What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vijay Laxmi
Google Scholar
ORCID:
0000-0002-3662-8487
17
publications in security and cryptology related venues
Year
Venue
Title
2021
journals/compsec
MapperDroid: Verifying app capabilities from description to permissions and API calls.
Rajendra Kumar Solanki
Vijay Laxmi
Bruhadeshwar Bezawada
Manoj Singh Gaur
2021
journals/istr
Personal image privacy from automated attacks in mobile cloud computing.
Shweta Saharan
Vijay Laxmi
Bruhadeshwar Bezawada
Manoj Singh Gaur
2020
journals/compsec
EspyDroid+: Precise reflection analysis of android apps.
Jyoti Gajrani
Umang Agarwal
Vijay Laxmi
Bruhadeshwar Bezawada
Manoj Singh Gaur
Meenakshi Tripathi
Akka Zemmari
2019
journals/compsec
ETGuard: Detecting D2D attacks using wireless Evil Twins.
Vineeta Jain
Vijay Laxmi
Manoj Singh Gaur
Mohamed Mosbah
2018
journals/istr
SWORD: Semantic aWare andrOid malwaRe Detector.
Shweta Bhandari
Rekha Panihar
Smita Naval
Vijay Laxmi
Akka Zemmari
Manoj Singh Gaur
2017
journals/compsec
Android inter-app communication threats and detection techniques.
Shweta Bhandari
Wafa Ben Jaballah
Vineeta Jain
Vijay Laxmi
Akka Zemmari
Manoj Singh Gaur
Mohamed Mosbah
Mauro Conti
2017
conf/ccs
Detection of Information Leaks via Reflection in Android Apps.
Jyoti Gajrani
Li Li
Vijay Laxmi
Meenakshi Tripathi
Manoj Singh Gaur
Mauro Conti
2017
conf/ccs
Detecting Inter-App Information Leakage Paths.
Shweta Bhandari
Frédéric Herbreteau
Vijay Laxmi
Akka Zemmari
Partha S. Roop
Manoj Singh Gaur
2017
conf/iciss
Secure Random Encryption for Deduplicated Storage.
Jay Dave
Shweta Saharan
Parvez Faruki
Vijay Laxmi
Manoj Singh Gaur
2016
journals/compsec
Colluding browser extension attack on user privacy and its implication for web browsers.
Anil Saini
Manoj Singh Gaur
Vijay Laxmi
Mauro Conti
2016
conf/iciss
Detection of SQLite Database Vulnerabilities in Android Apps.
Vineeta Jain
Manoj Singh Gaur
Vijay Laxmi
Mohamed Mosbah
2016
conf/dsn
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Parvez Faruki
Akka Zemmari
Manoj Singh Gaur
Vijay Laxmi
Mauro Conti
2015
journals/istr
AndroSimilar: Robust signature for detecting variants of Android malware.
Parvez Faruki
Vijay Laxmi
Ammar Bharmal
Manoj Singh Gaur
Vijay Ganmoor
2015
journals/istr
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET.
Vijay Laxmi
Chhagan Lal
Manoj Singh Gaur
Deepanshu Mehta
2015
journals/tifs
Employing Program Semantics for Malware Detection.
Smita Naval
Vijay Laxmi
Muttukrishnan Rajarajan
Manoj Singh Gaur
Mauro Conti
2014
conf/iciss
Privacy Leakage Attacks in Browsers by Colluding Extensions.
Anil Saini
Manoj Singh Gaur
Vijay Laxmi
Tushar Singhal
Mauro Conti
2014
conf/esorics
Environment-Reactive Malware Behavior: Detection and Categorization.
Smita Naval
Vijay Laxmi
Manoj Singh Gaur
Sachin Raja
Muttukrishnan Rajarajan
Mauro Conti
Coauthors
Akka Zemmari
(5)
Ammar Bharmal
(1)
Anil Saini
(2)
Bruhadeshwar Bezawada
(3)
Chhagan Lal
(1)
Deepanshu Mehta
(1)
Frédéric Herbreteau
(1)
Jay Dave
(1)
Jyoti Gajrani
(2)
Li Li
(1)
Manoj Singh Gaur
(17)
Mauro Conti
(7)
Meenakshi Tripathi
(2)
Mohamed Mosbah
(3)
Muttukrishnan Rajarajan
(2)
Partha S. Roop
(1)
Parvez Faruki
(3)
Rajendra Kumar Solanki
(1)
Rekha Panihar
(1)
Sachin Raja
(1)
Shweta Bhandari
(3)
Shweta Saharan
(2)
Smita Naval
(3)
Tushar Singhal
(1)
Umang Agarwal
(1)
Vijay Ganmoor
(1)
Vijay Laxmi
(17)
Vineeta Jain
(3)
Wafa Ben Jaballah
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to