1. S. Malladi. Towards a completeness result for model-checking of modern-day security protocols, Presented at HotSpot (affiliated to ETAPS), London, UK, March 2015. 2. S. Lakkaraju, S. Malladi, and N. Spear Analyzing workflows in business processes for obstructions due to authorization policies, Hawaiian International Conference on System Sciences (HICSS), Jan 2012. 3. S. Malladi, L. Drews. How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR, Accepted for presentation at CryptoForma workshop (affiliated to Formal Methods conference), Limerick, Ireland, June 2011. 4. S. Malladi. Soundness of removing cancellation identities in protocol analysis under Exclusive-OR, Proc. TOSCA-1 (Theory of Security and Applications), ETAPS (European Joint Conference on Theory and Practice of Software) 2011, April 2011. 5. S. Malladi. Protocol independence through disjoint encryption under Exclusive-OR, In Proc. Workshop on Foundations of Computer Security and Privacy (FCS-PrivMod), March 2010. 6. S. Malladi, P. Lafourcade. How to prevent type-flaw attacks on security protocols under algebraic properties, In Proc. Workshop on Security and Rewriting Techniques (affiliated to CSF Symposium), Port Jefferson, NY, July 2009. 7. S. Malladi, B. Bruhadeshwar, K. Kothapalli. Automatic analysis of distance bounding protocols. In Proc. Workshop on Foundations of Computer Security (affiliated to LICS Symposium), Los Angeles, CA, August 2009. 8. S. Malladi, G. S. Hura. What is the best way to prove a cryptographic protocol correct? (Position paper) In Proc. Workshop on Security in Systems and Networks (affiliated to IPDPS), Miami, Florida, April 2008. 9. S. Malladi, O. El-Gayar, K. Streff. Experiences and lessons learned in the design and implementation of an Information Assurance curriculum. In Proc. 8th Annual IEEE SMC Information Assurance Workshop (IAW 2007), United States Military Academy, West Point, NY, June 2007. 10. S. Malladi. Web site hacking project and Web security laboratory exercises to exploit Server-side (command injection) and Client-side scripting (XSS) vulnerabilities. Online instructor support material for Computer Security: Principles and Practice by William Stallings and Lawrie Brown, Prentice Hall publishers, July 2007. 11. S. Malladi, S. Rosenberg. Extending constraint solving for cryptographic protocol analysis with non-standard attacker inference rules. In Proc. International Conference on Communication, Network and Information Security (CNIS 2005), Phoenix, AZ, Nov 2005. 12. S. Malladi, Formal analysis and verification of password protocols, PhD Dissertation (Subsumes papers below), 2004. 13. S. Malladi, J. Alves-Foss. How to prevent type-flaw guessing attacks on password protocols. In Proc. Workshop on Foundations of Computer Security (FCS03), Canada, June 2003. 14. R. Corin, S. Malladi, J. Alves-Foss, S. Etalle. Guess what? Here is a new tool that finds some new guessing attacks. In R. Gorrieri and R. Lucchi, editors, IFIP WG 1.7 and ACM SIGPLAN, Workshop in the Issues of Theory of Security (WITS 03), Warsaw, April 2003. 15. S. Malladi, J. Alves-Foss, S. Malladi. What are multi-protocol guessing attacks and how to prevent them. In Proc. 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Enterprise Security, (WETICE 2002), IEEE Computer Society, June 2002, Pittsburgh, PA. ISBN 0-7695-1748-X.