SRI International
Room EK343
333 Ravenswood Avenue
Menlo Park, CA, 94025
USA
Phone: +1 (650) 859-2200
Fax:+1 (650) 859-2844
| |
Ashish Gehani's research interests are data provenance and security. He holds a Ph.D. degree in Computer Science from Duke University and a B.S. degree in Mathematics from the University of Chicago.
|
Projects:
- Enhancing Scientific Research Infrastructure with Network Attestation and Provenance
- Cognitive Health Assistant that Learns and Organizes
- Security-Enhanced Radio Access Network
- Trinity for Cyber
- Reproducible Containers for Advancing Process-oriented Collaborative Analytics
Past Projects:
- Formal Methods in Machine Learning
- Security Services for the 5G Software-Defined Edge
- Self-improving Intelligent Agents in Cyber-battle
- Network Protocol Specialization
- Ransomware Attack Detection with Intrinsic Explainability
- Detecting Cross-Container Channels
- Container Provenance
- Blockchain Fraud Detection
- Verified Application Debloating and Delayering
- Neuromorphic Forensics
- Contextual Bitcoin Analysis
- Protecting Provenance Integrity and Privacy
- Tracking and Analysis of Causality at the Enterprise Level
- Synthesizing Self-Contained Scientific Software
- Bitcoin Resilience
- Binary Static Previrtualization
- Accountable Clouds
- Learning Android Leaks
- Bounded Error Approximation Algorithms for Risk-Based Intrusion Response
- Edge Networking with Content-Oriented Declarative Enhanced Routing and Storage
- Scalable Integration and Analysis of the Provenance of Diverse Scientific Data
- Deployable Android Security
- Research Enabling MILS Development and Deployment
- Ensuring Security and Availability Through Model-Based Cross-Layer Adaptation
- Principled Virtualization
- Scalable Authentication of Grid Data Provenance
- Verifying Multimedia Sensor Data Provenance
Papers: (BibTeX)
- Haohuang Wen, Prakhar Sharma, Vinod Yegneswaran, Phillip Porras, Ashish Gehani, and Zhiqiang Lin, 6G-XSec: Explainable Edge Security for Emerging OpenRAN Architectures, 23rd ACM Workshop on Hot Topics in Networks (HotNets), 2024. [PDF]
- Mohannad Alhanahnah, Yazan Boshmaf, and Ashish Gehani, SoK: Software Debloating Landscape and Future Directions, 6th Workshop on Forming an Ecosystem Around Software Transformation (FEAST), affiliated with the 31st ACM Conference on Computer and Communications Security (CCS), 2024. [PDF]
- Rohan Tikmany, Aniket Modi, Raffay Atiq, Moaz Reyad, Ashish Gehani, and Tanu Malik, Access-Based Carving of Data for Efficient Reproducibility of Containers, 24th ACM/IEEE Symposium on Cluster, Cloud, and Internet Computing, 2024. [PDF]
- Brian Matejek, Ashish Gehani, Nathaniel Bastian, Daniel Clouse, Bradford Kline, and Susmit Jha, Safeguarding Network Intrusion Detection Models from Zero-day Attacks and Concept Drift, Workshop on Artificial Intelligence for Cyber Security (AICS), affiliated with the 38th AAAI Conference on Artificial Intelligence, 2024. [PDF]
- Aniket Modi, Rohan Tikmany, Tanu Malik, Raghavan Komondoor, Ashish Gehani, and Deepak D'Souza, Kondo: Efficient Provenance-driven Data Debloating, 40th IEEE Conference on Data Engineering (ICDE), 2024. [PDF]
- Haohuang Wen, Phillip Porras, Vinod Yegneswaran, Ashish Gehani, and Zhiqiang Lin, 5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service, 31st Network and Distributed System Security Symposium (NDSS), 2024. [PDF]
- Muhammad Hassan, Talha Tahir, Muhammad Farrukh, Abdullah Naveed, Anas Naeem, Fahad Shaon, Fareed Zaffar, Ashish Gehani, and Sazzadur Rahaman, Evaluating Container Debloaters, 8th IEEE Secure Development Conference (SecDev), 2023. [PDF]
- Muaz Ali, Rumaisa Habib, Ashish Gehani, Sazzadur Rahaman, and Zartash Uzmi, Blade: Scalable Source Code Debloating Framework, 8th IEEE Secure Development Conference (SecDev), 2023. [PDF]
- Steven Cheung, Jared Claypoole, Prakhar Sharma, Vinod Yegneswaran, Ashish Gehani, Susmit Jha, John Emanuello, and Ahmad Ridley, EIReLaND: Evaluating and Interpreting Reinforcement Learning-based Network Defenses, 3rd Workshop on Adaptive Cyber Defense (ACD), 2023. [PDF]
