Publications (by year)


Note: Within the domain of computer security, the following conferences are considered top-tier venues: the (1) IEEE Symposium on Security & Privacy (S&P), (2) the USENIX Security Symposium (USENIX), (3) the ACM Conference on Computer and Communications Security (CCS), and, (4) the ISOC Network and Distributed Systems Security Symposium (NDSS). Further, the ACM Transactions on Privacy & Security (TOPS) and the ACM Transactions on Cyber-physical Systems (TCPS) are premier journals in security and cyber-physical systems respectively. Finally, my work has also appeared in conferences such as ACM CODASPY and ACM WiSec. Although these conferences have higher acceptance rates (around 30%), they have consistently attracted top quality researchers. The names of students advised by me are underlined.

Google Scholar: https://scholar.google.com/citations?user=Al2MvLoAAAAJ&hl=en

View [by type : by year]

2025

[1]P. Mandal and A. Nadkarni, “‘We can’t change it overnight’: Understanding Industry Perspectives on IoT Product Security Compliance and Certification,” in Proceedings of the 2025 IEEE Symposium on Security and Privacy (S&P 2025), 2025. To appear. descriptionPDF

Bibtex

@inproceedings{mn25,
  author = {Mandal, Prianka and Nadkarni, Adwait},
  title = {{“We can’t change it overnight”: Understanding Industry Perspectives on IoT Product Security Compliance and Certification}},
  booktitle = {Proceedings of the 2025 IEEE Symposium on Security and Privacy (S&P 2025)},
  year = {2025},
  month = may,
  note = {To appear},
  pdf = {/downloads/mandal-oakland25.pdf}
}

2024

[1]Y. Xiao, A. Nadkarni, and X. Liao, “Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of Materials,” in Proceedings of the 2024 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED 2024), 2024. To appear. descriptionPDF

Bibtex

@inproceedings{xnl24,
  author = {Xiao, Yue and Nadkarni, Adwait and Liao, Xiaojing},
  title = {{Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of Materials}},
  booktitle = {Proceedings of the 2024 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED 2024)},
  year = {2024},
  month = oct,
  pdf = {},
  note = {To appear}
}

[2]P. Mandal, A. S. Ami, V. Olaiya, S. H. Razmjo, and A. Nadkarni, “‘Belt and suspenders’ or ‘just red tape’?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification,” in Proceedings of the 2024 USENIX Security Symposium (USENIX), 2024. descriptionPDF

Bibtex

@inproceedings{mao+24,
  author = {Mandal, Prianka and Ami, Amit Seal and Olaiya, Victor and Razmjo, Sayyed Hadi and Nadkarni, Adwait},
  title = {{“Belt and suspenders” or “just red tape”?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification}},
  booktitle = {Proceedings of the 2024 USENIX Security Symposium (USENIX)},
  year = {2024},
  month = aug,
  pdf = {/downloads/mandal-sec24.pdf}
}

[3]K. Kafle, K. Jagtap, M. Ahmed-Rengers, T. Jaeger, and A. Nadkarni, “Practical Integrity Validation in the Smart Home with HomeEndorser,” in Proceedings of the 2024 ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2024), 2024. descriptionPDF

Bibtex

@inproceedings{kja+24,
  author = {Kafle, Kaushal and Jagtap, Kirti and Ahmed-Rengers, Mansoor and Jaeger, Trent and Nadkarni, Adwait},
  title = {{Practical Integrity Validation in the Smart Home with HomeEndorser}},
  booktitle = {Proceedings of the 2024 ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2024)},
  year = {2024},
  month = may,
  pdf = {/downloads/kafle-wisec24.pdf}
}

[4]K. Kafle, P. Mandal, K. Singh, B. Andow, and A. Nadkarni, “Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites,” in Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P), 2024. descriptionPDF

Bibtex

@inproceedings{kms+24,
  author = {Kafle, Kaushal and Mandal, Prianka and Singh, Kapil and Andow, Benjamin and Nadkarni, Adwait},
  title = {{Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites}},
  booktitle = {Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P)},
  year = {2024},
  month = may,
  pdf = {/downloads/kafle-oakland24.pdf}
}

[5]A. S. Ami, K. Moran, D. Poshyvanyk, and A. Nadkarni, “‘False negative - that one is going to kill you’ - Understanding Industry Perspectives of Static Analysis based Security Testing,” in Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P), 2024. descriptionPDF emoji_eventsDistinguished Paper Award!

Bibtex

@inproceedings{ampn24,
  author = {Ami, Amit Seal and Moran, Kevin and Poshyvanyk, Denys and Nadkarni, Adwait},
  title = {{"False negative - that one is going to kill you" - Understanding Industry Perspectives of Static Analysis based Security Testing}},
  booktitle = {Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P)},
  year = {2024},
  month = may,
  pdf = {/downloads/ami-oakland24.pdf},
  award = {Distinguished Paper Award!}
}

[6]S. Manandhar, K. Singh, and A. Nadkarni, “Towards Automated Regulation Analysis for Effective Privacy Compliance,” in Proceedings of the 2024 Network and Distributed System Security Symposium (NDSS), 2024. descriptionPDF

Bibtex

@inproceedings{msn24,
  author = {Manandhar, Sunil and Singh, Kapil and Nadkarni, Adwait},
  title = {{Towards Automated Regulation Analysis for Effective Privacy Compliance}},
  booktitle = {Proceedings of the 2024 Network and Distributed System Security Symposium (NDSS)},
  year = {2024},
  month = feb,
  pdf = {/downloads/manandhar-ndss24.pdf}
}

2023

[1]P. Mandal, S. Manandhar, K. Kafle, K. Moran, D. Poshyvanyk, and A. Nadkarni, “Helion: Enabling Natural Testing of Smart Homes,” in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’23), Demonstration Track, San Francisco, 2023. descriptionPDF

Bibtex

@inproceedings{mmk+23,
  author = {Mandal, Prianka and Manandhar, Sunil and Kafle, Kaushal and Moran, Kevin and Poshyvanyk, Denys and Nadkarni, Adwait},
  title = {{Helion: Enabling Natural Testing of Smart Homes}},
  booktitle = {Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE'23), Demonstration Track},
  year = {2023},
  address = {San Francisco},
  month = dec,
  pdf = {/downloads/mandal-fse23-demo.pdf}
}

[2]A. S. Ami et al., “MASC: A Tool for Mutation-based Evaluation of Static Crypto-API Misuse Detectors,” in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’23), Demonstration Track, San Francisco, 2023. descriptionPDF

Bibtex

@inproceedings{asr+23,
  author = {Ami, Amit Seal and Ahmed, Syed Yusuf and Redoy, Radowan Mahmud and Cooper, Nathan and Kafle, Kaushal and Moran, Kevin and Poshyvanyk, Denys and Nadkarni, Adwait},
  title = {{MASC: A Tool for Mutation-based Evaluation of Static Crypto-API Misuse Detectors}},
  booktitle = {Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE'23), Demonstration Track},
  year = {2023},
  address = {San Francisco},
  month = dec,
  pdf = {/downloads/ami-fse23-demo.pdf}
}

2022

[1]X. Jin*, S. Manandhar*, K. Kafle, Z. Lin, and A. Nadkarni, “Understanding IoT Security from a Market-Scale Perspective,” in Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022. *Co-first Authors.. descriptionPDF codeArtifact

Bibtex

@inproceedings{manandhar-ccs22,
  author = {Jin\*, Xin and Manandhar\*, Sunil and Kafle, Kaushal and Lin, Zhiqiang and Nadkarni, Adwait},
  title = {{Understanding IoT Security from a Market-Scale Perspective}},
  booktitle = {Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS)},
  year = {2022},
  month = nov,
  address = {Los Angeles, CA, USA},
  pdf = {/downloads/manandhar-ccs22.pdf},
  sourcecode = {https://github.com/Secure-Platforms-Lab-W-M/IoTSpotter},
  note = {\*Co-first Authors.}
}

[2]S. Manandhar, K. Kafle, B. Andow, K. Singh, and A. Nadkarni, “‘Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage,” in Proceedings of the 31st USENIX Security Symposium (USENIX), Boston, MA, USA, 2022. Acceptance rate: 256/1414, 18%. descriptionPDF codeArtifact

Bibtex

@inproceedings{manandhar-sec22,
  author = {Manandhar, Sunil and Kafle, Kaushal and Andow, Benjamin and Singh, Kapil and Nadkarni, Adwait},
  title = {{“Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage}},
  booktitle = {Proceedings of the 31st USENIX Security Symposium (USENIX)},
  year = {2022},
  month = aug,
  address = {Boston, MA, USA},
  pdf = {/downloads/manandhar-sec22.pdf},
  sourcecode = {https://github.com/Secure-Platforms-Lab-W-M/smart-home-privacy-policies},
  note = {Acceptance rate: 256/1414, 18%}
}

[3]A. S. Ami, N. Cooper, K. Kafle, K. Moran, D. Poshyvanyk, and A. Nadkarni, “Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques,” in Proceedings of the 2022 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, 2022, pp. 397–414. Acceptance rate: 147/1012, 14.52%. descriptionPDF codeArtifact

Bibtex

@inproceedings{ami-oakland22,
  author = {Ami, Amit Seal and Cooper, Nathan and Kafle, Kaushal and Moran, Kevin and Poshyvanyk, Denys and Nadkarni, Adwait},
  booktitle = {Proceedings of the 2022 IEEE Symposium on Security and Privacy (S&P)},
  title = {{Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques}},
  year = {2022},
  address = {San Francisco, CA, USA},
  month = may,
  pages = {397--414},
  pdf = {/downloads/ami-oakland22.pdf},
  sourcecode = {https://github.com/Secure-Platforms-Lab-W-M/masc-artifact},
  note = {Acceptance rate: 147/1012, 14.52%}
}

2021

[1]A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android.,” in Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE’21), Formal Tool Demonstration Track, Madrid, Spain, 2021. descriptionPDF

Bibtex

@inproceedings{akm+21-demo,
  author = {Ami, Amit Seal and Kafle, Kaushal and Moran, Kevin and Nadkarni, Adwait and Poshyvanyk, Denys},
  title = {{Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android.}},
  booktitle = {Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE'21), Formal Tool Demonstration Track},
  year = {2021},
  address = {Madrid, Spain},
  month = may,
  pdf = {https://ieeexplore.ieee.org/abstract/document/9402554}
}

[2]A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques,” ACM Transactions on Privacy and Security (TOPS), vol. 24, no. 15, Feb. 2021. descriptionPDF

Bibtex

@article{akm+20,
  author = {Ami, Amit Seal and Kafle, Kaushal and Moran, Kevin and Nadkarni, Adwait and Poshyvanyk, Denys},
  title = {{Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques}},
  journal = {ACM Transactions on Privacy and Security (TOPS)},
  year = {2021},
  month = feb,
  volume = {24},
  number = {15},
  pdf = {/downloads/ami-tops21.pdf}
}

2020

[1]K. Kafle, K. Moran, S. Manandhar, A. Nadkarni, and D. Poshyvanyk, “Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue,” ACM Transactions on Cyber-Physical Systems (TCPS), vol. 5, no. 1, Dec. 2020. descriptionPDF

Bibtex

@article{kmm+20,
  author = {Kafle, Kaushal and Moran, Kevin and Manandhar, Sunil and Nadkarni, Adwait and Poshyvanyk, Denys},
  title = {{Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue}},
  journal = {ACM Transactions on Cyber-Physical Systems (TCPS)},
  year = {2020},
  month = dec,
  volume = {5},
  number = {1},
  pdf = {/downloads/kafle-tcps20.pdf}
}

[2]S. Manandhar, K. Moran, K. Kafle, R. Tang, D. Poshyvanyk, and A. Nadkarni, “Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.,” in Proceedings of the IEEE Symposium on Security & Privacy (S&P), San Francisco, CA, USA, 2020. Acceptance rate: 104/841, 12.3%. descriptionPDF codeArtifact

Bibtex

@inproceedings{mmk+20,
  author = {Manandhar, Sunil and Moran, Kevin and Kafle, Kaushal and Tang, Ruhao and Poshyvanyk, Denys and Nadkarni, Adwait},
  title = {{Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.}},
  booktitle = {Proceedings of the IEEE Symposium on Security \& Privacy (S&P)},
  year = {2020},
  address = {San Francisco, CA, USA},
  month = may,
  pdf = {/downloads/manandhar-oakland20.pdf},
  sourcecode = {https://github.com/helion-security/helion},
  note = {Acceptance rate: 104/841, 12.3%}
}

2019

[1]K. Kafle, K. Moran, S. Manandhar, A. Nadkarni, and D. Poshyvanyk, “A Study of Data Store-based Home Automation,” in Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, TX, USA, 2019, pp. 73–84. Acceptance rate: 28/119, 23.5%. descriptionPDF emoji_eventsBest Paper Award!

Bibtex

@inproceedings{kmm+19,
  author = {Kafle, Kaushal and Moran, Kevin and Manandhar, Sunil and Nadkarni, Adwait and Poshyvanyk, Denys},
  title = {{A Study of Data Store-based Home Automation}},
  booktitle = {Proceedings of the 9th ACM Conference on Data and Application Security and Privacy
    (CODASPY)},
  year = {2019},
  address = {Dallas, TX, USA},
  month = mar,
  pages = {73-84},
  pdf = {/downloads/kafle-codaspy19.pdf},
  award = {Best Paper Award!},
  note = {Acceptance rate: 28/119, 23.5%}
}

[2]S. A. Gorski III et al., “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware,” in Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, TX, USA, 2019, pp. 25–36. Acceptance rate: 28/119, 23.5%. descriptionPDF codeArtifact

Bibtex

@inproceedings{gan+19,
  author = {{Gorski III}, Sigmund A and Andow, Benjamin and Nadkarni, Adwait and Manandhar, Sunil and Enck, William and Bodden, Eric and Bartel, Alexandre},
  title = {{ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware}},
  booktitle = {Proceedings of the 9th ACM Conference on Data and Application Security and Privacy
    (CODASPY)},
  year = {2019},
  address = {Dallas, TX, USA},
  month = mar,
  pages = {25-36},
  pdf = {/downloads/gorski-codaspy19.pdf},
  sourcecode = {https://wspr.csc.ncsu.edu/acminer/},
  note = {Acceptance rate: 28/119, 23.5%}
}

2018

[1]R. Bonett, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Discovering Vulnerabilities in Security-Focused Static Analysis Tools for Android using Systematic Mutation,” in Proceedings of the 27th USENIX Security Symposium (USENIX), Baltimore, MD, USA, 2018, pp. 1263–1280. Acceptance rate: 100/524, 19%. descriptionPDF codeArtifact

Bibtex

@inproceedings{bkm+18,
  author = {Bonett, Richard and Kafle, Kaushal and Moran, Kevin and Nadkarni, Adwait and Poshyvanyk, Denys},
  title = {{Discovering Vulnerabilities in Security-Focused Static Analysis Tools for Android using Systematic Mutation}},
  booktitle = {Proceedings of the 27th USENIX Security Symposium (USENIX)},
  year = {2018},
  address = {Baltimore, MD, USA},
  month = aug,
  pages = {1263-1280},
  pdf = {/downloads/bonett-sec18.pdf},
  sourcecode = {https://secure-platforms-lab-w-m.github.io/muse/},
  note = {Acceptance rate: 100/524, 19%}
}

[2]W. H. Enck, A. Nadkarni, A.-reza Sadeghi, and S. Heuser, “PROGRAMMABLE INTERFACE FOR EXTENDING SECURITY OF APPLICATION-BASED OPERATING SYSTEM, SUCH AS ANDROID,” Mar-2018. US Patent US 9,916 ,475 B2.

Bibtex

@patent{asm-patent,
  title = {PROGRAMMABLE INTERFACE FOR EXTENDING SECURITY OF APPLICATION-BASED OPERATING SYSTEM, SUCH AS ANDROID},
  author = {Enck, William Harold and Nadkarni, Adwait and Sadeghi, Ahmad-reza and Heuser, Stephan},
  year = {2018},
  month = mar,
  note = {US Patent US 9,916 ,475 B2}
}

2017

[1]A. Nadkarni, W. Enck, S. Jha, and J. Staddon, “Policy by Example: An Approach for Security Policy Specification,” arXiv preprint arXiv:1707.03967, Jul. 2017. descriptionPDF

Bibtex

@techreport{pybe-TR,
  title = {{Policy by Example: An Approach for Security Policy Specification}},
  author = {Nadkarni, Adwait and Enck, William and Jha, Somesh and Staddon, Jessica},
  type = {arXiv preprint arXiv:1707.03967},
  year = {2017},
  month = jul,
  pdf = {https://arxiv.org/pdf/1707.03967.pdf}
}

[2]A. Nadkarni, A. Verma, V. Tendulkar, and W. Enck, “Reliable Ad Hoc Smartphone Application Creation for End Users,” in Intrusion Detection and Prevention for Mobile Ecosystems, CRC Press, 2017 [Online]. Available at: https://www.crcpress.com/Intrusion-Detection-and-Prevention-for-Mobile-Ecosystems/Kambourakis-Shabtai-Kolias-Damopoulos/p/book/9781138033573 Editor: George Kambourakis and Asaf Shabtai and Konstantinos Kolias and Dimitrios Damopoulos.

Bibtex

@incollection{nvte17,
  author = {Nadkarni, Adwait and Verma, Akash and Tendulkar, Vasant and Enck, William},
  title = {{Reliable Ad Hoc Smartphone Application Creation for End Users}},
  booktitle = {Intrusion Detection and Prevention for Mobile Ecosystems},
  publisher = {CRC Press},
  isbn = {9781138033573},
  month = jul,
  year = {2017},
  note = {Editor: George Kambourakis and Asaf Shabtai and Konstantinos Kolias and Dimitrios Damopoulos},
  url = {https://www.crcpress.com/Intrusion-Detection-and-Prevention-for-Mobile-Ecosystems/Kambourakis-Shabtai-Kolias-Damopoulos/p/book/9781138033573}
}

[3]A. Nadkarni, “Towards Practical Data Secrecy in Modern Operating Systems.,” PhD dissertation, North Carolina State University, 2017.

Bibtex

@phdthesis{adwait-phd,
  title = {{Towards Practical Data Secrecy in Modern Operating Systems.}},
  school = {North Carolina State University},
  author = {Nadkarni, Adwait},
  year = {2017},
  type = {{PhD} dissertation}
}

2016

[1]R. Shu et al., “A Study of Security Isolation Techniques,” ACM Computing Surveys (CSUR), vol. 49, no. 3, Oct. 2016. descriptionPDF

Bibtex

@article{swg+16,
  author = {Shu, Rui and Wang, Peipei and Gorski III, Sigmund A and Andow, Benjamin and Nadkarni, Adwait and Deshotels, Luke and Gionta, Jason and Enck, William and Gu, Xiaohui},
  title = {{A Study of Security Isolation Techniques}},
  journal = {ACM Computing Surveys (CSUR)},
  issue_date = {October 2016},
  volume = {49},
  number = {3},
  month = oct,
  year = {2016},
  pdf = {https://dl.acm.org/doi/abs/10.1145/2988545?casa_token=ek-EuLe0JQEAAAAA:gsWBoeL_H9MJZN-249KMiUDnTSkMCDjclq7RBvCqZCtB32pLAtOq9HHnupGuQZnTM0e-Lrb3DQ_eXQ}
}

[2]A. Nadkarni, B. Andow, W. Enck, and S. Jha, “Practical DIFC Enforcement on Android,” in Proceedings of the 25th USENIX Security Symposium (USENIX), Austin, TX, USA, 2016, pp. 1119–1136. Acceptance rate: 72/463, 15.6%. descriptionPDF codeArtifact

Bibtex

@inproceedings{naej16,
  author = {Nadkarni, Adwait and Andow, Benjamin and Enck, William and Jha, Somesh},
  title = {{Practical DIFC Enforcement on Android}},
  booktitle = {Proceedings of the 25th USENIX Security Symposium (USENIX)},
  year = {2016},
  address = {Austin, TX, USA},
  month = aug,
  pages = {1119-1136},
  pdf = {/downloads/nadkarni-sec16.pdf},
  sourcecode = {https://wspr.csc.ncsu.edu/weir/},
  note = {Acceptance rate: 72/463, 15.6%}
}

[3]B. Andow, A. Nadkarni, B. Bassett, W. Enck, and T. Xie, “A Study of Grayware on Google Play,” in Proceedings of the IEEE Mobile Security Technologies workshop (MoST), San Jose, CA, USA, 2016, pp. 224–233. \textbfAcceptance rate: 10/35 ≈28.6%. descriptionPDF

Bibtex

@inproceedings{anb+16,
  author = {Andow, Benjamin and Nadkarni, Adwait and Bassett, Blake and Enck, William and Xie, Tao},
  title = {{A Study of Grayware on Google Play}},
  booktitle = {Proceedings of the IEEE Mobile Security Technologies workshop (MoST)},
  year = {2016},
  address = {San Jose, CA, USA},
  month = may,
  pages = {224-233},
  note = {\textbf{\textit{Acceptance rate: 10/35 $\approx$ 28.6\%}}},
  pdf = {https://ieeexplore.ieee.org/abstract/document/7527773?casa_token=2HcrnGUJBqUAAAAA:0CrRRl5Oh3fAQpRoXYdB8zyoxf5j6wtQwixxV_qWZBptGRuF55bS6fShdGlNaNLcSFMNIzvseyc}
}

[4]W. Enck and A. Nadkarni, “What if the FBI tried to crack an Android phone? We attacked one to find out,” The Conversation. Mar-2016 [Online]. Available at: \Colorhrefhttps://theconversation.com/what-if-the-fbi-tried-to-crack-an-android-phone-we-attacked-one-to-find-out-56556

Bibtex

@misc{android-fbi,
  author = {Enck, William and Nadkarni, Adwait},
  title = {{What if the FBI tried to crack an Android phone? We attacked one to find out}},
  year = {2016},
  month = mar,
  journal = {The Conversation},
  url = {\Colorhref{https://theconversation.com/what-if-the-fbi-tried-to-crack-an-android-phone-we-attacked-one-to-find-out-56556}}
}

2014

[1]S. Heuser*, A. Nadkarni*, W. Enck, and A.-R. Sadeghi, “ASM: A Programmable Interface for Extending Android Security,” in Proceedings of the 23rd USENIX Security Symposium (USENIX), San Diego, CA, USA, 2014, pp. 1005–1019. *Co-first Authors, Acceptance rate: 67/350, 19.1%. descriptionPDF codeArtifact

