam Das, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani:
Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem. KDD 2017: 1793-1802 - [c44]Sheung Chi Chan, Ashish Gehani, James Cheney, Ripduman Sohan, Hassaan Irshad:
Expressiveness Benchmarking for System-Level Provenance. TaPP 2017 - 2016
- [c43]Joshua Joy, Yu-Ting Yu, Mario Gerla, Ashish Gehani, Hasnain Lakhani, Minyoung Kim:
Energy efficient, context-aware cache coding for mobile information-centric networks. DEBS 2016: 270-280 - [c42]Manolis Stamatogiannakis, Hasanat Kazmi, Hashim Sharif, Remco Vermeulen, Ashish Gehani, Herbert Bos, Paul Groth:
Trade-Offs in Automatic Provenance Capture. IPAW 2016: 29-41 - [c41]Hasanat Kazmi, Hasnain Lakhani, Ashish Gehani, Rashid Tahir, Fareed Zaffar:
To route or to secure: Tradeoffs in ICNs over MANETs. NCA 2016: 367-374 - [c40]Ashish Gehani, Hasanat Kazmi, Hassaan Irshad:
Scaling SPADE to "Big Provenance". TaPP 2016 - 2015
- [c39]Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani:
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks. ACSAC 2015: 31-40 - [c38]Samuel B. Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves:
ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge. Logic, Rewriting, and Concurrency 2015: 617-631 - [c37]Gregory Malecha, Ashish Gehani, Natarajan Shankar:
Automated software winnowing. SAC 2015: 1504-1511 - [c36]Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu:
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps. SecureComm 2015: 58-77 - 2014
- [c35]Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello:
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. AsiaCCS 2014: 135-146 - [c34]Ashish Gehani, Dawood Tariq:
Provenance Integration. TAPP 2014 - 2013
- [j1]Bugra Çaskurlu, Ashish Gehani, Cemal Çagatay Bilgin, K. Subramani:
Analytical models for risk-based intrusion response. Comput. Networks 57(10): 2181-2192 (2013) - [c33]Ashish Gehani, Dawood Tariq:
Cross-platform provenance. EDBT/ICDT Workshops 2013: 335-336 - [c32]Hasnain Lakhani, Rashid Tahir, Azeem Aqil, Fareed Zaffar, Dawood Tariq, Ashish Gehani:
Optimized Rollback and Re-computation. HICSS 2013: 4930-4937 - [c31]Samuel B. Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves:
ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge. MILCOM 2013: 1512-1517 - [c30]Minyoung Kim, Ashish Gehani, Je-Min Kim, Dawood Tariq, Mark-Oliver Stehr, Jin-Soo Kim:
Maximizing availability of content in disruptive environments by cross-layer optimization. SAC 2013: 447-454 - [c29]Nathaniel Husted, Sharjeel Quresi, Ashish Gehani:
Android Provenance: Diagnosing Device Disorders. TaPP 2013 - [c28]Scott Moore, Ashish Gehani:
Declaratively Processing Provenance Metadata. TaPP 2013 - 2012
- [c27]Ashish Gehani, Dawood Tariq:
SPADE: Support for Provenance Auditing in Distributed Environments. Middleware 2012: 101-120 - [c26]Dawood Tariq, Maisem Ali, Ashish Gehani:
Towards Automated Collection of Application-Level Data Provenance. TaPP 2012 - 2011
- [c25]Ashish Gehani, Lee Zaniewski, K. Subramani:
Algorithmic Aspects of Risk Management. Formal Modeling: Actors, Open Systems, Biological Systems 2011: 262-276 - [c24]Ashish Gehani, David Hanz, John Rushby, Grit Denker, Rance DeLong:
On the (f)utility of untrusted data sanitization. MILCOM 2011: 1261-1266 - [c23]Ashish Gehani, Dawood Tariq, Basim Baig, Tanu Malik:
Policy-Based Integration of Provenance Metadata. POLICY 2011: 149-152 - [c22]Dawood Tariq, Basim Baig, Ashish Gehani, Salman Mahmood, Rashid Tahir, Azeem Aqil, Fareed Zaffar:
Identifying the provenance of correlated anomalies. SAC 2011: 224-229 - [c21]Minyoung Kim, Mark-Oliver Stehr, Ashish Gehani, Carolyn L. Talcott:
Ensuring Security and Availability through Model-Based Cross-Layer Adaptation. UIC 2011: 310-325 - 2010
- [c20]Tanu Malik, Ligia Nistor, Ashish Gehani:
Tracking and Sketching Distributed Data Provenance. eScience 2010: 190-197 - [c19]Ashish Gehani, Basim Baig, Salman Mahmood, Dawood Tariq, Fareed Zaffar:
Fine-grained tracking of Grid infections. GRID 2010: 73-80 - [c18]Ashish Gehani, Minyoung Kim:
Mendel: efficiently verifying the lineage of data modified in multiple trust domains. HPDC 2010: 227-239 - [c17]Ashish Gehani, Minyoung Kim, Tanu Malik:
Efficient querying of distributed provenance stores. HPDC 2010: 613-621 - [c16]Grit Denker, Ashish Gehani, Minyoung Kim, David Hanz:
Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies. POLICY 2010: 120-128 - [c15]Aditya Rajgarhia, Ashish Gehani:
Performance and extension of user space file systems. SAC 2010: 206-213
2000 – 2009
- 2009
- [c14]Ashish Gehani, Minyoung Kim, Jian Zhang:
Steps Toward Managing Lineage Metadata in Grid Clusters. Workshop on the Theory and Practice of Provenance 2009 - [c13]Ashish Gehani, Florent Kirchner, Natarajan Shankar:
System Support for Forensic Inference. IFIP Int. Conf. Digital Forensics 2009: 301-316 - 2008
- [c12]Ashish Gehani, Surendar Chandra:
Parameterized access control: from design to prototype. SecureComm 2008: 35 - 2007
- [c11]Ashish Gehani, Ulf Lindqvist:
Bonsai: Balanced Lineage Authentication. ACSAC 2007: 363-373 - [c10]Surendar Chandra, Ashish Gehani, Xuwen Yu:
Automated Storage Reclamation Using Temporal Importance Annotations. ICDCS 2007: 12 - [c9]Ashish Gehani, John H. Reif:
Super-Resolution Video Analysis for Forensic Investigations. IFIP Int. Conf. Digital Forensics 2007: 281-299 - [c8]Ashish Gehani, Ulf Lindqvist:
VEIL: A System for Certifying Video Provenance. ISM 2007: 263-272 - [c7]Ashish Gehani, Surendar Chandra:
Parameterizing access control for heterogeneous peer-to-peer applications. SecureComm 2007: 269-278 - 2006
- [c6]Ashish Gehani, Surendar Chandra:
PAST: Probabilistic Authentication of Sensor Timestamps. ACSAC 2006: 439-448 - [c5]Ashish Gehani, Surendar Chandra, Gershon Kedem:
Augmenting storage with an intrusion response primitive to ensure the security of critical data. AsiaCCS 2006: 114-124 - 2005
- [c4]Fareed Zaffar, Gershon Kedem, Ashish Gehani:
Paranoid: A Global Secure File Access Control System. ACSAC 2005: 322-332 - 2004
- [c3]Ashish Gehani, Thomas H. LaBean, John H. Reif:
DNA-based Cryptography. Aspects of Molecular Computing 2004: 167-188 - [c2]Ashish Gehani, Gershon Kedem:
RheoStat: Real-Time Risk Management. RAID 2004: 296-314
1990 – 1999
- 1999
- [c1]Ashish Gehani, Thomas H. LaBean, John H. Reif:
DNA-based cryptography. DNA Based Computers 1999: 233-249
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint