Stony Brook University Logo Department of Computer Science Stony Brook Search Button
Secure Systems Lab

Alumni

NameDegreeGraduation
Year
EmploymentPublications at SSL
V.N. VenkatakrishnanPh.D.2004Professor
University of Illinois at Chicago 
  • Attack campaign reconstruction (USENIX Security 2017)
  • Isolated execution (TISSEC 2009)
  • Secure software installation (DIMVA 2008)
  • Runtime Non-interference enforcement (ICICS 2006)
  • Privacy for Composite Web Services (ICWS 2006)
  • P3P and MCC (SKM 2006)
  • Privacy-preserving web services (WWW 2005)
  • Trustworthy Personal Information Assistants (KIMAS 2005)
  • Safe Execution Environments (NDSS 2005)
  • Alcatraz/Logical Isolation (ACSAC 2003)
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Security Extension for ELF Binaries (NSPW 2003)
  • Towards Secure Installation (LISA 2002)
  • Policies for mobile code (NSPW 2002)  
  • Mingwei ZhangPh.D.2015Intel Research 
  • Code Reuse Attack Defense for COTS Binaries (ACSAC 2017)
  • Dynamic Loader Attacks (TR 2015)
  • Code and Control-flow integrity (ACSAC 2015)
  • A Principled Approach for ROP Defense (ACSAC 2015)
  • Policy Enforcement for Containers (CloudCom 2015)
  • Static COTS Binary Instrumentation (Stony Brook University 2015)
  • Static binary instrumentation platform (VEE 2014)
  • CFI for COTS Binaries (USENIX Security 2013)  
  • Rui QiaoPh.D.2017LinkedIn 
  • Function Recognition in COTS Binaries (DSN 2017)
  • Execute-only Memory for COTS ARM Binaries (IEEE S&P 2017)
  • Accurate Recovery of Functions in COTS Binaries (Stony Brook University 2017)
  • New Rowhammer Attacks (HOST 2016)
  • Software protection from Rowhammer (ASPLOS 2016)
  • A Principled Approach for ROP Defense (ACSAC 2015)
  • Testing code generators (CGO 2015)
  • Static binary instrumentation platform (VEE 2014)  
  • Zhenkai LiangPh.D.2006Associate Professor
    National University of Singapore 
  • Isolated execution (TISSEC 2009)
  • Secure software installation (DIMVA 2008)
  • Signature generation from IDS models (ACSAC 2005)
  • Signature generation for Buffer Overflows (CCS 2005)
  • Automated signature generation (USENIX 2005)
  • Safe Execution Environments (NDSS 2005)
  • Alcatraz/Logical Isolation (ACSAC 2003)
  • Towards Secure Installation (LISA 2002)  
  • Niranjan HasabnisPh.D.2015Intel Research 
  • Symbolic Execution for Instruction Semantics Extraction (FSE 2016)
  • Learning to lift binaries to IR (ASPLOS 2016)
  • Automatic Synthesis of Instruction Set Semantics and its Applications (Stony Brook University 2015)
  • Automating assembly to IR translation (AMAS-BT 2015)
  • Testing code generators (CGO 2015)
  • Static binary instrumentation platform (VEE 2014)
  • Light-weight Bounds Checking (CGO 2012)  
  • Wei XuPh.D.2009Staff Engineer
    VMWare 
  • Runtime Non-interference enforcement (ICICS 2006)
  • Privacy for Composite Web Services (ICWS 2006)
  • P3P and MCC (SKM 2006)
  • Fast taint-tracking (USENIX Security 2006)
  • Privacy-preserving web services (WWW 2005)
  • Trustworthy Personal Information Assistants (KIMAS 2005)
  • Memory-safety for C (FSE 2004)  
  • Daniel DuVarneyPh.D.2002Reactive Systems 
  • Runtime Non-interference enforcement (ICICS 2006)
  • Relative-address Randomization (USENIX Security 2005)
  • Automated signature generation (USENIX 2005)
  • Predators and Viruses (ACSAC 2004)
  • Memory-safety for C (FSE 2004)
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Security Extension for ELF Binaries (NSPW 2003)
  • Address Obfuscation (ASR) (USENIX Security 2003)  
  • Laszlo SzekeresPh.D.2017Google 
  • Memory corruption mitigation via hardening and testing (Stony Brook University 2017)
  • Code-Pointer Integrity (OSDI 2014)
  • Eternal War in Memory (S&P Magazine 2014)
  • Memory error survey (IEEE S&P 2013)
  • Protecting Function Pointers (ASIACCS 2013)
  • CFI+Randomization (IEEE S&P 2013)  
  • Sandeep BhatkarPh.D.2007Technical Director
    Symantec Research 
  • Data Space Randomization (DIMVA 2008)
  • Fast taint-tracking (USENIX Security 2006)
  • Dataflow Anomaly Detection (IEEE S&P 2006)
  • Relative-address Randomization (USENIX Security 2005)
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Security Extension for ELF Binaries (NSPW 2003)
  • Address Obfuscation (ASR) (USENIX Security 2003)  
  • Wai-Kit SzePh.D.2016Renaissance Technologies 
  • Hardening OpenStack Platform (ASIACCS 2016)
  • Provenance-based Malware Defense (Stony Brook University 2016)
