Publications list - Saint Leo University

advertisement
1. S. Malladi.
Towards a completeness result for model-checking of modern-day
security protocols, Presented at HotSpot (affiliated to ETAPS), London, UK, March 2015.
2. S. Lakkaraju, S. Malladi, and N. Spear Analyzing workflows in business processes for
obstructions due to authorization policies, Hawaiian International Conference on System
Sciences (HICSS), Jan 2012.
3. S. Malladi, L. Drews. How to prevent type-flaw and multi-protocol attacks on security
protocols under Exclusive-OR, Accepted for presentation at CryptoForma workshop
(affiliated to Formal Methods conference), Limerick, Ireland, June 2011.
4. S. Malladi.
Soundness of removing cancellation identities in protocol analysis under
Exclusive-OR, Proc. TOSCA-1 (Theory of Security and Applications), ETAPS (European
Joint Conference on Theory and Practice of Software) 2011, April 2011.
5. S. Malladi.
Protocol independence through disjoint encryption under Exclusive-OR,
In Proc. Workshop on Foundations of Computer Security and Privacy (FCS-PrivMod),
March 2010.
6. S. Malladi, P. Lafourcade. How to prevent type-flaw attacks on security protocols
under algebraic properties, In Proc. Workshop on Security and Rewriting Techniques
(affiliated to CSF Symposium), Port Jefferson, NY, July 2009.
7. S. Malladi, B. Bruhadeshwar, K. Kothapalli. Automatic analysis of distance bounding
protocols. In Proc.
Workshop on Foundations of Computer Security (affiliated to LICS
Symposium), Los Angeles, CA, August 2009.
8. S. Malladi, G. S. Hura.
What is the best way to prove a cryptographic protocol
correct? (Position paper) In Proc. Workshop on Security in Systems and Networks
(affiliated to IPDPS), Miami, Florida, April 2008.
9. S. Malladi, O. El-Gayar, K. Streff. Experiences and lessons learned in
the design
and implementation of an Information Assurance curriculum. In Proc.
8th Annual
IEEE SMC Information Assurance Workshop (IAW 2007), United States Military
Academy, West Point, NY, June 2007.
10. S. Malladi. Web site hacking project and Web security laboratory exercises to exploit
Server-side (command injection) and Client-side
scripting (XSS) vulnerabilities.
Online instructor support material for Computer Security: Principles and Practice by
William Stallings and Lawrie Brown, Prentice Hall publishers, July 2007.
11. S. Malladi, S. Rosenberg. Extending constraint solving for cryptographic protocol
analysis with non-standard attacker inference rules. In Proc.
International
Conference on Communication, Network and Information Security (CNIS 2005),
Phoenix, AZ, Nov 2005.
12. S. Malladi, Formal analysis and verification of password protocols, PhD Dissertation
(Subsumes papers below), 2004.
13. S. Malladi, J. Alves-Foss. How to prevent type-flaw guessing attacks on password
protocols. In Proc. Workshop on Foundations of Computer Security (FCS03), Canada,
June 2003.
14. R. Corin, S. Malladi, J. Alves-Foss, S. Etalle. Guess what? Here is a new tool that finds
some new guessing attacks. In R. Gorrieri and R. Lucchi, editors, IFIP WG 1.7 and ACM
SIGPLAN, Workshop in the Issues of Theory of Security (WITS 03), Warsaw,
April
2003.
15. S. Malladi, J. Alves-Foss, S. Malladi. What are multi-protocol guessing attacks and how
to prevent them. In Proc. 11th IEEE International Workshops on Enabling Technologies:
Infrastructure for Collaborative Enterprises, Enterprise Security, (WETICE 2002),
IEEE Computer Society, June 2002, Pittsburgh, PA. ISBN 0-7695-1748-X.
Download