Stony Brook University Logo Department of Computer Science Stony Brook Search Button
Secure Systems Lab

Alumni

NameDegreeGraduation
Year
EmploymentPublications at SSL
Md Nahid HossainPh.D.2022Oracle 
  • Mapping Advanced Cyber Attack Campaigns (Stony Brook University 2022)
  • Mitigating dependence explosion in forensic analysis (IEEE S&P 2020)
  • Log Reduction (USENIX Security 2018)
  • Attack campaign reconstruction (USENIX Security 2017)  
  • Laszlo SzekeresPh.D.2017Google 
  • Code-Pointer Integrity (Morgan-Claypool and ACM Press 2018)
  • Memory corruption mitigation via hardening and testing (Stony Brook University 2017)
  • Code-Pointer Integrity (OSDI 2014)
  • Eternal War in Memory (S&P Magazine 2014)
  • Memory error survey (IEEE S&P 2013)
  • Protecting Function Pointers (ASIACCS 2013)
  • CFI+Randomization (IEEE S&P 2013)  
  • Mingwei ZhangPh.D.2015Intel Research 
  • Code Reuse Attack Defense for COTS Binaries (ACSAC 2017)
  • Dynamic Loader Attacks (TR 2015)
  • Code and Control-flow integrity (ACSAC 2015)
  • A Principled Approach for ROP Defense (ACSAC 2015)
  • Policy Enforcement for Containers (CloudCom 2015)
  • Static COTS Binary Instrumentation (Stony Brook University 2015)
  • Static binary instrumentation platform (VEE 2014)
  • CFI for COTS Binaries (USENIX Security 2013)  
  • V.N. VenkatakrishnanPh.D.2004Professor
    University of Illinois at Chicago 
  • High-level APT scenario reconstruction (IEEE S&P 2019)
  • Attack campaign reconstruction (USENIX Security 2017)
  • Isolated execution (TISSEC 2009)
  • Secure software installation (DIMVA 2008)
  • MCC Project Summary (Wiley Publishing 2007)
  • Runtime Non-interference enforcement (ICICS 2006)
  • Privacy for Composite Web Services (ICWS 2006)
  • P3P and MCC (SKM 2006)
  • Privacy-preserving web services (WWW 2005)
  • Trustworthy Personal Information Assistants (KIMAS 2005)
  • Safe Execution Environments (NDSS 2005)
  • Alcatraz/Logical Isolation (ACSAC 2003)
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Security Extension for ELF Binaries (NSPW 2003)
  • Towards Secure Installation (LISA 2002)
  • Policies for mobile code (NSPW 2002)  
  • Rui QiaoPh.D.2017LinkedIn 
  • Function Recognition in COTS Binaries (DSN 2017)
  • Execute-only Memory for COTS ARM Binaries (IEEE S&P 2017)
  • Accurate Recovery of Functions in COTS Binaries (Stony Brook University 2017)
  • New Rowhammer Attacks (HOST 2016)
  • Software protection from Rowhammer (ASPLOS 2016)
  • A Principled Approach for ROP Defense (ACSAC 2015)
  • Testing code generators (CGO 2015)
  • Static binary instrumentation platform (VEE 2014)  
  • Wai-Kit SzePh.D.2016Renaissance Technologies 
  • Hardening OpenStack Platform (ASIACCS 2016)
  • Provenance-based Malware Defense (Stony Brook University 2016)
  • Malware defense for Windows (ACSAC 2015)
  • Usable information flow policies (SACMAT 2014)
  • Integrity protection for Linux (SACMAT 2014)
  • Portable Integrity Protection (ACSAC 2013)  
  • Niranjan HasabnisPh.D.2015Intel Research 
  • Symbolic Execution for Instruction Semantics Extraction (FSE 2016)
  • Learning to lift binaries to IR (ASPLOS 2016)
  • Automatic Synthesis of Instruction Set Semantics and its Applications (Stony Brook University 2015)
  • Automating assembly to IR translation (AMAS-BT 2015)
  • Testing code generators (CGO 2015)
  • Static binary instrumentation platform (VEE 2014)
  • Light-weight Bounds Checking (CGO 2012)  
  • Riccardo PelizziPh.D.2016Google 
  • Securing Web Applications (Stony Brook University 2016)
  • Efficient JavaScript Confinement (ACSAC 2015)
  • Web Apps for Non-Programmers (NSPW 2015)
  • Reflected XSS Filter (ASIACCS 2012)
  • CSRF Defense for Web 2.0 (ACSAC 2011)  
  • Rohit ChouhanM.S.2023 
  • Safe Binary Instrumentation (USENIX Security 2023)  
  • Rohit AichM.S.2021 
  • eAudit (IEEE S&P 2024)
  • Efficient Audit Data Collection for Linux (Stony Brook University 2021)  
  • Ankitha KunduruM.S.2020SDE II
    Amazon 
     
    Jayesh RanjanM.S.2019Oracle  
    Junao WangM.S.2019MTS III
    Cohesity 
  • Log Reduction (USENIX Security 2018)
  • Attack campaign reconstruction (USENIX Security 2017)  
  • Maggie ZhouB.S.2020Morgan Stanley 
  • APT Detection with Reduced Audit Logs (Stony Brook University 2021)  
  • Vineeth Polam ReddyM.S.2021Software Engineer
    Verizon Media 
     
    Wei XuPh.D.2009Staff Engineer
    VMWare 
  • MCC Project Summary (Wiley Publishing 2007)
  • Runtime Non-interference enforcement (ICICS 2006)
  • Privacy for Composite Web Services (ICWS 2006)
  • P3P and MCC (SKM 2006)
  • Fast taint-tracking (USENIX Security 2006)
  • Privacy-preserving web services (WWW 2005)
  • Trustworthy Personal Information Assistants (KIMAS 2005)
  • Memory-safety for C (FSE 2004)  
  • Zhenkai LiangPh.D.2006Associate Professor
    National University of Singapore 
  • Isolated execution (TISSEC 2009)
  • Secure software installation (DIMVA 2008)
  • MCC Project Summary (Wiley Publishing 2007)
  • Signature generation from IDS models (ACSAC 2005)
  • Signature generation for Buffer Overflows (CCS 2005)
  • Automated signature generation (USENIX 2005)
  • Safe Execution Environments (NDSS 2005)
  • Alcatraz/Logical Isolation (ACSAC 2003)
  • Towards Secure Installation (LISA 2002)  
  • Weiqing SunPh.D.2008Assistant Professor
    University of Toledo 
  • Isolated execution (TISSEC 2009)
  • Secure software installation (DIMVA 2008)
  • Logically isolated networks (CSET 2008)
  • Proactive malware defense (IEEE S&P 2008)
  • MCC Project Summary (Wiley Publishing 2007)
  • Virtual Network Lab (CISSE 2005)
  • Safe Execution Environments (NDSS 2005)  
  • Ian BuitenkantM.S.2020Software Engineer
    Applied Vision 
     
    Shrikant JagtapM.S.2020Software Engineer
    Bloomberg 
     
    Hsiang Yu-ChengM.S.2018Software Engineer
    Amazon Web Services 
     
    Tung TranPh.D.2018 
  • Efficient JavaScript Confinement (ACSAC 2015)  
  • Lorenzo CavallaroPh.D.2008Assistant Professor
    Royal Holloway 
  • Taint-Enhanced Anomaly Detection (ICISS 2011)
  • Fast Bounds Checker (ASIACCS 2010)
  • Anomalous Taint Detection (RAID 2008)
  • Anti-taint-analysis techniques (DIMVA 2008)
  • PhD Dissertation by Cavallaro (Stony Brook University 2008)  
  • Daniel ScanteianuB.S.2018Software Engineer
    Bloomberg 
     
    Ryan WebberB.S.2018Security Engineer
    Morgan Stanley 
     
    Alok TongaonkarPh.D.2009Data Scientist Director
    Symantec 
  • Fast packet matching automata (IEEE TIFS 2016)
  • Fast Packet Classification (Stony Brook University 2009)
  • Fast Packet Matching (ACNS 2009)
  • Compilation for Fast Packet-Matching (LISA 2008)
  • Firewall policy inference (LISA 2007)
  • MCC Project Summary (Wiley Publishing 2007)  
  • Prateek SaxenaM.S.2007Assistant Professor
    National University of Singapore 
  • Untrusted plug-in containment (TR 2008)
  • Anti-taint-analysis techniques (DIMVA 2008)
  • Fast taint-tracking on binaries (CGO 2008)
  • Static Binary Analysis (Stony Brook University 2007)  
  • Nishant SunejaM.S.2013Software Engineer
    Amazon Web Services 
     
    Sumati PriyaM.S.2011Software Engineer
    Google 
     
    Sreenaath VasudevanM.S.2009Software Engineer
    Riverbed 
  • Fast Packet Matching (ACNS 2009)
  • Compilation for Fast Packet-Matching (LISA 2008)  
  • Ashish MisraM.S.2010Software Engineer
    Symantec 
  • Light-weight Bounds Checking (CGO 2012)  
  • Bhuvan MitalM.S.2010Software Engineer
    Cisco 
  • Usable information flow policies (SACMAT 2014)  
  • Syed Zahed Khurasani M.S.2013Systems Software Engineer
    Facebook 
     
