Stony Brook University Logo Department of Computer Science Stony Brook Search Button
Secure Systems Lab

Alumni

NameDegreeGraduation
Year
EmploymentPublications at SSL
Wai-Kit SzePh.D.2016Renaissance Technologies 
  • Hardening OpenStack Platform (ASIACCS 2016)
  • Malware defense for Windows (ACSAC 2015)
  • Usable information flow policies (SACMAT 2014)
  • Integrity protection for Linux (SACMAT 2014)
  • Portable Integrity Protection (ACSAC 2013)  
  • V.N. VenkatakrishnanPh.D.2004Professor
    University of Illinois at Chicago 
  • Isolated execution (TISSEC 2009)
  • Secure software installation (DIMVA 2008)
  • Runtime Non-interference enforcement (ICICS 2006)
  • P3P and MCC (SKM 2006)
  • Privacy for Composite Web Services (ICWS 2006)
  • Privacy-preserving web services (WWW 2005)
  • Trustworthy Personal Information Assistants (KIMAS 2005)
  • Safe Execution Environments (NDSS 2005)
  • Alcatraz/Logical Isolation (ACSAC 2003)
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Security Extension for ELF Binaries (NSPW 2003)
  • Towards Secure Installation (LISA 2002)
  • Policies for mobile code (NSPW 2002)  
  • Riccardo PelizziPh.D.2016Google 
  • Efficient JavaScript Confinement (ACSAC 2015)
  • Web Apps for Non-Programmers (NSPW 2015)
  • Reflected XSS Filter (ASIACCS 2012)
  • CSRF Defense for Web 2.0 (ACSAC 2011)  
  • Niranjan HasabnisPh.D.2015Intel Research 
  • Symbolic Execution for Instruction Semantics Extraction (FSE 2016)
  • Learning to lift binaries to IR (ASPLOS 2016)
  • Automating assembly to IR translation (AMAS-BT 2015)
  • Testing code generators (CGO 2015)
  • Static binary instrumentation platform (VEE 2014)
  • Light-weight Bounds Checking (CGO 2012)  
  • Mingwei ZhangPh.D.2015Intel Research 
  • Code and Control-flow integrity (ACSAC 2015)
  • A Principled Approach for ROP Defense (ACSAC 2015)
  • Policy Enforcement for Containers (CloudCom 2015)
  • Static binary instrumentation platform (VEE 2014)
  • CFI for COTS Binaries (USENIX Security 2013)  
  • Zhenkai LiangPh.D.2006Associate Professor
    National University of Singapore 
  • Isolated execution (TISSEC 2009)
  • Secure software installation (DIMVA 2008)
  • Signature generation from IDS models (ACSAC 2005)
  • Signature generation for Buffer Overflows (CCS 2005)
  • Automated signature generation (USENIX 2005)
  • Safe Execution Environments (NDSS 2005)
  • Alcatraz/Logical Isolation (ACSAC 2003)
  • Towards Secure Installation (LISA 2002)  
  • Weiqing SunPh.D.2008Assistant Professor
    University of Toledo 
  • Isolated execution (TISSEC 2009)
  • Secure software installation (DIMVA 2008)
  • Logically isolated networks (CSET 2008)
  • Proactive malware defense (IEEE S&P 2008)
  • Virtual Network Lab (CISSE 2005)
  • Safe Execution Environments (NDSS 2005)  
  • Wei XuPh.D.2009Staff Engineer
    VMWare 
  • Runtime Non-interference enforcement (ICICS 2006)
  • P3P and MCC (SKM 2006)
  • Privacy for Composite Web Services (ICWS 2006)
  • Fast taint-tracking (USENIX Security 2006)
  • Privacy-preserving web services (WWW 2005)
  • Trustworthy Personal Information Assistants (KIMAS 2005)
  • Memory-safety for C (FSE 2004)  
  • Lorenzo CavallaroPh.D.2008Assistant Professor
    Royal Holloway 
  • Taint-Enhanced Anomaly Detection (ICISS 2011)
  • Fast Bounds Checker (ASIACCS 2010)
  • Anomalous Taint Detection (RAID 2008)
  • Anti-taint-analysis techniques (DIMVA 2008)
  • PhD Dissertation by Cavallaro ( 2008)  
  • Sandeep BhatkarPh.D.2007Technical Director
    Symantec Research 
  • Data Space Randomization (DIMVA 2008)
  • Fast taint-tracking (USENIX Security 2006)
  • Dataflow Anomaly Detection (IEEE S&P 2006)
  • Relative-address Randomization (USENIX Security 2005)
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Security Extension for ELF Binaries (NSPW 2003)
  • Address Obfuscation (ASR) (USENIX Security 2003)  
  • Prateek SaxenaM.S.2007Assistant Professor
    National University of Singapore 
  • Untrusted plug-in containment (TR 2008)
  • Anti-taint-analysis techniques (DIMVA 2008)
  • Fast taint-tracking on binaries (CGO 2008)
  • Static Binary Analysis ( 2007)  
  • Alok TongaonkarPh.D.2009Data Scientist Director
    Symantec 
  • Fast packet matching automata (IEEE TIFS 2016)
  • Fast Packet Classification ( 2009)
  • Fast Packet Matching (ACNS 2009)
  • Compilation for Fast Packet-Matching (LISA 2008)
  • Firewall policy inference (LISA 2007)  
  • Sumati PriyaM.S.2010Software Engineer
    Google 
     
    Anupama ChandwaniM.S.2010MTS
    VMWare 
     
    Sreenaath VasudevanM.S.2009Software Engineer
    Riverbed 
  • Fast Packet Matching (ACNS 2009)
  • Compilation for Fast Packet-Matching (LISA 2008)  
  • Chetan ParampalliM.S.2006Software Engineer
    Google 
  • Persistent interposition attacks (ASIACCS 2008)  
  • Ashish MisraM.S.2010Software Engineer
    Symantec 
  • Light-weight Bounds Checking (CGO 2012)  
  • Samik BasuPh.D.2003Assistant Professor
    Iowa State University 
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Push-down system verification (FORTE 2003)  
  • Bhuvan MitalM.S.2010Software Engineer
    Cisco 
  • Usable information flow policies (SACMAT 2014)  
  • Manish MehraM.S.2010Software Engineer
    Juniper Networks 
     
    Ganesh SangleM.S.2010MTS
    Riverbed 
     
    Arun PonniahM.S.2010SDE
    Amazon 
     
    Prachi DeshmukhM.S.2010MTS
    NetApps 
     
    Abhiraj ButalaM.S.2010MTS
    Riverbed 
     
    Varun PuranikM.S.2008SDE
    Microsoft 
  • Untrusted plug-in containment (TR 2008)
  • Fast taint-tracking on binaries (CGO 2008)  
  • Alireza SaberiM.S.2012UT Dallas  
    Pinkesh ZaveriM.S.2007Senior Software Engineer
    VMWare 
     
    Praveen KrishnamoorthyM.S.2010SDE
    LSI Logic 
     
    Arvind AyyangarM.S.2010Software Engineer
    Cisco 
     
    Daniel DuVarneyPh.D.2002Reactive Systems 
  • Runtime Non-interference enforcement (ICICS 2006)
  • Relative-address Randomization (USENIX Security 2005)
  • Automated signature generation (USENIX 2005)
  • Predators and Viruses (ACSAC 2004)
  • Memory-safety for C (FSE 2004)
  • Model-Carrying Code (MCC) (SOSP 2003)
  • Security Extension for ELF Binaries (NSPW 2003)
  • Address Obfuscation (ASR) (USENIX Security 2003)  
  • Abhishek ChaturvediM.S.2005Senior MTS
    VMWare 
  • Dataflow Anomaly Detection (IEEE S&P 2006)  
  • Diptikalyan SahaPh.D.2007Research Staff Member
    IBM India Research Labs 
  • Push-down system verification (FORTE 2003)  
  • Prakhar SharmaM.S.2009Technical Yahoo
    Yahoo 
     
    Mithun IyerM.S.2009Software Engineer
    Arista Networks 
  • Untrusted plug-in containment (TR 2008)  
  • Gaurav NaigaonkarM.S.2010Financial Software Developer
    Bloomberg 
     
    Alphonse KenzleyM.S.2010  
    Tejas KarandikarM.S.2007SDE2
    Microsoft 
  • Proactive malware defense (IEEE S&P 2008)  
  • Kumar KrishnaM.S.2005Senior Software Engineer
    PayPal 
  • Logically isolated networks (CSET 2008)
  • Virtual Network Lab (CISSE 2005)  
  • Shruthi MurthyM.S.2003Engineer
    Google 
     
    Rekha DharanipragadaM.S.2007SDE
    Amazon 
     
    Mayur MahajanM.S.2007Software Engineer
    Brocade 
     
    Janani NatarajanM.S.2007MTS
    NetApps 
     
    Yves YounanPh.D.2008Postdoctoral Researcher
    Katholieke Universiteit Leuven 
  • Fast Bounds Checker (ASIACCS 2010)  
  • Srivani NarraM.S.2009  
    Vishwas NagarajaM.S.2004Senior Software Engineer
    VMWare 
     
    Gaurav PoothiaM.S.2006SDE
    Microsoft 
  • Proactive malware defense (IEEE S&P 2008)  
  • Niranjan InamdarM.S.2006Microsoft 
  • Firewall policy inference (LISA 2007)  
  • Mugdha BendreM.S.2001Information Security Engineer
    Google 
  • Automata models for IDS (IEEE S&P 2001)  
  • Dinakar DhurjatiM.S.2002DoCoMo Labs 
  • Automata models for IDS (IEEE S&P 2001)  
  • Mohammed MehkriM.S.2006Microsoft  
    Varun KattaM.S.2006Software Engineer
    Katango 
  • Logically isolated networks (CSET 2008)  
  • Manuel RiveraM.S.2007  
    Manish NairM.S.2007Bloomberg  
    Munyaradzi ChiwaraM.S.2007Analyst
    Goldman Sachs 
     
    Pratik RanaM.S.2004Senior Software Engineer
    EMC 
  • Virtual Network Lab (CISSE 2005)  
  • Abhishek TiwariM.S.2003Product Manager
    Brocade 
  • Specification-based anomaly detection (CCS 2002)  
  • Ajay GuptaPh.D.2003Director, DUCC
    Delhi University 
  • Predators and Viruses (ACSAC 2004)
  • Email anomaly detection (RAID 2003)
  • Specification-based anomaly detection (CCS 2002)  
  • Sandhya MenonM.S.2006Technical Analyst
    Goldman Sachs 
     
    Milan ManavatM.S.2006Bloomberg  
    Karthik Sreenivasa MurthyM.S.2006Senior MTS
    VMware 
     
    Prem UppuluriPh.D.2002 Radford University 
  • Experience with Specification-Based IDS (RAID 2001)
  • Survivable Systems (DISCEX 2000)
  • Synthesizing IDS from Specifications (USENIX Security 1999)  
  • Joy DuttaM.S.2005Senior Elastician
    Elastica 
     
    Yogesh ChauhanM.S.2005Software Engineer
    Bloomberg 
     
    Tapan KamatM.S.2003CitiGroup 
  • Towards Secure Installation (LISA 2002)  
  • Ram PeriM.S.2003VP
    JP Morgan 
  • Policies for mobile code (NSPW 2002)  
  • James FrulloM.S.2003Manager & Senior Software Engineer
    Bloomberg 
  • Specification-based anomaly detection (CCS 2002)  
  • Tianning LiM.S.2003AVP
    Merrill Lynch 
  • Virtual Network Lab (CISSE 2005)  
  • Mohan ChannaM.S.2004Bloomberg  
    Divya PadmanabhanM.S.2004MTS
    Citigroup 
     
    Tushar ShanbhagM.S.2000Product Management leader
    Vmware 
  • Specification-based anomaly detection (CCS 2002)
  • Survivable Systems (DISCEX 2000)
  • Fast Network IDS (CCS 1999)  
  • Sofia TsipaM.S.2002 
  • Towards Secure Installation (LISA 2002)  
  • Sheng ZhouM.S.2002Bloomberg 
  • Specification-based anomaly detection (CCS 2002)  
  • Henglin YangM.S.2002Director of R&D
    FalconStor 
  • Specification-based anomaly detection (CCS 2002)  
  • Seung LeeM.S.2003  
    Kapil JainM.S.1999Juniper Networks 
  • User-level system-call interposition (NDSS 2000)  
  • Gaurav SehgalM.S.2001Technical Lead
    Yahoo 
     
    Shridhar BaluM.S.2002Application development officer
    State Street 
     
    Aashish GuptaM.S.2002Founder/CEO
    Yellowleg.com 
     
    Xu LiM.S.2001Oracle  
    Pradeep BollineniM.S.1999Principal MTS
    Oracle 
  • Automata models for IDS (IEEE S&P 2001)  
  • Yong CaiM.S.1997EMC 
  • Specification-based IDS (NISSC 1998)  
  • Amrita DeshmukhM.S.1999Freescale Semiconductor  
    Guang YangM.S.1997Ericcson 
  • Fast Network IDS (CCS 1999)  
  • Ravi VankamamidiM.S.1998Co-founder
    S3 Edge 
     

    Home Contact NSI Computer Science Stony Brook University

    Copyright © 1999-2013 Secure Systems Laboratory, Stony Brook University. All rights reserved.