What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Karthik Pattabiraman
Google Scholar
ORCID:
0000-0003-2380-3415
54
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
A Method to Facilitate Membership Inference Attacks in Deep Learning Models.
Zitao Chen
Karthik Pattabiraman
2025
conf/dsn
ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data.
Abraham Chan
Arpan Gujarati
Karthik Pattabiraman
Sathish Gopalakrishnan
2025
conf/dsn
Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains.
Yuqi Liu
Rui Xi
Karthik Pattabiraman
2025
conf/dsn
Large-Scale AI Infra Reliability: Challenges, Strategies, and Llama 3 Training Experience.
Xun Jiao
Abhinav Pandey
Karthik Pattabiraman
Fan Fred Lin
2025
conf/dsn
RAVAGE: Robotic Autonomous Vehicles' Attack Generation Engine.
Pritam Dash
Karthik Pattabiraman
2025
conf/dsn
Learning from the Good Ones: Risk Profiling-Based Defenses Against Evasion Attacks on DNNs.
Mohammed Elnawawy
Gargi Mitra
Shahrear Iqbal
Karthik Pattabiraman
2024
conf/ccs
AutoPatch: Automated Generation of Hotpatches for Real-Time Embedded Devices.
Mohsen Salehi
Karthik Pattabiraman
2024
conf/ccs
SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical Attacks.
Pritam Dash
Ethan Chan
Karthik Pattabiraman
2024
conf/sp
POMABuster: Detecting Price Oracle Manipulation Attacks in Decentralized Finance.
Rui Xi
Zehua Wang
Karthik Pattabiraman
2024
conf/asiaccs
Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception Attacks.
Pritam Dash
Guanpeng Li
Mehdi Karimibiuki
Karthik Pattabiraman
2024
conf/ndss
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction.
Zitao Chen
Karthik Pattabiraman
2024
conf/dsn
Tutorial: LLTFI and the Art of Fault Injection.
Karthik Pattabiraman
Abraham Chan
2024
conf/dsn
Harnessing Explainability to Improve ML Ensemble Resilience.
Abraham Chan
Arpan Gujarati
Karthik Pattabiraman
Sathish Gopalakrishnan
2023
conf/asiaccs
Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks.
Zitao Chen
Pritam Dash
Karthik Pattabiraman
2023
conf/dsn
Towards Reliability Assessment of Systolic Arrays against Stuck-at Faults.
Udit Kumar Agarwal
Abraham Chan
Ali Asgari Khoshouyeh
Karthik Pattabiraman
2023
conf/dsn
SwarmFuzz: Discovering GPS Spoofing Attacks in Drone Swarms.
Yingao Elaine Yao
Pritam Dash
Karthik Pattabiraman
2023
conf/dsn
Beyond Detection: Securing Robotic Vehicles.
Pritam Dash
Karthik Pattabiraman
2022
conf/ccs
Poster AutoPatch: Automatic Hotpatching of Real-Time Embedded Devices.
Mohsen Salehi
Karthik Pattabiraman
2022
conf/ccs
Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms.
Yingao Elaine Yao
Pritam Dash
Karthik Pattabiraman
2022
conf/dsn
The Fault in Our Data Stars: Studying Mitigation Techniques against Faulty Training Data in Machine Learning Applications.
Abraham Chan
Arpan Gujarati
Karthik Pattabiraman
Sathish Gopalakrishnan
2022
conf/dsn
Towards Building Resilient Ensembles against Training Data Faults.
Abraham Chan
Arpan Gujarati
Karthik Pattabiraman
Sathish Gopalakrishnan
2021
conf/dsn
Fourth International Workshop on Dependable and Secure Machine Learning - DSML 2021.
Hui Xu
Guanpeng Li
Homa Alemzadeh
Rakesh Bobba
Varun Chandrasekaran
David E. Evans
Nicolas Papernot
Karthik Pattabiraman
Florian Tramèr
2021
conf/dsn
A Low-cost Fault Corrector for Deep Neural Networks through Range Restriction.
Zitao Chen
Guanpeng Li
Karthik Pattabiraman
2021
conf/dsn
PID-Piper: Recovering Robotic Vehicles from Physical Attacks.
Pritam Dash
Guanpeng Li
Zitao Chen
Mehdi Karimibiuki
Karthik Pattabiraman
2020
conf/dsn
TraceSanitizer - Eliminating the Effects of Non-Determinism on Error Propagation Analysis.
Habib Saissi
Stefan Winter
Oliver Schwahn
Karthik Pattabiraman
Neeraj Suri
2020
conf/dsn
Third International Workshop on Dependable and Secure Machine Learning - DSML 2020.
Homa Alemzadeh
Rakesh Bobba
Varun Chandrasekaran
David E. Evans
Nicolas Papernot
Karthik Pattabiraman
Florian Tramèr
2019
conf/dsn
Towards Predicting the Impact of Roll-Forward Failure Recovery for HPC Applications.
Bo Fang
Jieyang Chen
Karthik Pattabiraman
Matei Ripeanu
Sriram Krishnamoorthy
2019
conf/acsac
Out of control: stealthy attacks against robotic vehicles protected by control-based techniques.
Pritam Dash
Mehdi Karimibiuki
Karthik Pattabiraman
2018
conf/ccs
CORGIDS: A Correlation-based Generic Intrusion Detection System.
Ekta Aggarwal
Mehdi Karimibiuki
Karthik Pattabiraman
André Ivanov
2018
conf/dsn
DSML 2018 Introduction.
Homa Alemzadeh
Karthik Pattabiraman
David E. Evans
2018
conf/dsn
Modeling Soft-Error Propagation in Programs.
Guanpeng Li
Karthik Pattabiraman
Siva Kumar Sastry Hari
Michael B. Sullivan
Timothy Tsai
2018
conf/dsn
Modeling Input-Dependent Error Propagation in Programs.
Guanpeng Li
Karthik Pattabiraman
2017
conf/dsn
One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors.
Behrooz Sangchoolie
Karthik Pattabiraman
Johan Karlsson
2016
conf/dsn
SDC is in the Eye of the Beholder: A Survey and Preliminary Study.
Bo Fang
Panruo Wu
Qiang Guan
Nathan DeBardeleben
Laura Monroe
Sean Blanchard
Zhizong Chen
Karthik Pattabiraman
Matei Ripeanu
2016
conf/dsn
ePVF: An Enhanced Program Vulnerability Factor Methodology for Cross-Layer Resilience Analysis.
Bo Fang
Qining Lu
Karthik Pattabiraman
Matei Ripeanu
Sudhanva Gurumurthi
2016
conf/acsac
Formal security analysis of smart embedded systems.
Farid Molazem Tabrizi
Karthik Pattabiraman
2015
conf/dsn
Fine-Grained Characterization of Faults Causing Long Latency Crashes in Programs.
Guanpeng Li
Qining Lu
Karthik Pattabiraman
2014
conf/dsn
Evaluating the Error Resilience of Parallel Programs.
Bo Fang
Karthik Pattabiraman
Matei Ripeanu
Sudhanva Gurumurthi
2014
conf/dsn
Hardware-Software Integrated Diagnosis for Intermittent Hardware Faults.
Majid Dadashi
Layali Rashid
Karthik Pattabiraman
Sathish Gopalakrishnan
2014
conf/dsn
Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware Faults.
Jiesheng Wei
Anna Thomas
Guanpeng Li
Karthik Pattabiraman
2013
conf/dsn
Error detector placement for soft computation.
Anna Thomas
Karthik Pattabiraman
2013
conf/dsn
Predicting job completion times using system logs in supercomputing clusters.
Xin Chen
Charng-Da Lu
Karthik Pattabiraman
2012
conf/dsn
BLOCKWATCH: Leveraging similarity in parallel programs for error detection.
Jiesheng Wei
Karthik Pattabiraman
2012
conf/dsn
A model for security analysis of smart meters.