  • Malware defense for Windows (ACSAC 2015)
  • Usable information flow policies (SACMAT 2014)
  • Integrity protection for Linux (SACMAT 2014)
  • Portable Integrity Protection (ACSAC 2013)  
  • Weiqing SunPh.D.2008Assistant Professor
    University of Toledo 
  • Isolated execution (TISSEC 2009)
  • Secure software installation (DIMVA 2008)
  • Logically isolated networks (CSET 2008)
  • Proactive malware defense (IEEE S&P 2008)
  • Virtual Network Lab (CISSE 2005)
  • Safe Execution Environments (NDSS 2005)  
  • Riccardo PelizziPh.D.2016Google 
  • Securing Web Applications (Stony Brook University 2016)
  • Efficient JavaScript Confinement (ACSAC 2015)
  • Web Apps for Non-Programmers (NSPW 2015)
  • Reflected XSS Filter (ASIACCS 2012)
  • CSRF Defense for Web 2.0 (ACSAC 2011)  
  • Lorenzo CavallaroPh.D.2008Assistant Professor
    Royal Holloway 
  • Taint-Enhanced Anomaly Detection (ICISS 2011)
  • Fast Bounds Checker (ASIACCS 2010)
  • Anomalous Taint Detection (RAID 2008)
  • Anti-taint-analysis techniques (DIMVA 2008)
  • PhD Dissertation by Cavallaro (Stony Brook University 2008)  
  • Alok TongaonkarPh.D.2009Data Scientist Director
    Symantec 
  • Fast packet matching automata (IEEE TIFS 2016)
  • Fast Packet Classification (Stony Brook University 2009)
  • Fast Packet Matching (ACNS 2009)
  • Compilation for Fast Packet-Matching (LISA 2008)
  • Firewall policy inference (LISA 2007)  
  • Prateek SaxenaM.S.2007Assistant Professor
    National University of Singapore 
  • Untrusted plug-in containment (TR 2008)
  • Anti-taint-analysis techniques (DIMVA 2008)
  • Fast taint-tracking on binaries (CGO 2008)
  • Static Binary Analysis (Stony Brook University 2007)  
  • Ajay GuptaPh.D.2003Director, DUCC
    Delhi University 
  • Predators and Viruses (ACSAC 2004)
  • Email anomaly detection (RAID 2003)
  • Specification-based anomaly detection (CCS 2002)  
  • Prem UppuluriPh.D.2002 Radford University 
  • Experience with Specification-Based IDS (RAID 2001)
  • Survivable Systems (DISCEX 2000)
  • Synthesizing IDS from Specifications (USENIX Security 1999)  
  • Tushar ShanbhagM.S.2000Product Management leader
    Vmware 
  • Specification-based anomaly detection (CCS 2002)
  • Survivable Systems (DISCEX 2000)
  • Fast Network IDS (CCS 1999)  
  • Sreenaath VasudevanM.S.2009Software Engineer
    Riverbed 
  • Fast Packet Matching (ACNS 2009)
  • Compilation for Fast Packet-Matching (LISA 2008)  
  • Samik BasuPh.D.2003Assistant Professor
    Iowa State University 
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Push-down system verification (FORTE 2003)  
  • Varun PuranikM.S.2008SDE
    Microsoft 
  • Untrusted plug-in containment (TR 2008)
  • Fast taint-tracking on binaries (CGO 2008)  
  • Kumar KrishnaM.S.2005Senior Software Engineer
    PayPal 
  • Logically isolated networks (CSET 2008)
  • Virtual Network Lab (CISSE 2005)  
  • Chetan ParampalliM.S.2006Software Engineer
    Google 
  • Persistent interposition attacks (ASIACCS 2008)  
  • Ashish MisraM.S.2010Software Engineer
    Symantec 
  • Light-weight Bounds Checking (CGO 2012)  
  • Bhuvan MitalM.S.2010Software Engineer
    Cisco 
  • Usable information flow policies (SACMAT 2014)  
  • Abhishek ChaturvediM.S.2005Senior MTS
    VMWare 
  • Dataflow Anomaly Detection (IEEE S&P 2006)  
  • Diptikalyan SahaPh.D.2007Research Staff Member
    IBM India Research Labs 
  • Push-down system verification (FORTE 2003)  
  • Mithun IyerM.S.2009Software Engineer
    Arista Networks 
  • Untrusted plug-in containment (TR 2008)  
  • Tejas KarandikarM.S.2007SDE2
    Microsoft 
  • Proactive malware defense (IEEE S&P 2008)  
  • Yves YounanPh.D.2008Postdoctoral Researcher
    Katholieke Universiteit Leuven 
  • Fast Bounds Checker (ASIACCS 2010)  
  • Gaurav PoothiaM.S.2006SDE
    Microsoft 
  • Proactive malware defense (IEEE S&P 2008)  
  • Mugdha BendreM.S.2001Information Security Engineer
    Google 
  • Automata models for IDS (IEEE S&P 2001)  
  • Niranjan InamdarM.S.2006Microsoft 
  • Firewall policy inference (LISA 2007)  
  • Dinakar DhurjatiM.S.2002DoCoMo Labs 
  • Automata models for IDS (IEEE S&P 2001)  
  • Varun KattaM.S.2006Software Engineer
    Katango 
  • Logically isolated networks (CSET 2008)  
  • Pratik RanaM.S.2004Senior Software Engineer
    EMC 
  • Virtual Network Lab (CISSE 2005)  
  • Abhishek TiwariM.S.2003Product Manager
    Brocade 
  • Specification-based anomaly detection (CCS 2002)  
  • Sumati PriyaM.S.2010Software Engineer
    Google 
     
