What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Rigel Gjomemo
Google Scholar
ORCID:
0009-0001-3715-077X
12
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
FIXX: FInding eXploits from eXamples.
Neil P. Thimmaiah
Yashashvi J. Dave
Rigel Gjomemo
V. N. Venkatakrishnan
2024
conf/ccs
ReactAppScan: Mining React Application Vulnerabilities via Component Graph.
Zhiyong Guo
Mingqing Kang
V. N. Venkatakrishnan
Rigel Gjomemo
Yinzhi Cao
2023
conf/sp
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.
Mingqing Kang
Yichao Xu
Song Li
Rigel Gjomemo
Jianwei Hou
V. N. Venkatakrishnan
Yinzhi Cao
2022
conf/iciss
Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection.
Sutanu Kumar Ghosh
Kiavash Satvat
Rigel Gjomemo
V. N. Venkatakrishnan
2021
conf/eurosp
Extractor: Extracting Attack Behavior from Threat Reports.
Kiavash Satvat
Rigel Gjomemo
V. N. Venkatakrishnan
2019
conf/ccs
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. N. Venkatakrishnan
2019
conf/sp
HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows.
Sadegh Momeni Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. N. Venkatakrishnan
2018
conf/uss
NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications.
Abeer Alhuzali
Rigel Gjomemo
Birhanu Eshete
V. N. Venkatakrishnan
2018
conf/iciss
ProPatrol: Attack Investigation via Extracted High-Level Tasks.
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
Venkat N. Venkatakrishnan
2017
conf/uss
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
Md Nahid Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. N. Venkatakrishnan
2016
conf/ccs
Chainsaw: Chained Automated Workflow-based Exploit Generation.
Abeer Alhuzali
Birhanu Eshete
Rigel Gjomemo
V. N. Venkatakrishnan
2014
conf/fc
Digital Check Forgery Attacks on Client Check Truncation Systems.
Rigel Gjomemo
Hafiz Malik
Nilesh Sumb
V. N. Venkatakrishnan
Rashid Ansari
Coauthors
Abeer Alhuzali
(2)
Birhanu Eshete
(6)
Hafiz Malik
(1)
Jianwei Hou
(1)
Junao Wang
(1)
Kiavash Satvat
(2)
Md Nahid Hossain
(1)
Mingqing Kang
(2)
Neil P. Thimmaiah
(1)
Nilesh Sumb
(1)
R. Sekar
(2)
Rashid Ansari
(1)
Rigel Gjomemo
(12)
Sadegh M. Milajerdi
(3)
Sadegh Momeni Milajerdi
(1)
Scott D. Stoller
(1)
Song Li
(1)
Sutanu Kumar Ghosh
(1)
V. N. Venkatakrishnan
(11)
Venkat N. Venkatakrishnan
(1)
Yashashvi J. Dave
(1)
Yichao Xu
(1)
Yinzhi Cao
(2)
Zhiyong Guo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to