Farid Molazem Tabrizi
Karthik Pattabiraman
2011
conf/dsn
Comparing the effects of intermittent and transient hardware faults on programs.
Jiesheng Wei
Layali Rashid
Karthik Pattabiraman
Sathish Gopalakrishnan
2010
conf/dsn
Towards understanding the effects of intermittent hardware faults on programs.
Layali Rashid
Karthik Pattabiraman
Sathish Gopalakrishnan
2009
conf/sec
Discovering Application-Level Insider Attacks Using Symbolic Execution.
Karthik Pattabiraman
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2009
conf/dsn
Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS).
Karthik Pattabiraman
Zbigniew Kalbarczyk
2009
conf/dsn
An end-to-end approach for the automatic derivation of application-aware error detectors.
Galen Lyle
Shelley Cheny
Karthik Pattabiraman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2008
conf/dsn
Workshop on compiler and architectural techniques for application reliability and security (CATARS).
Karthik Pattabiraman
Shuo Chen
Zbigniew Kalbarczyk
2008
conf/dsn
SymPLFIED: Symbolic program-level fault injection and error detection framework.
Karthik Pattabiraman
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2007
conf/dsn
Processor-Level Selective Replication.
Nithin Nakka
Karthik Pattabiraman
Ravishankar K. Iyer
2005
conf/dsn
Modeling Coordinated Checkpointing for Large-Scale Supercomputers.
Long Wang
Karthik Pattabiraman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Lawrence G. Votta
Christopher A. Vick
Alan Wood
2004
conf/sec
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
Shuo Chen
Karthik Pattabiraman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Coauthors
Abhinav Pandey
(1)
Abraham Chan
(6)
Alan Wood
(1)
Ali Asgari Khoshouyeh
(1)
André Ivanov
(1)
Anna Thomas
(2)
Arpan Gujarati
(4)
Behrooz Sangchoolie
(1)
Bo Fang
(4)
Charng-Da Lu
(1)
Christopher A. Vick
(1)
David E. Evans
(3)
Ekta Aggarwal
(1)
Ethan Chan
(1)
Fan Fred Lin
(1)
Farid Molazem Tabrizi
(2)
Florian Tramèr
(2)
Galen Lyle
(1)
Gargi Mitra
(1)
Guanpeng Li
(8)
Habib Saissi
(1)
Homa Alemzadeh
(3)
Hui Xu
(1)
Jiesheng Wei
(3)
Jieyang Chen
(1)
Johan Karlsson
(1)
Karthik Pattabiraman
(54)
Laura Monroe
(1)
Lawrence G. Votta
(1)
Layali Rashid
(3)
Long Wang
(1)
Majid Dadashi
(1)
Matei Ripeanu
(4)
Mehdi Karimibiuki
(4)
Michael B. Sullivan
(1)
Mohammed Elnawawy
(1)
Mohsen Salehi
(2)
Nathan DeBardeleben
(1)
Neeraj Suri
(1)
Nicolas Papernot
(2)
Nithin Nakka
(3)
Oliver Schwahn
(1)
Panruo Wu
(1)
Pritam Dash
(9)
Qiang Guan
(1)
Qining Lu
(2)
Rakesh Bobba
(2)
Ravishankar K. Iyer
(6)
Rui Xi
(2)
Sathish Gopalakrishnan
(7)
Sean Blanchard
(1)
Shahrear Iqbal
(1)
Shelley Cheny
(1)
Shuo Chen
(2)
Siva Kumar Sastry Hari
(1)
Sriram Krishnamoorthy
(1)
Stefan Winter
(1)
Sudhanva Gurumurthi
(2)
Timothy Tsai
(1)
Udit Kumar Agarwal
(1)
Varun Chandrasekaran
(2)
Xin Chen
(1)
Xun Jiao
(1)
Yingao Elaine Yao
(2)
Yuqi Liu
(1)
Zbigniew Kalbarczyk
(7)
Zehua Wang
(1)
Zhizong Chen
(1)
Zitao Chen
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to