|
SRI International
Room EK237
333 Ravenswood Avenue
Menlo Park, CA, 94025
USA
Phone: (650) 859-2200
Fax: (650) 859-2844

|
| |
Ashish Gehani's research interests are data provenance and security. He holds Ph.D. and M.S. degrees in Computer Science from Duke University and a B.S. degree in Mathematics from the University of Chicago.
|
Projects:
- Bounded Error Approximation Algorithms for Risk-Based Intrusion Response
- Edge Networking with Content-Oriented Declarative Enhanced Routing and Storage
- Scalable Integration and Analysis of the Provenance of Diverse Scientific Data
Past Projects:
- Deployable Android Security
- Research Enabling MILS Development and Deployment
- Ensuring Security and Availability Through Model-Based Cross-Layer Adaptation
- Principled Virtualization
- Scalable Authentication of Grid Data Provenance
- Verifying Multimedia Sensor Data Provenance
Papers:
- Scott Moore, Ashish Gehani, and Natarajan Shankar, Declaratively Processing
Provenance Metadata, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]
- Nathaniel Husted, Sharjeel Qureshi, Dawood Tariq, and Ashish Gehani, Android Provenance: Diagnosing Device Disorders, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]
- Bugra Caskurlu, Ashish Gehani, Cemal Cagatay Bilgin, and K. Subramani, Analytical Models for Risk-Based Intrusion Response, Computer Networks, 2013. [PDF]
- Minyoung Kim, Je-Min Kim, Mark-Oliver Stehr, Ashish Gehani, Dawood Tariq, and Jin-Soo Kim, Maximizing Availability of Content in Disruptive Environments by Cross-Layer Optimization, 28th ACM Symposium on Applied Computing (SAC), 2013. [PDF]
- Hasnain Lakhani, Rashid Tahir, Azeem Aqil, Fareed Zaffar, Dawood Tariq, and Ashish Gehani, Optimized Rollback and Re-computation, 46th IEEE Hawaii International Conference on Systems Science (HICSS), IEEE Computer Society, 2013. [PDF]
- Ashish Gehani and Gabriela Ciocarlie, Composing Cross-Domain Solutions, 2nd Layered Assurance Workshop (LAW) affiliated with the 28th Annual Computer Security Applications Conference (ACSAC), 2012. [PDF]
- Ashish Gehani and Dawood Tariq, SPADE: Support for Provenance Auditing in Distributed Environments, 13th ACM/IFIP/USENIX International Conference on Middleware, 2012. [PDF]
- Dawood Tariq, Maisem Ali, and Ashish Gehani, Towards Automated Collection of Application-Level Data Provenance, 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 23rd USENIX Annual Technical Conference (ATC), 2012. [PDF]
- Tanu Malik, Ashish Gehani, Dawood Tariq, and Fareed Zaffar, Sketching Distributed Data Provenance, Data Provenance and Data Management for eScience, Lecture Notes in Computer Science, Vol. 7092, Springer, 2012. [PDF]
- Nathaniel Husted, Hassen Saidi, and Ashish Gehani, Smartphone Security Limitations, 2nd Workshop on Governance of Technology, Information, and Policies affiliated with the 27th Annual Computer Security Applications Conference (ACSAC), 2011. [PDF]
- Ashish Gehani, Lee Zaniewski, and K. Subramani, Algorithmic Aspects of Risk Management, Formal Modeling: Actors, Open Systems, Biological Systems, Lecture Notes in Computer Science, Vol. 7000, Springer, 2011. [PDF]
- Ashish Gehani, David Hanz, John Rushby, Grit Denker, and Rance DeLong, On the (F)utility of Untrusted Data Sanitization, 30th IEEE Military Communications Conference (MILCOM), 2011. [PDF]
- Minyoung Kim, Mark-Oliver Stehr, Ashish Gehani, and Carolyn Talcott, Ensuring Security and Availability Through Model-Based Cross-Layer Adaptation, 8th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), 2011. [PDF]
- Ashish Gehani, Dawood Tariq, Basim Baig, and Tanu Malik, Policy-Based Integration of Provenance Metadata, 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2011. [PDF]
- Dawood Tariq, Basim Baig, Ashish Gehani, Salman Mahmood, Rashid Tahir, Azeem Aqil, and Fareed Zaffar, Identifying the Provenance of Correlated Anomalies, 26th ACM Symposium on Applied Computing (SAC), 2011. [PDF]
- Tanu Malik, Ligia Nistor, and Ashish Gehani, Tracking and Sketching Distributed Data Provenance, 6th IEEE International Conference on e-Science, 2010. [PDF]
- Ashish Gehani, Basim Baig, Salman Mahmood, Dawood Tariq, and Fareed Zaffar, Fine-Grained Tracking of Grid Infections, 11th ACM/IEEE International Conference on Grid Computing (GRID), 2010. [PDF]
- Grit Denker, Ashish Gehani, Minyoung Kim, and David Hanz, Policy-Based Data Downgrading: Toward A Semantic Framework and Automated Tools to Balance Need-To-Protect and Need-To-Share Policies, 11th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010. [PDF]
- Ashish Gehani and Minyoung Kim, Mendel: Efficiently Verifying the Lineage of Data Modified in Multiple Trust Domains, 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]
- Ashish Gehani, Minyoung Kim, and Tanu Malik, Efficient Querying of Distributed Provenance Stores, 8th Workshop on the Challenges of Large Applications in Distributed Environments (CLADE) affiliated with the 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]
- Aditya Rajgarhia and Ashish Gehani, Performance and Extension of User Space File Systems, 25th ACM Symposium on Applied Computing (SAC), 2010. [PDF]
- Ashish Gehani, Minyoung Kim, and Jian Zhang, Steps Toward Managing Lineage Metadata in Grid Clusters, 1st Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 7th USENIX Conference on File and Storage Technologies (FAST), 2009. [PDF]
- Ashish Gehani, Florent Kirchner, and Natarajan Shankar, System Support for Forensic Inference, Advances in Digital Forensics V, Springer, 2009. [PDF]
- Ashish Gehani and Surendar Chandra, Parameterized Access Control: From Design To Prototype, 4th International Conference on Security and Privacy in Communication Networks (SecureComm), ACM SIGSAC, 2008. [PDF]
- Ashish Gehani and Ulf Lindqvist, Bonsai: Balanced Lineage Authentication, 23rd Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2007. [PDF]
- Ashish Gehani and Ulf Lindqvist, VEIL: A System for Certifying Video Provenance, 9th IEEE International Symposium on Multimedia (ISM), 2007. [PDF]
- Ashish Gehani and Surendar Chandra, Parameterizing Access Control for Heterogeneous Peer-to-Peer Applications, 3rd International Conference on Security and Privacy in Communication Networks (SecureComm), IEEE Computer Society, 2007. [PDF]
- Surendar Chandra, Ashish Gehani, and Xuwen Yu, Automated Storage Reclamation Using Temporal Importance Annotations, 27th International Conference on Distributed Computing Systems (ICDCS), IEEE Computer Society, 2007. [PDF]
- Ashish Gehani and John Reif, Super-Resolution Video Analysis for Forensic Investigations, Advances in Digital Forensics III, Springer, 2007. [PDF]
- Ashish Gehani and Surendar Chandra, PAST: Probabilistic Authentication of Sensor Timestamps, 22nd Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2006. [PDF]
- Ashish Gehani, Surendar Chandra, and Gershon Kedem, Augmenting Storage with an Intrusion Response Primitive to Ensure the Security of Critical Data, 1st ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2006. [PDF]
- Fareed Zaffar, Gershon Kedem, and Ashish Gehani, Paranoid: A Global Secure File Access Control System, 21st Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2005. [PDF]
- Ashish Gehani and Gershon Kedem, RheoStat : Real-time Risk Management, 7th International Symposium on Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, Vol. 3224, Springer-Verlag, 2004. [PDF]
- Ashish Gehani, Thomas LaBean, and John Reif, DNA-based Cryptography, Aspects of Molecular Computing, Lecture Notes in Computer Science, Vol. 2950, Springer-Verlag, 2004. [PDF]
- Ashish Gehani and Gershon Kedem, Real-time Access Control Reconfiguration, International Infrastructure Survivability Workshop affiliated with the 25th IEEE International Real-Time Systems Symposium (RTSS), 2004.
- Ashish Gehani, Performance-sensitive Real-time Risk Management is NP-Hard, Workshop on Foundations of Computer Security affiliated with the 19th IEEE Symposium on Logic in Computer Science (LICS), 2004.
- Surendar Chandra, Ashish Gehani, Carla Ellis, and Amin Vahdat, Transcoding Characteristics of Web Images, Multimedia Computing and Networking (MMCN), SPIE, Vol. 4312, 2001. [PDF]
- Ashish Gehani and John Reif, Microflow Biomolecular Computation, Biosystems, Journal of Biological and Information Processing Sciences, Vol. 52(1-3), 1999. [PDF]
| | | |