Bibtex

@inproceedings{hnes14,
  author = {Heuser\*, Stephan and Nadkarni\*, Adwait and Enck, William and Sadeghi, Ahmad-Reza},
  title = {{ASM: A Programmable Interface for Extending Android Security}},
  booktitle = {Proceedings of the 23rd USENIX Security Symposium (USENIX)},
  year = {2014},
  month = aug,
  address = {San Diego, CA, USA},
  pages = {1005-1019},
  pdf = {/downloads/heuser-sec14.pdf},
  sourcecode = {http://www.androidsecuritymodules.org},
  note = {\*Co-first Authors, Acceptance rate: 67/350, 19.1%}
}

[2]A. Nadkarni, A. Sheth, U. Weinsberg, N. Taft, and W. Enck, “GraphAudit: Privacy Auditing for Massive Graph Mining,” North Carolina State University, Department of Computer Science, Raleigh, NC, Technical Report TR-2014-10, Aug. 2014. descriptionPDF

Bibtex

@techreport{TR-2014-10,
  author = {Nadkarni, Adwait and Sheth, Anmol and Weinsberg, Udi and Taft, Nina and Enck, William},
  title = {{GraphAudit: Privacy Auditing for Massive Graph Mining}},
  address = {Raleigh, NC},
  institution = {North Carolina State University, Department of Computer
  	  Science},
  type = {{Technical Report} TR-2014-10},
  month = aug,
  year = {2014},
  pdf = {https://repository.lib.ncsu.edu/bitstream/handle/1840.4/8595/TR-2014-10.pdf?sequence=1}
}

[3]A. Nadkarni, V. Tendulkar, and W. Enck, “NativeWrap: Ad Hoc Smartphone Application Creation for End Users,” in Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (\underlineWiSec), Oxford, UK, 2014, pp. 13–24. Acceptance rate: 25/96, 26%. descriptionPDF codeArtifact

Bibtex

@inproceedings{nte14,
  author = {Nadkarni, Adwait and Tendulkar, Vasant and Enck, William},
  title = {{NativeWrap: Ad Hoc Smartphone Application Creation for End Users}},
  booktitle = {{Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (\underline{WiSec})}},
  year = {2014},
  month = jul,
  address = {Oxford, UK},
  pages = {13-24},
  pdf = {/downloads/nadkarni-wisec14.pdf},
  sourcecode = {https://wspr.csc.ncsu.edu/nativewrap/},
  note = {Acceptance rate: 25/96, 26%}
}

2013

[1]A. Nadkarni and W. Enck, “Preventing accidental data disclosure in modern operating systems,” in Proceedings of the 2013 ACM Conference on Computer & Communications Security (\underlineCCS), Berlin, Germany, 2013, pp. 1029–1042. Acceptance rate: 105/530, 19.8%. descriptionPDF codeArtifact

Bibtex

@inproceedings{ne13,
  author = {Nadkarni, Adwait and Enck, William},
  title = {{Preventing accidental data disclosure in modern operating systems}},
  booktitle = {Proceedings of the 2013 ACM Conference on Computer \& Communications Security (\underline{CCS})},
  year = {2013},
  address = {Berlin, Germany},
  month = nov,
  pages = {1029--1042},
  pdf = {/downloads/nadkarni-ccs13.pdf},
  sourcecode = {https://wspr.csc.ncsu.edu/aquifer/},
  note = {Acceptance rate: 105/530, 19.8%}
}

2012

[1]A. Nadkarni, “Workflow Based Information Flow Control (IFC) in Modern Operating Systems.,” Master’s thesis, North Carolina State University, 2012.

Bibtex

@mastersthesis{adwait-ms,
  title = {{Workflow Based Information Flow Control (IFC) in Modern Operating Systems.}},
  school = {North Carolina State University},
  author = {Nadkarni, Adwait},
  year = {2012}
}

back to the top