What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ravishankar K. Iyer
Google Scholar
62
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/dsn
Characterizing Modern GPU Resilience and Impact in HPC Systems: A Case Study of A100 GPUs.
Shengkun Cui
Archit Patke
Ziheng Chen
Aditya Ranjan
Hung Nguyen
Phuong Cao
Brett M. Bode
Gregory H. Bauer
Saurabh Jha
Chandra Narayanaswami
Daby Sow
Catello Di Martino
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
2024
conf/uss
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
Limin Yang
Zhi Chen
Chenkai Wang
Zhenning Zhang
Sushruth Booma
Phuong Cao
Constantin Adam
Alexander Withers
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Gang Wang
2024
conf/dsn
Mutiny! How Does Kubernetes Fail, and What Can We Do About It?
Marco Barletta
Marcello Cinque
Catello Di Martino
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
2024
conf/dsn
When Green Computing Meets Performance and Resilience SLOs.
Haoran Qiu
Weichao Mao
Chen Wang
Saurabh Jha
Hubertus Franke
Chandra Narayanaswami
Zbigniew Kalbarczyk
Tamer Basar
Ravishankar K. Iyer
2024
conf/dsn
iPrism: Characterize and Mitigate Risk by Quantifying Change in Escape Routes.
Shengkun Cui
Saurabh Jha
Ziheng Chen
Zbigniew T. Kalbarczvk
Ravishankar K. Iyer
2023
conf/csr2
stealthML: Data-driven Malware for Stealthy Data Exfiltration.
Key-whan Chung
Phuong Cao
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
2023
conf/dsn
Susceptibility of Autonomous Driving Agents to Learning-Based Action-Space Attacks.
Yuting Wu
Xin Lou
Pengfei Zhou
Rui Tan
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
2022
conf/dsn
Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute Systems.
Saurabh Jha
Shengkun Cui
Timothy Tsai
Siva Kumar Sastry Hari
Michael B. Sullivan
Zbigniew T. Kalbarczyk
Stephen W. Keckler
Ravishankar K. Iyer
2020
conf/dsn
ML-Driven Malware that Targets AV Safety.
Saurabh Jha
Shengkun Cui
Subho S. Banerjee
James Cyriac
Timothy Tsai
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2019
conf/dsn
ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection.
Saurabh Jha
Subho S. Banerjee
Timothy Tsai
Siva Kumar Sastry Hari
Michael B. Sullivan
Zbigniew T. Kalbarczyk
Stephen W. Keckler
Ravishankar K. Iyer
2019
conf/dsn
Towards a Bayesian Approach for Assessing Fault Tolerance of Deep Neural Networks.
Subho S. Banerjee
James Cyriac
Saurabh Jha
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
2018
conf/dsn
AVFI: Fault Injection for Autonomous Vehicles.
Saurabh Jha
Subho S. Banerjee
James Cyriac
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
2018
conf/dsn
Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data.
Subho S. Banerjee
Saurabh Jha
James Cyriac
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
2017
journals/tifs
Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control.
Rui Tan
Hoang Hai Nguyen
Yi Shyh Eddy Foo
David K. Y. Yau
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Hoay Beng Gooi
2016
conf/ccs
A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures.
Uttam Ghosh
Xinshu Dong
Rui Tan
Zbigniew Kalbarczyk
David K. Y. Yau
Ravishankar K. Iyer
2016
conf/cns
Attacking supercomputers through targeted alteration of environmental control: A data driven case study.
Key-whan Chung
Valerio Formicola
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
Alexander Withers
Adam J. Slagell
2016
conf/dsn
Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation.
Homa Alemzadeh
Daniel Chen
Xiao Li
Thenkurussi Kesavadas
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
2016
conf/dsn
F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids.
Varun Badrinath Krishna
Kiryung Lee
Gabriel A. Weaver
Ravishankar K. Iyer
William H. Sanders
2015
conf/ccs
Resilience of Medical Devices and Systems.
Ravishankar K. Iyer
2015
conf/ccs
Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges.
Xinshu Dong
Hui Lin
Rui Tan
Ravishankar K. Iyer
Zbigniew T. Kalbarczyk
2015
conf/dsn
Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application Runs.
Catello Di Martino
William Kramer
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2014
conf/dsn
Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters.
Catello Di Martino
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
Fabio Baccanico
Joseph Fullop
William Kramer
2014
conf/dsn
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants.
Cuong Manh Pham
Zachary Estrada
Phuong Cao
Zbigniew T. Kalbarczyk
Ravishankar K. Iyer
2013
conf/ccs
Semantic security analysis of SCADA networks to detect malicious control commands in power grids.
Hui Lin
Adam J. Slagell
Zbigniew Kalbarczyk
Peter W. Sauer
Ravishankar K. Iyer
2012
conf/dsn
Towards resiliency in embedded medical monitoring devices.
Homa Alemzadeh
Catello Di Martino
Zhanpeng Jin
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2012
conf/dsn
Toward a high availability cloud: Techniques and challenges.
Cuong Manh Pham
Phuong Cao
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2012
conf/dsn
Characterization of the error resiliency of power grid substation devices.
Kuan-Yu Tseng
Daniel Chen
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2011
conf/dsn
Analysis of security data from a large computing organization.
Aashish Sharma
Zbigniew Kalbarczyk
James Barlow
Ravishankar K. Iyer
2011
conf/dsn
Modeling stream processing applications for dependability evaluation.
Gabriela Jacques-Silva
Zbigniew Kalbarczyk
Bugra Gedik
Henrique Andrade
Kun-Lung Wu
Ravishankar K. Iyer
2011
conf/dsn
CloudVal: A framework for validation of virtualization environment in cloud infrastructure.
Cuong Manh Pham
Daniel Chen
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2011
conf/dsn
Improving Log-based Field Failure Data Analysis of multi-node computing systems.
Antonio Pecchia
Domenico Cotroneo
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2011
conf/dsn
Managing business health in the presence of malicious attacks.
Saman A. Zonouz
Aashish Sharma
HariGovind V. Ramasamy
Zbigniew T. Kalbarczyk
Birgit Pfitzmann
Kevin P. McAuliffe
Ravishankar K. Iyer
William H. Sanders
Eric Cope
2010
conf/dsn
Measurement-based analysis of fault and error sensitivities of dynamic memory.
Keun Soo Yim
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2010
conf/dsn
Fourth workshop on dependable and secure nanocomputing.
Jean Arlat
Cristian Constantinescu
Ravishankar K. Iyer
Johan Karlsson
Michael Nicolaidis
2009
conf/sec
Discovering Application-Level Insider Attacks Using Symbolic Execution.
Karthik Pattabiraman
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2009
conf/dsn
Effectiveness of machine checks for error diagnostics.
Nikhil Pandit
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2009
conf/dsn
Third workshop on dependable and secure nanocomputing.
Jean Arlat
Cristian Constantinescu
Ravishankar K. Iyer
Johan Karlsson
Michael Nicolaidis
2009
conf/dsn
An end-to-end approach for the automatic derivation of application-aware error detectors.
Galen Lyle
Shelley Cheny
Karthik Pattabiraman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2008
conf/dsn
Second workshop on dependable and secure nanocomputing.
Jean Arlat
Cristian Constantinescu
Ravishankar K. Iyer
Michael Nicolaidis
2008
conf/dsn
SymPLFIED: Symbolic program-level fault injection and error detection framework.
Karthik Pattabiraman
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2007
conf/dsn
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones.
Marcello Cinque
Domenico Cotroneo
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2007
conf/dsn
Processor-Level Selective Replication.
Nithin Nakka
Karthik Pattabiraman
Ravishankar K. Iyer
2007
conf/dsn
Workshop on Dependable and Secure Nanocomputing.
Jean Arlat
Ravishankar K. Iyer
Michael Nicolaidis
2006
conf/ccs
Security vulnerabilities: from measurements to design.
Ravishankar K. Iyer
2005
conf/dsn
Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
Shuo Chen
Jun Xu
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2005
conf/dsn
Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic.
Giacinto Paolo Saggese
Anoop Vetteth
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2005
conf/dsn
Modeling Coordinated Checkpointing for Large-Scale Supercomputers.
Long Wang
Karthik Pattabiraman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Lawrence G. Votta
Christopher A. Vick
Alan Wood
2005
conf/dsn
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks.
Claudio Basile
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2004
conf/sec
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
Shuo Chen
Karthik Pattabiraman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2004
conf/dsn
Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors.
Weining Gu
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2004
conf/dsn
An Architectural Framework for Providing Reliability and Security Support.
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Jun Xu
2004
conf/dsn
Checkpointing of Control Structures in Main Memory Database Systems.
Long Wang
Zbigniew Kalbarczyk
Ravishankar K. Iyer
H. Vora
T. Chahande
2003
conf/dsn
Characterization of Linux Kernel Behavior under Errors.
Weining Gu
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Zhen-Yu Yang
2003
conf/dsn
A Preemptive Deterministic Scheduling Algorithm for Multithreaded Replicas.
Claudio Basile
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2003
conf/dsn
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities.
Shuo Chen
Zbigniew Kalbarczyk
Jun Xu
Ravishankar K. Iyer
2002
conf/dsn
NFTAPE: Networked Fault Tolerance and Performance Evaluator.
David T. Stott
Phillip H. Jones III
M. Hamman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2002
conf/dsn
An Experimental Evaluation of the REE SIFT Environment for Spaceborne Applications.
Keith Whisnant
Ravishankar K. Iyer
P. Jones
Raphael R. Some
David A. Rennels
2002
conf/dsn
An Adaptive Architecture for Monitoring and Failure Analysis of High-Speed Networks.
Benjamin Floering
B. Brothers
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2002
conf/dsn
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors.
Shuo Chen
Jun Xu
Ravishankar K. Iyer
Keith Whisnant
2002
conf/dsn
Joint Panel - IPDS and Workshop on Dependability Benchmarking.
Ravishankar K. Iyer
Zbigniew Kalbarczyk
Philip Koopman
Henrique Madeira
Gunter Heiner
Karama Kanoun
Haim Levendel
Brendan Murphy
Lawrence G. Votta
Don Wilson
2001
conf/dsn
An Experimental Study of Security Vulnerabilities Caused by Errors.
Jun Xu
Shuo Chen
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2001
conf/dsn
A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller.
Saurabh Bagchi
Y. Liu
Keith Whisnant
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Ytzhak H. Levendel
Lawrence G. Votta
Coauthors
Aashish Sharma
(2)
Adam J. Slagell
(2)
Aditya Ranjan
(1)
Alan Wood
(1)
Alexander Withers
(2)
Anoop Vetteth
(1)
Antonio Pecchia
(1)
Archit Patke
(1)
B. Brothers
(1)
Benjamin Floering
(1)
Birgit Pfitzmann
(1)
Brendan Murphy
(1)
Brett M. Bode
(1)
Bugra Gedik
(1)
Catello Di Martino
(5)
Chandra Narayanaswami
(2)
Chen Wang
(1)
Chenkai Wang
(1)
Christopher A. Vick
(1)
Claudio Basile
(2)
Constantin Adam
(1)
Cristian Constantinescu
(3)
Cuong Manh Pham
(3)
Daby Sow
(1)
Daniel Chen
(3)
David A. Rennels
(1)
David K. Y. Yau
(2)
David T. Stott
(1)
Domenico Cotroneo
(2)
Don Wilson
(1)
Eric Cope
(1)
Fabio Baccanico
(1)
Gabriel A. Weaver
(1)
Gabriela Jacques-Silva
(1)
Galen Lyle
(1)
Gang Wang
(1)
Giacinto Paolo Saggese
(1)
Gregory H. Bauer
(1)
Gunter Heiner
(1)
H. Vora
(1)
Haim Levendel
(1)
Haoran Qiu
(1)
HariGovind V. Ramasamy
(1)
Henrique Andrade
(1)
Henrique Madeira
(1)
Hoang Hai Nguyen
(1)
Hoay Beng Gooi
(1)
Homa Alemzadeh
(2)
Hubertus Franke
(1)
Hui Lin
(2)
Hung Nguyen
(1)
James Barlow
(1)
James Cyriac
(4)
Jean Arlat
(4)
Johan Karlsson
(2)
Joseph Fullop
(1)
Jun Xu
(5)
Karama Kanoun
(1)
Karthik Pattabiraman
(6)
Keith Whisnant
(3)
Keun Soo Yim
(1)
Kevin P. McAuliffe
(1)
Key-whan Chung
(2)
Kiryung Lee
(1)
Kuan-Yu Tseng
(1)
Kun-Lung Wu
(1)
Lawrence G. Votta
(3)
Limin Yang
(1)
Long Wang
(2)
M. Hamman
(1)
Marcello Cinque
(2)
Marco Barletta
(1)
Michael B. Sullivan
(2)
Michael Nicolaidis
(4)
Nikhil Pandit
(1)
Nithin Nakka
(5)
P. Jones
(1)
Pengfei Zhou
(1)
Peter W. Sauer
(1)
Philip Koopman
(1)
Phillip H. Jones III
(1)
Phuong Cao
(5)
Raphael R. Some
(1)
Ravishankar K. Iyer
(62)
Rui Tan
(4)
Saman A. Zonouz
(1)
Saurabh Bagchi
(1)
Saurabh Jha
(9)
Shelley Cheny
(1)
Shengkun Cui
(4)
Shuo Chen
(5)
Siva Kumar Sastry Hari
(2)
Stephen W. Keckler
(2)
Subho S. Banerjee
(5)
Sushruth Booma
(1)
T. Chahande
(1)
Tamer Basar
(1)
Thenkurussi Kesavadas
(1)
Timothy Tsai
(3)
Uttam Ghosh
(1)
Valerio Formicola
(1)
Varun Badrinath Krishna
(1)
Weichao Mao
(1)
Weining Gu
(2)
William H. Sanders
(2)
William Kramer
(2)
Xiao Li
(1)
Xin Lou
(1)
Xinshu Dong
(2)
Y. Liu
(1)
Yi Shyh Eddy Foo
(1)
Ytzhak H. Levendel
(1)
Yuting Wu
(1)
Zachary Estrada
(1)
Zbigniew Kalbarczyk
(36)
Zbigniew T. Kalbarczvk
(1)
Zbigniew T. Kalbarczyk
(15)
Zhanpeng Jin
(1)
Zhen-Yu Yang
(1)
Zhenning Zhang
(1)
Zhi Chen
(1)
Ziheng Chen
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to