Follow
Adwait Nadkarni
Adwait Nadkarni
Verified email at wm.edu - Homepage
Title
Cited by
Cited by
Year
{ASM}: a programmable interface for extending android security
S Heuser, A Nadkarni, W Enck, AR Sadeghi
23rd USENIX Security Symposium (USENIX Security 14), 1005-1019, 2014
1582014
Preventing accidental data disclosure in modern operating systems
A Nadkarni, W Enck
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1212013
Practical {DIFC} Enforcement on Android
A Nadkarni, B Andow, W Enck, S Jha
25th USENIX Security Symposium (USENIX Security 16), 1119-1136, 2016
812016
A study of security isolation techniques
R Shu, P Wang, SA Gorski III, B Andow, A Nadkarni, L Deshotels, J Gionta, ...
ACM Computing Surveys (CSUR) 49 (3), 1-37, 2016
472016
Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses
S Manandhar, K Moran, K Kafle, R Tang, D Poshyvanyk, A Nadkarni
45*
A study of grayware on google play
B Andow, A Nadkarni, B Bassett, W Enck, T Xie
2016 IEEE Security and Privacy Workshops (SPW), 224-233, 2016
432016
Discovering flaws in {Security-Focused} static analysis tools for android using systematic mutation
R Bonett, K Kafle, K Moran, A Nadkarni, D Poshyvanyk
27th USENIX Security Symposium (USENIX Security 18), 1263-1280, 2018
382018
A Study of Data Store-based Home Automation
K Kafle, K Moran, S Manandhar, A Nadkarni, D Poshyvanyk
arXiv preprint arXiv:1812.01597, 2018
352018
Acminer: Extraction and analysis of authorization checks in android's middleware
SA Gorski, B Andow, A Nadkarni, S Manandhar, W Enck, E Bodden, ...
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
292019
Why crypto-detectors fail: A systematic evaluation of cryptographic misuse detection techniques
AS Ami, N Cooper, K Kafle, K Moran, D Poshyvanyk, A Nadkarni
2022 IEEE Symposium on Security and Privacy (SP), 614-631, 2022
242022
Security in centralized data store-based home automation platforms: A systematic analysis of nest and hue
K Kafle, K Moran, S Manandhar, A Nadkarni, D Poshyvanyk
ACM Transactions on Cyber-Physical Systems 5 (1), 1-27, 2020
242020
Understanding iot security from a market-scale perspective
X Jin, S Manandhar, K Kafle, Z Lin, A Nadkarni
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
212022
Systematic mutation-based evaluation of the soundness of security-focused android static analysis techniques
AS Ami, K Kafle, K Moran, A Nadkarni, D Poshyvanyk
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-37, 2021
162021
Programmable interface for extending security of application-based operating system
WH Enck, AP Nadkarni, AR Sadeghi, S Heuser
US Patent 9,916,475, 2018
152018
Nativewrap: Ad hoc smartphone application creation for end users
A Nadkarni, V Tendulkar, W Enck
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
132014
Smart home privacy policies demystified: A study of availability, content, and coverage
S Manandhar, K Kafle, B Andow, K Singh, A Nadkarni
31st USENIX Security Symposium (USENIX Security 22), 3521-3538, 2022
92022
" False negative--that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing
AS Ami, K Moran, D Poshyvanyk, A Nadkarni
arXiv preprint arXiv:2307.16325, 2023
52023
Policy by example: an approach for security policy specification
A Nadkarni, W Enck, S Jha, J Staddon
arXiv preprint arXiv:1707.03967, 2017
52017
A study of grayware on google play. In 2016 IEEE Security and Privacy Workshops (SPW)
B Andow, A Nadkarni, B Bassett, W Enck, T Xie
IEEE, 2016
52016
Towards Practical Integrity in the Smart Home with HomeEndorser
K Kafle, K Jagtap, M Ahmed-Rengers, T Jaeger, A Nadkarni
arXiv preprint arXiv:2109.05139, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20