Vinod Ganapathy: Presentations

This webpage contains links to some of my presentations to the research community. The list below includes extended (usually hour-long) overview presentations of my research projects. I have also included links to conference paper presentationss, if available. The corresponding conference papers are also available via the links below or from my papers page.

Extended Presentations


Talk Title      Link      Description
Policies and Mechanisms for Operating System Security      PDF      Presentation slides summarizing our work on operating system integrity.
Regulating Smart Devices in Restricted Spaces      PDF      Presentation slides describing our project on enforcing usage restrictions on smart personal devices.
Self-service Cloud Computing      PDF, Talk      Presentation slides describing our self-service cloud computing project (and elevator-pitches of a few other projects).
Rootkit-based Attacks and Defenses: Past, Present and Future      Powerpoint      Presentation slides describing our research projects on rootkit detection, including our work on Gibraltar (see below) and rootkits on mobile devices.
Analyzing Information Flow in JavaScript-based Browser Extensions      Powerpoint      Presentation slides describing the Sabre project on securing JavaScript-based Web browser extensions.
Detecting Kernel-level Rootkits using Data Structure Invariants      Powerpoint      Presentation slides describing the Gibraltar rootkit detection project.
Enforcing Security Policies using Transactional Memory Introspection      Powerpoint      Presentation slides describing the Transactional Memory Introspection project.
Retrofitting Legacy Code for Security      Powerpoint      Presentation slides describing my Ph.D. thesis research on retrofitting legacy code for authorization policy enforcement. Presented at various universities and research labs in Spring 2007.

Conference Presentations


Talk Title      Link      Description
Regulating ARM TrustZone Devices in Restricted Spaces      Paper/Slides      Presentation slides from ACM MobiSys 2016
Testing Cross-Platform Mobile App Development Frameworks      Paper/Slides      Presentation slides from ASE 2015
Efficient Runtime Enforcement Techniques for Policy Weaving      Paper/Slides      Presentation slides from ACM SIGSOFT FSE 2014
On the Control Plane of a Self-service Cloud Platform      Paper/Slides      Presentation slides from ACM SOCC 2014
Retargetting Legacy Browser Extensions to Modern Extension Frameworks      Paper/Slides      Presentation slides from ECOOP 2014
Inferring Likely Mappings Between APIs      Paper/Slides      Presentation slides from ICSE 2013
An Analysis of the Mozilla Jetpack Extension Framework      Paper/Slides      Presentation slides from ECOOP 2012
Enhancing JavaScript using Transactions      Paper/Slides      Presentation slides from ECOOP 2012
Self-service Cloud Computing      Paper/Slides      Presentation slides from ACM CCS 2012
Towards a Richer Model of Cloud App Markets      Paper/Slides      Presentation slides from ACM CCSW 2012
Enhancing Users' Comprehension of Android Permissions      Paper/Slides      Presentation slides from ACM SPSM 2012
Fast Submatch Extraction using OBDDs      Paper/Slides      Presentation slides from ACM/IEEE ANCS 2012
Security versus Energy Tradeoffs in Host-based Mobile Malware Detection      Paper/Slides      Presentation slides from ACM MobiSys 2011
Monitoring Data Structures using Hardware Transactional Memory      Paper/Slides      Presentation slides from RV 2011
Rootkits on Mobile Phones      Paper/Slides      Presentation slides from HotMobile 2010
The Case for JavaScript Transactions      Paper/Slides      Presentation slides from ACM PLAS 2010
Improving NFA-based Signature Matching using Ordered Binary Decision Diagrams      Paper/Slides      Presentation slides from RAID 2010
Privately Querying Location-based Services using Sybilquery      Paper/Slides      Presentation slides from ACM UbiComp 2009
Working-set Based Access Control for Network File Systems      Paper/Slides      Presentation slides from ACM SACMAT 2009
Analyzing Information Flow in JavaScript-based Browser Extensions      Paper/Slides      Presentation slides from ACSAC 2009
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers      Paper/Slides      Presentation slides from ACSAC 2009
Automatic Inference and Enforcement of Kernel Data Structure Invaraints      Paper/Slides      Presentation slides from ACSAC 2008
OMOS: A Framework for Secure Communication in Mashup Applications      Paper/Slides      Presentation slides from ACSAC 2008
Enforcing Authorization Policies using Transactional Memory Introspection      Paper/Slides      Presentation slides from ACM CCS 2008
Mining Security-sensitive Operations in Legacy Code using Concept Analysis      Paper/Slides      Presentation slides from ICSE 2007
Microdrivers: A New Architecture for Device Drivers      Paper/Slides      Presentation slides from HotOS 2007
Netspy: Automatic Generation of Spyware Signatures for NIDS      Paper/Slides      Presentation slides from ACSAC 2006
HeapMD: Identifying Heap-based Bugs using Anomaly Detection      Paper/Slides      Presentation slides from ASPLOS 2006
Retrofitting Legacy Code for Authorization Policy Enforcement      Paper/Slides      Presentation slides from Oakland 2006
An Auctioning Reputation System using Anomaly Detection      Paper/Slides      Presentation slides from ACM CCS 2005
Automatic Placement of Authorization Hooks in the Linux Security Modules Framework      Paper/Slides      Presentation slides from ACM CCS 2005
Automatic Detection of API-Level Exploits      Paper/Slides      Presentation slides from ICSE 2005
Buffer Overrun Detection using Linear Programming and Static Analysis      Paper/Slides      Presentation slides from ACM CCS 2003

Note that the Powerpoint presentations are available as Slideshows (PPS files) meaning that you can display them using a Powerpoint viewer, but cannot modify them. If you would like the PPT files instead, please email me.


Back to my home page