    Yarik MarkovM.S.2013Software Engineer
    Facebook 
     
    Manish MehraM.S.2011Software Engineer
    Juniper Networks 
     
    Daniel DuVarneyPh.D.2002Reactive Systems 
  • MCC Project Summary (Wiley Publishing 2007)
  • Runtime Non-interference enforcement (ICICS 2006)
  • Relative-address Randomization (USENIX Security 2005)
  • Automated signature generation (USENIX 2005)
  • Predators and Viruses (ACSAC 2004)
  • Memory-safety for C (FSE 2004)
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Security Extension for ELF Binaries (NSPW 2003)
  • Address Obfuscation (ASR) (USENIX Security 2003)  
  • Anupama ChandwaniM.S.2010MTS
    VMWare 
     
    Varun PuranikM.S.2008SDE
    Microsoft 
  • Untrusted plug-in containment (TR 2008)
  • Fast taint-tracking on binaries (CGO 2008)  
  • Alireza SaberiM.S.2012UT Dallas  
    Jitendra Pratap SinghM.S.2012MTS
    Pure Storage 
     
    Michael CorleyM.S.2012Software Engineer
    Qualcomm 
     
    Paul TalamoM.S.2012CEO
    Fast Orientation Inc. 
     
    Abhiraj ButalaM.S.2010MTS
    Riverbed 
     
    Arun PonniahM.S.2010SDE
    Amazon 
     
    Arvind AyyangarM.S.2010Software Engineer
    Cisco 
     
    Ganesh SangleM.S.2010MTS
    Riverbed 
     
    Prachi DeshmukhM.S.2010MTS
    NetApps 
     
    Praveen KrishnamoorthyM.S.2011SDE
    LSI Logic 
     
    Diptikalyan SahaPh.D.2007Research Staff Member
    IBM India Research Labs 
  • MCC Project Summary (Wiley Publishing 2007)
  • Push-down system verification (FORTE 2003)  
  • Jamal IrvingM.S.2011Software Engineer
    Tumblr 
     
    Alphonse KenzleyM.S.2011  
    Prakhar SharmaM.S.2009Technical Yahoo
    Yahoo 
     
    Samik BasuPh.D.2003Assistant Professor
    Iowa State University 
  • MCC Project Summary (Wiley Publishing 2007)
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Push-down system verification (FORTE 2003)  
  • Chetan ParampalliM.S.2006Software Engineer
    Google 
  • Persistent interposition attacks (ASIACCS 2008)  
  • Kumar KrishnaM.S.2005Senior Software Engineer
    PayPal 
  • Logically isolated networks (CSET 2008)
  • MCC Project Summary (Wiley Publishing 2007)
  • Virtual Network Lab (CISSE 2005)  
  • Mithun IyerM.S.2009Software Engineer
    Arista Networks 
  • Untrusted plug-in containment (TR 2008)  
  • Tejas KarandikarM.S.2007SDE2
    Microsoft 
  • Proactive malware defense (IEEE S&P 2008)  
  • Gaurav NaigaonkarM.S.2010Financial Software Developer
    Bloomberg 
     
    Abhishek ChaturvediM.S.2005Senior MTS
    VMWare 
  • MCC Project Summary (Wiley Publishing 2007)
  • Dataflow Anomaly Detection (IEEE S&P 2006)  
  • Pinkesh ZaveriM.S.2007Senior Software Engineer
    VMWare 
     
    Yves YounanPh.D.2008Postdoctoral Researcher
    Katholieke Universiteit Leuven 
  • Fast Bounds Checker (ASIACCS 2010)  
  • Gaurav PoothiaM.S.2006SDE
    Microsoft 
  • Proactive malware defense (IEEE S&P 2008)  
  • Niranjan InamdarM.S.2006Microsoft 
  • Firewall policy inference (LISA 2007)  
  • Srivani NarraM.S.2009  
    Janani NatarajanM.S.2007MTS
    NetApps 
     
