Author of the publication

Dynamic pharming attacks and locked same-origin policies for web browsers.

, , , and . ACM Conference on Computer and Communications Security, page 58-71. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Shankar, Umesh
add a person with the name Shankar, Umesh
 

Other publications of authors with the same name

Active Mapping: Resisting NIDS Evasion without Altering Traffic., and . IEEE Symposium on Security and Privacy, page 44-61. IEEE Computer Society, (2003)Cloud Data Protection for the Masses., , , and . IEEE Computer, 45 (1): 39-45 (2012)Secure verification of location claims., , and . Workshop on Wireless Security, page 1-10. ACM, (2003)Doppelganger: Better browser privacy without the bother., and . ACM Conference on Computer and Communications Security, page 154-167. ACM, (2006)PRIMA: policy-reduced integrity measurement architecture., , and . SACMAT, page 19-28. ACM, (2006)Toward Automated Information-Flow Integrity Verification for Security-Critical Applications., , and . NDSS, The Internet Society, (2006)Preventing Secret Leakage from fork(): Securing Privilege-Separated Applications., and . ICC, page 2268-2275. IEEE, (2006)Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay., , , , , and . RAID, volume 2516 of Lecture Notes in Computer Science, page 17-35. Springer, (2002)Side Effects Are Not Sufficient to Authenticate Software., , and . USENIX Security Symposium, page 89-102. USENIX, (2004)Detecting Format String Vulnerabilities with Type Qualifiers., , , and . USENIX Security Symposium, USENIX, (2001)