    James FrulloM.S.2003Manager & Senior Software Engineer
    Bloomberg 
  • Specification-based anomaly detection (CCS 2002)  
  • Ram PeriM.S.2003VP
    JP Morgan 
  • Policies for mobile code (NSPW 2002)  
  • Tapan KamatM.S.2003CitiGroup 
  • Towards Secure Installation (LISA 2002)  
  • Tianning LiM.S.2003AVP
    Merrill Lynch 
  • Virtual Network Lab (CISSE 2005)  
  • Anupama ChandwaniM.S.2010MTS
    VMWare 
     
    Henglin YangM.S.2002Director of R&D
    FalconStor 
  • Specification-based anomaly detection (CCS 2002)  
  • Sofia TsipaM.S.2002 
  • Towards Secure Installation (LISA 2002)  
  • Sheng ZhouM.S.2002Bloomberg 
  • Specification-based anomaly detection (CCS 2002)  
  • Kapil JainM.S.1999Juniper Networks 
  • User-level system-call interposition (NDSS 2000)  
  • Abhiraj ButalaM.S.2010MTS
    Riverbed 
     
    Arun PonniahM.S.2010SDE
    Amazon 
     
    Ganesh SangleM.S.2010MTS
    Riverbed 
     
    Manish MehraM.S.2010Software Engineer
    Juniper Networks 
     
    Prachi DeshmukhM.S.2010MTS
    NetApps 
     
    Alireza SaberiM.S.2012UT Dallas  
    Pinkesh ZaveriM.S.2007Senior Software Engineer
    VMWare 
     
    Arvind AyyangarM.S.2010Software Engineer
    Cisco 
     
    Praveen KrishnamoorthyM.S.2010SDE
    LSI Logic 
     
    Pradeep BollineniM.S.1999Principal MTS
    Oracle 
  • Automata models for IDS (IEEE S&P 2001)  
  • Yong CaiM.S.1997EMC 
  • Specification-based IDS (NISSC 1998)  
  • Prakhar SharmaM.S.2009Technical Yahoo
    Yahoo 
     
    Gaurav NaigaonkarM.S.2010Financial Software Developer
    Bloomberg 
     
    Alphonse KenzleyM.S.2010  
    Shruthi MurthyM.S.2003Engineer
    Google 
     
    Guang YangM.S.1997Ericcson 
  • Fast Network IDS (CCS 1999)  
  • Janani NatarajanM.S.2007MTS
    NetApps 
     
    Mayur MahajanM.S.2007Software Engineer
    Brocade 
     
    Rekha DharanipragadaM.S.2007SDE
    Amazon 
     
    Srivani NarraM.S.2009  
    Vishwas NagarajaM.S.2004Senior Software Engineer
    VMWare 
     
    Mohammed MehkriM.S.2006Microsoft  
    Manish NairM.S.2007Bloomberg  
    Manuel RiveraM.S.2007  
    Munyaradzi ChiwaraM.S.2007Analyst
    Goldman Sachs 
     
    Karthik Sreenivasa MurthyM.S.2006Senior MTS
    VMware 
     
    Milan ManavatM.S.2006Bloomberg  
    Sandhya MenonM.S.2006Technical Analyst
    Goldman Sachs 
     
    Joy DuttaM.S.2005Senior Elastician
    Elastica 
     
    Yogesh ChauhanM.S.2005Software Engineer
    Bloomberg 
     
    Divya PadmanabhanM.S.2004MTS
    Citigroup 
     
    Mohan ChannaM.S.2004Bloomberg  
    Seung LeeM.S.2003  
    Gaurav SehgalM.S.2001Technical Lead
    Yahoo 
     
    Aashish GuptaM.S.2002Founder/CEO
    Yellowleg.com 
     
    Shridhar BaluM.S.2002Application development officer
    State Street 
     
    Xu LiM.S.2001Oracle  
    Amrita DeshmukhM.S.1999Freescale Semiconductor  
    Ravi VankamamidiM.S.1998Co-founder
    S3 Edge 
     

    Home Contact NSI Computer Science Stony Brook University

    Copyright © 1999-2013 Secure Systems Laboratory, Stony Brook University. All rights reserved.