Note: Within the domain of computer security, the following conferences are considered top-tier venues: the (1) IEEE Symposium on Security & Privacy (S&P), (2) the USENIX Security Symposium (USENIX), (3) the ACM Conference on Computer and Communications Security (CCS), and, (4) the ISOC Network and Distributed Systems Security Symposium (NDSS). Further, the ACM Transactions on Privacy & Security (TOPS) and the ACM Transactions on Cyber-physical Systems (TCPS) are premier journals in security and cyber-physical systems respectively. Finally, my work has also appeared in conferences such as ACM CODASPY and ACM WiSec. Although these conferences have higher acceptance rates (around 30%), they have consistently attracted top quality researchers. The names of students advised by me are underlined.
Google Scholar: https://scholar.google.com/citations?user=Al2MvLoAAAAJ&hl=en
[1]P. Mandal, A. S. Ami, V. Olaiya, S. H. Razmjo, and A. Nadkarni, “‘Belt and suspenders’ or ‘just red tape’?: Investigating Early Outcomes and Perceptions of IoT Security Compliance Enforcement,” in Proceedings of the 2024 USENIX Security Symposium (USENIX), 2024. To appear. descriptionPDF
Bibtex
[2]K. Kafle, K. Jagtap, M. Ahmed-Rengers, T. Jaeger, and A. Nadkarni, “Practical Integrity Validation in the Smart Home with HomeEndorser,” in Proceedings of the 2024 ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2024), 2024. To appear. descriptionPDF
Bibtex
[3]K. Kafle, P. Mandal, K. Singh, B. Andow, and A. Nadkarni, “Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites,” in Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P), 2024. To appear. descriptionPDF
Bibtex
[4]A. S. Ami, K. Moran, D. Poshyvanyk, and A. Nadkarni, “‘False negative - that one is going to kill you’ - Understanding Industry Perspectives of Static Analysis based Security Testing,” in Proceedings of the 2024 IEEE Symposium on Security and Privacy (S&P), 2024. To appear. descriptionPDF
Bibtex
[5]S. Manandhar, K. Singh, and A. Nadkarni, “Towards Automated Regulation Analysis for Effective Privacy Compliance,” in Proceedings of the 2024 Network and Distributed System Security Symposium (NDSS), 2024. To appear. descriptionPDF
Bibtex
[6]P. Mandal, S. Manandhar, K. Kafle, K. Moran, D. Poshyvanyk, and A. Nadkarni, “Helion: Enabling Natural Testing of Smart Homes,” in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’23), Demonstration Track, San Francisco, 2023. descriptionPDF
Bibtex
[7]A. S. Ami et al., “MASC: A Tool for Mutation-based Evaluation of Static Crypto-API Misuse Detectors,” in Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE’23), Demonstration Track, San Francisco, 2023. descriptionPDF
Bibtex
[8]X. Jin*, S. Manandhar*, K. Kafle, Z. Lin, and A. Nadkarni, “Understanding IoT Security from a Market-Scale Perspective,” in Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022. *Co-first Authors. descriptionPDF codeArtifact
Bibtex
[9]S. Manandhar, K. Kafle, B. Andow, K. Singh, and A. Nadkarni, “‘Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage,” in Proceedings of the 31st USENIX Security Symposium (USENIX), Boston, MA, USA, 2022. Acceptance rate: 256/1414, 18%. descriptionPDF codeArtifact
Bibtex
[10]A. S. Ami, N. Cooper, K. Kafle, K. Moran, D. Poshyvanyk, and A. Nadkarni, “Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques,” in Proceedings of the 2022 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, 2022, pp. 397–414. Acceptance rate: 147/1012, 14.52%. descriptionPDF codeArtifact
Bibtex
[11]A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Demo: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android.,” in Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering (ICSE’21), Formal Tool Demonstration Track, Madrid, Spain, 2021. descriptionPDF
Bibtex
[12]S. Manandhar, K. Moran, K. Kafle, R. Tang, D. Poshyvanyk, and A. Nadkarni, “Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.,” in Proceedings of the IEEE Symposium on Security & Privacy (S&P), San Francisco, CA, USA, 2020. Acceptance rate: 104/841, 12.3%. descriptionPDF codeArtifact
Bibtex
[13]K. Kafle, K. Moran, S. Manandhar, A. Nadkarni, and D. Poshyvanyk, “A Study of Data Store-based Home Automation,” in Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, TX, USA, 2019, pp. 73–84. Acceptance rate: 28/119, 23.5%. descriptionPDF emoji_eventsBest Paper Award!
Bibtex
[14]S. A. Gorski III et al., “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware,” in Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, TX, USA, 2019, pp. 25–36. Acceptance rate: 28/119, 23.5%. descriptionPDF codeArtifact
Bibtex
[15]R. Bonett, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Discovering Vulnerabilities in Security-Focused Static Analysis Tools for Android using Systematic Mutation,” in Proceedings of the 27th USENIX Security Symposium (USENIX), Baltimore, MD, USA, 2018, pp. 1263–1280. Acceptance rate: 100/524, 19%. descriptionPDF codeArtifact
Bibtex
[16]A. Nadkarni, B. Andow, W. Enck, and S. Jha, “Practical DIFC Enforcement on Android,” in Proceedings of the 25th USENIX Security Symposium (USENIX), Austin, TX, USA, 2016, pp. 1119–1136. Acceptance rate: 72/463, 15.6%. descriptionPDF codeArtifact
Bibtex
[17]S. Heuser*, A. Nadkarni*, W. Enck, and A.-R. Sadeghi, “ASM: A Programmable Interface for Extending Android Security,” in Proceedings of the 23rd USENIX Security Symposium (USENIX), San Diego, CA, USA, 2014, pp. 1005–1019. *Co-first Authors, Acceptance rate: 67/350, 19.1%. descriptionPDF codeArtifact
Bibtex
[18]A. Nadkarni, V. Tendulkar, and W. Enck, “NativeWrap: Ad Hoc Smartphone Application Creation for End Users,” in Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (\underlineWiSec), Oxford, UK, 2014, pp. 13–24. Acceptance rate: 25/96, 26%. descriptionPDF codeArtifact
Bibtex
[19]A. Nadkarni and W. Enck, “Preventing accidental data disclosure in modern operating systems,” in Proceedings of the 2013 ACM Conference on Computer & Communications Security (\underlineCCS), Berlin, Germany, 2013, pp. 1029–1042. Acceptance rate: 105/530, 19.8%. descriptionPDF codeArtifact
Bibtex
[1]A. S. Ami, K. Kafle, K. Moran, A. Nadkarni, and D. Poshyvanyk, “Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques,” ACM Transactions on Privacy and Security (TOPS), vol. 24, no. 15, Feb. 2021. descriptionPDF
Bibtex
[2]K. Kafle, K. Moran, S. Manandhar, A. Nadkarni, and D. Poshyvanyk, “Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue,” ACM Transactions on Cyber-Physical Systems (TCPS), vol. 5, no. 1, Dec. 2020. descriptionPDF
Bibtex
[3]R. Shu et al., “A Study of Security Isolation Techniques,” ACM Computing Surveys (CSUR), vol. 49, no. 3, Oct. 2016. descriptionPDF
Bibtex
[1]B. Andow, A. Nadkarni, B. Bassett, W. Enck, and T. Xie, “A Study of Grayware on Google Play,” in Proceedings of the IEEE Mobile Security Technologies workshop (MoST), San Jose, CA, USA, 2016, pp. 224–233. descriptionPDF
Bibtex
[1]A. Nadkarni, A. Verma, V. Tendulkar, and W. Enck, “Reliable Ad Hoc Smartphone Application Creation for End Users,” in Intrusion Detection and Prevention for Mobile Ecosystems, CRC Press, 2017 [Online]. Available at: https://www.crcpress.com/Intrusion-Detection-and-Prevention-for-Mobile-Ecosystems/Kambourakis-Shabtai-Kolias-Damopoulos/p/book/9781138033573 Editor: George Kambourakis and Asaf Shabtai and Konstantinos Kolias and Dimitrios Damopoulos.
Bibtex
[2]W. Enck and A. Nadkarni, “Android’s Security Framework-Understanding the Security of Mobile Phone Platforms,” in Encyclopedia of Cryptography, Security and Privacy, Springer. Section Editor: Reza Curtmola.
Bibtex
[1]W. H. Enck, A. Nadkarni, A.-reza Sadeghi, and S. Heuser, “PROGRAMMABLE INTERFACE FOR EXTENDING SECURITY OF APPLICATION-BASED OPERATING SYSTEM, SUCH AS ANDROID,” Mar-2018. US Patent US 9,916 ,475 B2.
Bibtex
[1]A. Nadkarni, W. Enck, S. Jha, and J. Staddon, “Policy by Example: An Approach for Security Policy Specification,” arXiv preprint arXiv:1707.03967, Jul. 2017. descriptionPDF
Bibtex
[2]A. Nadkarni, A. Sheth, U. Weinsberg, N. Taft, and W. Enck, “GraphAudit: Privacy Auditing for Massive Graph Mining,” North Carolina State University, Department of Computer Science, Raleigh, NC, Technical Report TR-2014-10, Aug. 2014. descriptionPDF
Bibtex
[1]A. Nadkarni, “Towards Practical Data Secrecy in Modern Operating Systems.,” PhD dissertation, North Carolina State University, 2017.
Bibtex
[2]A. Nadkarni, “Workflow Based Information Flow Control (IFC) in Modern Operating Systems.,” Master’s thesis, North Carolina State University, 2012.
Bibtex