    Mayur MahajanM.S.2007Software Engineer
    Brocade 
     
    Rekha DharanipragadaM.S.2007SDE
    Amazon 
     
    Mohammed MehkriM.S.2006Microsoft  
    Vishwas NagarajaM.S.2004Senior Software Engineer
    VMWare 
  • MCC Project Summary (Wiley Publishing 2007)  
  • Shruthi MurthyM.S.2003Engineer
    Google 
  • MCC Project Summary (Wiley Publishing 2007)  
  • Karthik Sreenivasa MurthyM.S.2006Senior MTS
    VMware 
  • MCC Project Summary (Wiley Publishing 2007)  
  • Varun KattaM.S.2006Software Engineer
    Katango 
  • Logically isolated networks (CSET 2008)  
  • Manish NairM.S.2007Bloomberg  
    Manuel RiveraM.S.2007  
    Munyaradzi ChiwaraM.S.2007Analyst
    Goldman Sachs 
     
    Prem UppuluriPh.D.2002Radford University 
  • MCC Project Summary (Wiley Publishing 2007)
  • Experience with Specification-Based IDS (RAID 2001)
  • Survivable Systems (DISCEX 2000)
  • Synthesizing IDS from Specifications (USENIX Security 1999)  
  • Ajay GuptaPh.D.2003Director, DUCC
    Delhi University 
  • Predators and Viruses (ACSAC 2004)
  • Email anomaly detection (RAID 2003)
  • Specification-based anomaly detection (CCS 2002)  
  • Yogesh ChauhanM.S.2005Software Engineer
    Bloomberg 
  • MCC Project Summary (Wiley Publishing 2007)  
  • Abhishek TiwariM.S.2003Product Manager
    Brocade 
  • Specification-based anomaly detection (CCS 2002)  
  • Pratik RanaM.S.2004Senior Software Engineer
    EMC 
  • Virtual Network Lab (CISSE 2005)  
  • Milan ManavatM.S.2006Bloomberg  
    Sandhya MenonM.S.2006Technical Analyst
    Goldman Sachs 
     
    Dinakar DhurjatiM.S.2002DoCoMo Labs 
  • Automata models for IDS (IEEE S&P 2001)  
  • Mugdha BendreM.S.2001Information Security Engineer
    Google 
  • Automata models for IDS (IEEE S&P 2001)  
  • Divya PadmanabhanM.S.2004MTS
    Citigroup 
  • MCC Project Summary (Wiley Publishing 2007)  
  • Mohan ChannaM.S.2004Bloomberg 
  • MCC Project Summary (Wiley Publishing 2007)  
  • Joy DuttaM.S.2005Senior Elastician
    Elastica 
     
    James FrulloM.S.2003Manager & Senior Software Engineer
    Bloomberg 
  • Specification-based anomaly detection (CCS 2002)  
  • Ram PeriM.S.2003VP
    JP Morgan 
  • Policies for mobile code (NSPW 2002)  
  • Tapan KamatM.S.2003CitiGroup 
  • Towards Secure Installation (LISA 2002)  
  • Tianning LiM.S.2003AVP
    Merrill Lynch 
  • Virtual Network Lab (CISSE 2005)  
  • Tushar ShanbhagM.S.2000Product Management leader
    Vmware 
  • Specification-based anomaly detection (CCS 2002)
  • Survivable Systems (DISCEX 2000)
  • Fast Network IDS (CCS 1999)  
  • Xu LiM.S.2001Oracle  
    Henglin YangM.S.2002Director of R&D
    FalconStor 
  • Specification-based anomaly detection (CCS 2002)  
  • Sofia TsipaM.S.2002 
  • Towards Secure Installation (LISA 2002)  
  • Sheng ZhouM.S.2002Bloomberg 
  • Specification-based anomaly detection (CCS 2002)  
  • Seung LeeM.S.2003  
    Gaurav SehgalM.S.2001Technical Lead
    Yahoo 
     
    Pradeep BollineniM.S.1999Principal MTS
    Oracle 
  • Automata models for IDS (IEEE S&P 2001)  
  • Kapil JainM.S.1999Juniper Networks 
  • User-level system-call interposition (NDSS 2000)  
  • Aashish GuptaM.S.2002Founder/CEO
    Yellowleg.com 
     
    Shridhar BaluM.S.2002Application development officer
    State Street 
     
    Yong CaiM.S.1997EMC 
  • Specification-based IDS (NISSC 1998)  
  • Amrita DeshmukhM.S.1999Freescale Semiconductor  
    Guang YangM.S.1997Ericcson 
  • Fast Network IDS (CCS 1999)  
  • Ravi VankamamidiM.S.1998Co-founder
    S3 Edge 
     

    Home Contact NSI Computer Science Stony Brook University

    Copyright © 1999-2013 Secure Systems Laboratory, Stony Brook University. All rights reserved.