default search action
Adwait Nadkarni
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Sunil Manandhar, Kapil Singh, Adwait Nadkarni:
Towards Automated Regulation Analysis for Effective Privacy Compliance. NDSS 2024 - [c20]Yue Xiao, Adwait Nadkarni, Xiaojing Liao:
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of Materials. SCORED@CCS 2024: 1-11 - [c19]Kaushal Kafle, Prianka Mandal, Kapil Singh, Benjamin Andow, Adwait Nadkarni:
Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites. SP 2024: 3404-3422 - [c18]Amit Seal Ami, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
"False negative - that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing. SP 2024: 3979-3997 - [c17]Prianka Mandal, Amit Seal Ami, Victor Olaiya, Sayyed Hadi Razmjo, Adwait Nadkarni:
"Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification. USENIX Security Symposium 2024 - [c16]Kaushal Kafle, Kirti Jagtap, Mansoor Ahmed-Rengers, Trent Jaeger, Adwait Nadkarni:
Practical Integrity Validation in the Smart Home with HomeEndorser. WISEC 2024: 207-218 - 2023
- [c15]Prianka Mandal, Sunil Manandhar, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
Helion: Enabling Natural Testing of Smart Homes. ESEC/SIGSOFT FSE 2023: 2147-2151 - [c14]Amit Seal Ami, Syed Yusuf Ahmed, Radowan Mahmud Redoy, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors. ESEC/SIGSOFT FSE 2023: 2162-2166 - [i12]Amit Seal Ami, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
"False negative - that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing. CoRR abs/2307.16325 (2023) - [i11]Amit Seal Ami, Syed Yusuf Ahmed, Radowan Mahmud Redoy, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors. CoRR abs/2308.02310 (2023) - [i10]Prianka Mandal, Sunil Manandhar, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
Helion: Enabling Natural Testing of Smart Homes. CoRR abs/2308.06695 (2023) - 2022
- [c13]Xin Jin, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, Adwait Nadkarni:
Understanding IoT Security from a Market-Scale Perspective. CCS 2022: 1615-1629 - [c12]Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. SP 2022: 614-631 - [c11]Sunil Manandhar, Kaushal Kafle, Benjamin Andow, Kapil Singh, Adwait Nadkarni:
Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage. USENIX Security Symposium 2022: 3521-3538 - 2021
- [j3]Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk:
Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue. ACM Trans. Cyber Phys. Syst. 5(1): 2:1-2:27 (2021) - [j2]Amit Seal Ami, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques. ACM Trans. Priv. Secur. 24(3): 15:1-15:37 (2021) - [c10]Amit Seal Ami, Kaushal Kafle, Adwait Nadkarni, Denys Poshyvanyk, Kevin Moran:
µSE: Mutation-Based Evaluation of Security-Focused Static Analysis Tools for Android. ICSE (Companion Volume) 2021: 53-56 - [i9]Amit Seal Ami, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
μSE: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android. CoRR abs/2102.06823 (2021) - [i8]Amit Seal Ami, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques. CoRR abs/2102.06829 (2021) - [i7]Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. CoRR abs/2107.07065 (2021) - [i6]Kaushal Kafle, Kirti Jagtap, Mansoor Ahmed-Rengers, Trent Jaeger, Adwait Nadkarni:
Towards Practical Integrity in the Smart Home with HomeEndorser. CoRR abs/2109.05139 (2021) - 2020
- [c9]Sunil Manandhar, Kevin Moran, Kaushal Kafle, Ruhao Tang, Denys Poshyvanyk, Adwait Nadkarni:
Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses. SP 2020: 482-499
2010 – 2019
- 2019
- [c8]Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, Alexandre Bartel:
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. CODASPY 2019: 25-36 - [c7]Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk:
A Study of Data Store-based Home Automation. CODASPY 2019: 73-84 - [i5]Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, Alexandre Bartel:
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. CoRR abs/1901.03603 (2019) - [i4]Sunil Manandhar, Kevin Moran, Kaushal Kafle, Ruhao Tang, Denys Poshyvanyk, Adwait Nadkarni:
Helion: Enabling a Natural Perspective of Home Automation. CoRR abs/1907.00124 (2019) - 2018
- [c6]Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation. USENIX Security Symposium 2018: 1263-1280 - [i3]Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation. CoRR abs/1806.09761 (2018) - [i2]Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk:
A Study of Data Store-based Home Automation. CoRR abs/1812.01597 (2018) - 2017
- [i1]Adwait Nadkarni, William Enck, Somesh Jha, Jessica Staddon:
Policy by Example: An Approach for Security Policy Specification. CoRR abs/1707.03967 (2017) - 2016
- [j1]Rui Shu, Peipei Wang, Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Luke Deshotels, Jason Gionta, William Enck, Xiaohui Gu:
A Study of Security Isolation Techniques. ACM Comput. Surv. 49(3): 50:1-50:37 (2016) - [c5]Benjamin Andow, Adwait Nadkarni, Blake Bassett, William Enck, Tao Xie:
A Study of Grayware on Google Play. IEEE Symposium on Security and Privacy Workshops 2016: 224-233 - [c4]Adwait Nadkarni, Benjamin Andow, William Enck, Somesh Jha:
Practical DIFC Enforcement on Android. USENIX Security Symposium 2016: 1119-1136 - 2014
- [c3]Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi:
ASM: A Programmable Interface for Extending Android Security. USENIX Security Symposium 2014: 1005-1019 - [c2]Adwait Nadkarni, Vasant Tendulkar, William Enck:
NativeWrap: ad hoc smartphone application creation for end users. WISEC 2014: 13-24 - 2013
- [c1]Adwait Nadkarni, William Enck:
Preventing accidental data disclosure in modern operating systems. CCS 2013: 1029-1042
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint