default search action
Karthick Jayaraman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c15]Sarah McClure, Zeke Medley, Deepak Bansal, Karthick Jayaraman, Ashok Narayanan, Jitendra Padhye, Sylvia Ratnasamy, Anees Shaikh, Rishabh Tewari:
Invisinets: Removing Networking from Cloud Networks. NSDI 2023: 479-496 - [c14]Alan Tang, Ryan Beckett, Steven Benaloh, Karthick Jayaraman, Tejas Patil, Todd D. Millstein, George Varghese:
Lightyear: Using Modularity to Scale BGP Control Plane Verification. SIGCOMM 2023: 94-107 - 2022
- [i2]Alan Tang, Ryan Beckett, Karthick Jayaraman, Todd D. Millstein, George Varghese:
LIGHTYEAR: Using Modularity to Scale BGP Control Plane Verification. CoRR abs/2204.09635 (2022) - 2021
- [c13]Xieyang Xu, Ryan Beckett, Karthick Jayaraman, Ratul Mahajan, David Walker:
Test coverage metrics for the network. SIGCOMM 2021: 775-787 - 2020
- [c12]Siva Kesava Reddy K., Alan Tang, Ryan Beckett, Karthick Jayaraman, Todd D. Millstein, Yuval Tamir, George Varghese:
Finding Network Misconfigurations by Automatic Template Inference. NSDI 2020: 999-1013
2010 – 2019
- 2019
- [c11]Karthick Jayaraman, Nikolaj S. Bjørner, Jitu Padhye, Amar Agrawal, Ashish Bhargava, Paul-Andre C. Bissonnette, Shane Foster, Andrew Helwer, Mark Kasten, Ivan Lee, Anup Namdhari, Haseeb Niaz, Aniruddha Parkhi, Hanukumar Pinnamraju, Adrian Power, Neha Milind Raje, Parag Sharma:
Validating datacenters at scale. SIGCOMM 2019: 200-213 - 2015
- [c10]Nikolaj S. Bjørner, Karthick Jayaraman:
Checking Cloud Contracts in Microsoft Azure. ICDCIT 2015: 21-32 - [c9]Nuno P. Lopes, Nikolaj S. Bjørner, Patrice Godefroid, Karthick Jayaraman, George Varghese:
Checking Beliefs in Dynamic Networks. NSDI 2015: 499-512 - 2014
- [j2]Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older:
Banking on interoperability: Secure, interoperable credential management. Comput. Networks 67: 235-251 (2014) - 2013
- [j1]Karthick Jayaraman, Mahesh V. Tripunitara, Vijay Ganesh, Martin C. Rinard, Steve J. Chapin:
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies. ACM Trans. Inf. Syst. Secur. 15(4): 18:1-18:28 (2013) - 2011
- [c8]Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripunitara, Martin C. Rinard, Steve J. Chapin:
Automatic error finding in access-control policies. CCS 2011: 163-174 - [c7]Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu:
Re-designing the Web's Access Control System - (Extended Abstract). DBSec 2011: 4-11 - [c6]Wenliang Du, Karthick Jayaraman, Xi Tan, Tongbo Luo, Steve J. Chapin:
Position paper: why are there so many vulnerabilities in web applications? NSPW 2011: 83-94 - [i1]Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripunitara, Martin C. Rinard, Steve J. Chapin:
ARBAC Policy for a Large Multi-National Bank. CoRR abs/1110.2849 (2011) - 2010
- [c5]Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin:
Enforcing Request Integrity in Web Applications. DBSec 2010: 225-240 - [c4]Karthick Jayaraman, Wenliang Du, Balamurugan Rajagopalan, Steve J. Chapin:
ESCUDO: A Fine-Grained Protection Model for Web Browsers. ICDCS 2010: 231-240 - [c3]Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older:
Credentials Management for High-Value Transactions. MMM-ACNS 2010: 169-182
2000 – 2009
- 2009
- [c2]Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Michael D. Ernst:
Automatic creation of SQL Injection and cross-site scripting attacks. ICSE 2009: 199-209 - [c1]Karthick Jayaraman, David Harvison, Vijay Ganesh, Adam Kiezun:
jFuzz: A Concolic Whitebox Fuzzer for Java. NASA Formal Methods 2009: 121-125
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint