default search action
Vaibhav Rastogi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c22]Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas W. Reps:
Lightweight, Multi-Stage, Compiler-Assisted Application Specialization. EuroS&P 2022: 251-269 - 2021
- [i7]Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas W. Reps:
Lightweight, Multi-Stage, Compiler-Assisted Application Specialization. CoRR abs/2109.02775 (2021) - 2020
- [c21]Matthew Taylor, Ruturaj K. Vaidya, Drew Davidson, Lorenzo De Carli, Vaibhav Rastogi:
Defending Against Package Typosquatting. NSS 2020: 112-131 - [i6]Matthew Taylor, Ruturaj K. Vaidya, Drew Davidson, Lorenzo De Carli, Vaibhav Rastogi:
SpellBound: Defending Against Package Typosquatting. CoRR abs/2003.03471 (2020)
2010 – 2019
- 2019
- [c20]Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha:
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks. EuroS&P 2019: 480-495 - [c19]Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha:
Robust Attribution Regularization. NeurIPS 2019: 14300-14310 - [i5]Ruturaj K. Vaidya, Lorenzo De Carli, Drew Davidson, Vaibhav Rastogi:
Security Issues in Language-based Sofware Ecosystems. CoRR abs/1903.02613 (2019) - [i4]Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha:
Robust Attribution Regularization. CoRR abs/1905.09957 (2019) - 2018
- [j3]Rui Shao, Vaibhav Rastogi, Yan Chen, Xiang Pan, Guanyu Guo, Shihong Zou, Ryan D. Riley:
Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface. IEEE Trans. Mob. Comput. 17(11): 2675-2688 (2018) - [c18]Jinman Zhao, Aws Albarghouthi, Vaibhav Rastogi, Somesh Jha, Damien Octeau:
Neural-augmented static analysis of Android communication. ESEC/SIGSOFT FSE 2018: 342-353 - [i3]Jinman Zhao, Aws Albarghouthi, Vaibhav Rastogi, Somesh Jha, Damien Octeau:
Neural-Augmented Static Analysis of Android Communication. CoRR abs/1809.04059 (2018) - 2017
- [j2]Shahid Alam, Zhengyang Qu, Ryan D. Riley, Yan Chen, Vaibhav Rastogi:
DroidNative: Automating and optimizing detection of Android native code malware variants. Comput. Secur. 65: 230-246 (2017) - [c17]Vaibhav Rastogi, Chaitra Niddodi, Sibin Mohan, Somesh Jha:
New Directions for Container Debloating. FEAST@CCS 2017: 51-56 - [c16]Drew Davidson, Vaibhav Rastogi, Mihai Christodorescu, Somesh Jha:
Enhancing Android Security Through App Splitting. SecureComm 2017: 24-44 - [c15]Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha, Patrick D. McDaniel:
Cimplifier: automatically debloating containers. ESEC/SIGSOFT FSE 2017: 476-486 - 2016
- [c14]Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, Ryan D. Riley:
Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces. NDSS 2016 - [c13]Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen, Wangjun Hong:
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management. SecureComm 2016: 3-23 - [i2]Shahid Alam, Zhengyang Qu, Ryan D. Riley, Yan Chen, Vaibhav Rastogi:
DroidNative: Semantic-Based Detection of Android Native Code Malware. CoRR abs/1602.04693 (2016) - [i1]Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha, Patrick D. McDaniel:
Towards Least Privilege Containers with Cimplifier. CoRR abs/1602.08410 (2016) - 2015
- [c12]Vaibhav Rastogi, Ankit Agrawal:
All your Google and Facebook logins are belong to us: A case for single sign-off. IC3 2015: 416-421 - [c11]Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen:
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. SecureComm 2015: 256-276 - [c10]Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang:
Vetting SSL Usage in Applications with SSLINT. IEEE Symposium on Security and Privacy 2015: 519-534 - 2014
- [j1]Vaibhav Rastogi, Yan Chen, Xuxian Jiang:
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks. IEEE Trans. Inf. Forensics Secur. 9(1): 99-108 (2014) - [c9]Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen:
AutoCog: Measuring the Description-to-permission Fidelity in Android Applications. CCS 2014: 1354-1365 - [c8]Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu:
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks. SecureComm (1) 2014: 582-601 - 2013
- [c7]Vaibhav Rastogi, Yan Chen, Xuxian Jiang:
DroidChameleon: evaluating Android anti-malware against transformation attacks. AsiaCCS 2013: 329-334 - [c6]Vaibhav Rastogi, Yan Chen, William Enck:
AppsPlayground: automatic security analysis of smartphone applications. CODASPY 2013: 209-220 - [c5]Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk:
Redefining web browser principals with a Configurable Origin Policy. DSN 2013: 1-12 - 2012
- [c4]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen, Xitao Wen:
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security. AsiaCCS 2012: 8-9 - 2011
- [c3]Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa:
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. NDSS 2011 - 2010
- [c2]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen:
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality. CCS 2010: 654-656
2000 – 2009
- 2009
- [c1]Vaibhav Rastogi, Vinay J. Ribeiro, Aditya D. Nayar:
Measurements in OLPC mesh networks. WiOpt 2009: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint