Note: Within the domain of computer security, the following conferences are considered top-tier venues: the
(1) IEEE Symposium on Security & Privacy (S&P), (2) the USENIX Security Symposium (USENIX), (3) the ACM Conference
on Computer and Communications Security (CCS), and, (4) the ISOC Network and Distributed Systems Security
Symposium (NDSS). Further, the ACM Transactions on Privacy & Security (TOPS) and the ACM Transactions on
Cyber-physical Systems (TCPS) are premier journals in security and cyber-physical systems respectively. Finally,
my work has also appeared in conferences such as ACM CODASPY and ACM WiSec. Although these conferences
have higher acceptance rates (around 30%), they have consistently attracted top quality researchers. The names of
students advised by me areunderlined.
[1]P. Mandal and A. Nadkarni, “‘We can’t change it overnight’: Understanding Industry Perspectives on IoT Product Security Compliance and Certification,” in Proceedings of the 2025 IEEE Symposium on Security and Privacy (S&P 2025), 2025. To appear.descriptionPDF
Bibtex
2024
[1]Y. Xiao, A. Nadkarni, and X. Liao, “Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of Materials,” in Proceedings of the 2024 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED 2024), 2024. To appear.descriptionPDF
Bibtex
[2]P. Mandal, A. S. Ami, V. Olaiya, S. H. Razmjo, and A. Nadkarni, “‘Belt and suspenders’ or ‘just red tape’?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification,” in Proceedings of the 2024 USENIX Security Symposium (USENIX), 2024. descriptionPDF
Bibtex
[3]K. Kafle, K. Jagtap, M. Ahmed-Rengers, T. Jaeger, and A. Nadkarni, “Practical Integrity Validation in the Smart Home with HomeEndorser,” in Proceedings of the 2024 ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2024), 2024. descriptionPDF
Bibtex
[4]K. Kafle, P. Mandal, K. Singh, B. Andow, and A. Nadkarni, “Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites,” in Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P), 2024. descriptionPDF
Bibtex
[5]A. S. Ami, K. Moran, D. Poshyvanyk, and A. Nadkarni, “‘False negative - that one is going to kill you’ - Understanding Industry Perspectives of Static Analysis based Security Testing,” in Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P), 2024. descriptionPDFemoji_eventsDistinguished Paper Award!
Bibtex
[6]S. Manandhar, K. Singh, and A. Nadkarni, “Towards Automated Regulation Analysis for Effective Privacy Compliance,” in Proceedings of the 2024 Network and Distributed System Security Symposium (NDSS), 2024. descriptionPDF
Bibtex
2023
[1]P. Mandal, S. Manandhar, K. Kafle, K. Moran, D. Poshyvanyk, and A. Nadkarni, “Helion: Enabling Natural Testing of Smart Homes,” in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’23), Demonstration Track, San Francisco, 2023. descriptionPDF
Bibtex
[2]A. S. Ami et al., “MASC: A Tool for Mutation-based Evaluation of Static Crypto-API Misuse Detectors,” in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’23), Demonstration Track, San Francisco, 2023. descriptionPDF
Bibtex
2022
[1]X. Jin*, S. Manandhar*, K. Kafle, Z. Lin, and A. Nadkarni, “Understanding IoT Security from a Market-Scale Perspective,” in Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022. *Co-first Authors..descriptionPDFcodeArtifact
Bibtex
[2]S. Manandhar, K. Kafle, B. Andow, K. Singh, and A. Nadkarni, “‘Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage,” in Proceedings of the 31st USENIX Security Symposium (USENIX), Boston, MA, USA, 2022. Acceptance rate: 256/1414, 18%.descriptionPDFcodeArtifact
Bibtex
[3]A. S. Ami, N. Cooper, K. Kafle, K. Moran, D. Poshyvanyk, and A. Nadkarni, “Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques,” in Proceedings of the 2022 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, 2022, pp. 397–414. Acceptance rate: 147/1012, 14.52%.descriptionPDFcodeArtifact
Bibtex
2021
[1]A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android.,” in Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE’21), Formal Tool Demonstration Track, Madrid, Spain, 2021. descriptionPDF
Bibtex
[2]A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques,” ACM Transactions on Privacy and Security (TOPS), vol. 24, no. 15, Feb. 2021. descriptionPDF
Bibtex
2020
[1]K. Kafle, K. Moran, S. Manandhar, A. Nadkarni, and D. Poshyvanyk, “Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue,” ACM Transactions on Cyber-Physical Systems (TCPS), vol. 5, no. 1, Dec. 2020. descriptionPDF
Bibtex
[2]S. Manandhar, K. Moran, K. Kafle, R. Tang, D. Poshyvanyk, and A. Nadkarni, “Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.,” in Proceedings of the IEEE Symposium on Security & Privacy (S&P), San Francisco, CA, USA, 2020. Acceptance rate: 104/841, 12.3%.descriptionPDFcodeArtifact
Bibtex
2019
[1]K. Kafle, K. Moran, S. Manandhar, A. Nadkarni, and D. Poshyvanyk, “A Study of Data Store-based Home Automation,” in Proceedings of the 9th ACM Conference on Data and Application Security and Privacy
(CODASPY), Dallas, TX, USA, 2019, pp. 73–84. Acceptance rate: 28/119, 23.5%.descriptionPDFemoji_eventsBest Paper Award!
Bibtex
[2]S. A. Gorski III et al., “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware,” in Proceedings of the 9th ACM Conference on Data and Application Security and Privacy
(CODASPY), Dallas, TX, USA, 2019, pp. 25–36. Acceptance rate: 28/119, 23.5%.descriptionPDFcodeArtifact
Bibtex
2018
[1]R. Bonett, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Discovering Vulnerabilities in Security-Focused Static Analysis Tools for Android using Systematic Mutation,” in Proceedings of the 27th USENIX Security Symposium (USENIX), Baltimore, MD, USA, 2018, pp. 1263–1280. Acceptance rate: 100/524, 19%.descriptionPDFcodeArtifact
Bibtex
[2]W. H. Enck, A. Nadkarni, A.-reza Sadeghi, and S. Heuser, “PROGRAMMABLE INTERFACE FOR EXTENDING SECURITY OF APPLICATION-BASED OPERATING SYSTEM, SUCH AS ANDROID,” Mar-2018. US Patent US 9,916 ,475 B2.
Bibtex
2017
[1]A. Nadkarni, W. Enck, S. Jha, and J. Staddon, “Policy by Example: An Approach for Security Policy Specification,” arXiv preprint arXiv:1707.03967, Jul. 2017. descriptionPDF
Bibtex
[2]A. Nadkarni, A. Verma, V. Tendulkar, and W. Enck, “Reliable Ad Hoc Smartphone Application Creation for End Users,” in Intrusion Detection and Prevention for Mobile Ecosystems, CRC Press, 2017 [Online]. Available at: https://www.crcpress.com/Intrusion-Detection-and-Prevention-for-Mobile-Ecosystems/Kambourakis-Shabtai-Kolias-Damopoulos/p/book/9781138033573Editor: George Kambourakis and Asaf Shabtai and Konstantinos Kolias and Dimitrios Damopoulos.
Bibtex
[3]A. Nadkarni, “Towards Practical Data Secrecy in Modern Operating Systems.,” PhD dissertation, North Carolina State University, 2017.
Bibtex
2016
[1]R. Shu et al., “A Study of Security Isolation Techniques,” ACM Computing Surveys (CSUR), vol. 49, no. 3, Oct. 2016. descriptionPDF
Bibtex
[2]A. Nadkarni, B. Andow, W. Enck, and S. Jha, “Practical DIFC Enforcement on Android,” in Proceedings of the 25th USENIX Security Symposium (USENIX), Austin, TX, USA, 2016, pp. 1119–1136. Acceptance rate: 72/463, 15.6%.descriptionPDFcodeArtifact
Bibtex
[3]B. Andow, A. Nadkarni, B. Bassett, W. Enck, and T. Xie, “A Study of Grayware on Google Play,” in Proceedings of the IEEE Mobile Security Technologies workshop (MoST), San Jose, CA, USA, 2016, pp. 224–233. \textbfAcceptance rate: 10/35 ≈28.6%.descriptionPDF
Bibtex
[4]W. Enck and A. Nadkarni, “What if the FBI tried to crack an Android phone? We attacked one to find out,” The Conversation. Mar-2016 [Online]. Available at: \Colorhrefhttps://theconversation.com/what-if-the-fbi-tried-to-crack-an-android-phone-we-attacked-one-to-find-out-56556
Bibtex
2014
[1]S. Heuser*, A. Nadkarni*, W. Enck, and A.-R. Sadeghi, “ASM: A Programmable Interface for Extending Android Security,” in Proceedings of the 23rd USENIX Security Symposium (USENIX), San Diego, CA, USA, 2014, pp. 1005–1019. *Co-first Authors, Acceptance rate: 67/350, 19.1%.descriptionPDFcodeArtifact
Bibtex
[2]A. Nadkarni, A. Sheth, U. Weinsberg, N. Taft, and W. Enck, “GraphAudit: Privacy Auditing for Massive Graph Mining,” North Carolina State University, Department of Computer
Science, Raleigh, NC, Technical Report TR-2014-10, Aug. 2014. descriptionPDF
Bibtex
[3]A. Nadkarni, V. Tendulkar, and W. Enck, “NativeWrap: Ad Hoc Smartphone Application Creation for End Users,” in Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (\underlineWiSec), Oxford, UK, 2014, pp. 13–24. Acceptance rate: 25/96, 26%.descriptionPDFcodeArtifact
Bibtex
2013
[1]A. Nadkarni and W. Enck, “Preventing accidental data disclosure in modern operating systems,” in Proceedings of the 2013 ACM Conference on Computer & Communications Security (\underlineCCS), Berlin, Germany, 2013, pp. 1029–1042. Acceptance rate: 105/530, 19.8%.descriptionPDFcodeArtifact
Bibtex
2012
[1]A. Nadkarni, “Workflow Based Information Flow Control (IFC) in Modern Operating Systems.,” Master’s thesis, North Carolina State University, 2012.