- Shozab Hussain, Musa Waseem, Turyal Neeshat, Rja Batool, Omer Ahmed, Fareed Zaffar, Ashish Gehani, Andy Poggio, and Maneesh Yadav, Towards Reproducible Ransomware Analysis, 16th Workshop on Cyber Security Experimentation and Test (CSET), 2023. [PDF]
- Muaz Ali, Muhammad Muzammil, Faraz Karim, Ayesha Naeem, Rukhshan Haroon, Muhammad Haris, Huzaifa Nadeem, Waseem Sabir, Fahad Shaon, Fareed Zaffar, Vinod Yegneswaran, Ashish Gehani, and Sazzadur Rahaman, SoK: A Tale of Reduction, Security and Correctness - Evaluating Program Debloating Paradigms and Their Compositions, 28th European Symposium on Research in Computer Security (ESORICS), 2023. [PDF]
- Aniket Modi, Moaz Reyad, Tanu Malik, and Ashish Gehani, Querying Container Provenance, 15th Workshop on the Theory and Practice of Provenance (TaPP), 2023. [PDF]
- Raza Ahmad, Aniket Modi, Eunjin Jung, Carolina de Senne Garcia, Hassaan Irshad, and Ashish Gehani, Analyzing Discrepancies in Whole Network Provenance, Critical Infrastructure Protection, Vol. XVII, Springer, 2023. [PDF]
- Chaitra Niddodi, Ashish Gehani, Tanu Malik, Sibin Mohan, and Michael Rilee, IOSPReD: I/O Specialized Packaging of Reduced Datasets and Data-Intensive Applications for Efficient Reproducibility, IEEE Access, Vol. 11, 2023. [PDF]
- Mohannad Alhanahnah, Shiqing Ma, Ashish Gehani, Gabriela Ciocarlie, Vinod Yegneswaran, Somesh Jha, and Xiangyu Zhang, autoMPI: Automated Multiple Perspective Attack Investigation with Semantics Aware Execution Partitioning, IEEE Transactions on Software Engineering (TSE), 2023. [PDF]
- Jorge Navas and Ashish Gehani, OCCAMv2: Combining Static and Dynamic Analysis for Effective and Efficient Whole Program Specialization, ACM Queue, Vol. 20(5), 2022 / Communications of the ACM, Vol. 66(4), 2023. [PDF] / [PDF]
- Yuta Nakamura, Tanu Malik, Iyad Kanj, and Ashish Gehani, Provenance-based Workflow Diagnostics Using Program Specification, 29th IEEE International Conference on High Performance Computing, Data, and Analytics (HiPC), 2022. [PDF]
- Mashal Abbas, Shahpar Khan, Abdul Monum, Fareed Zaffar, Rashid Tahir, David Eyers, Hassaan Irshad, Ashish Gehani, Vinod Yegneswaran, and Thomas Pasquier, PACED: Provenance-based Automated Container Escape Detection, 10th IEEE International Conference on Cloud Engineering (IC2E), 2022. [PDF]
- Aatira Ahmad, Mubashir Anwar, Hashim Sharif, Ashish Gehani, and Fareed Zaffar, Trimmer: Context-Specific Code Reduction, 37th IEEE/ACM Conference on Automated Software Engineering
(ASE), 2022. [PDF]
- Naga Nithin Manne, Shilvi Satpati, Tanu Malik, Amitabha Bagchi, Ashish Gehani, and Amitabh Chaudhary, CHEX: Multiversion Replay with Ordered Checkpoints, 48th International Conference on Very Large Data Bases (VLDB), 2022. [PDF]
- Aatira Ahmad, Rafae Noor, Hashim Sharif, Usama Hameed, Shoaib Asif, Mubashir Anwar, Ashish Gehani, Fareed Zaffar, and Junaid Siddiqui, Trimmer: An Automated System For Configuration-Based Software Debloating, IEEE Transactions on Software Engineering (TSE), Vol. 48(9), 2022. [PDF]
- Hassaan Irshad, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, and Xiangyu Zhang, TRACE: Enterprise-Wide Provenance Tracking For Real-Time APT Detection, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 16, 2021. [PDF]
- Ashish Gehani, Raza Ahmad, and Hassaan Irshad, Practical Provenance Privacy Protection, 13th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2021. [PDF]
- Ashish Gehani, Raza Ahmad, Hassaan Irshad, Jianqiao Zhu, and Jignesh Patel, Digging Into "Big Provenance" (With SPADE), ACM Queue, Vol. 19(3) / Communications of the ACM, Vol. 64(12), 2021. [PDF] / [PDF]
- Xutong Chen, Hassaan Irshad, Yan Chen, Ashish Gehani, and Vinod Yegneswaran, Clarion: Sound and Clear Provenance Tracking for Microservice Deployments, 30th USENIX Security Symposium, 2021. [PDF]
- Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent Urias, Han Wei Lin, Gabriela Ciocarlie, Vinod Yegneswaran, and Ashish Gehani, ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation, 28th Network and Distributed System Security Symposium (NDSS), 2021. [PDF]
- Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, and Giovanni Russello, Prov-Trust: Towards A Trustworthy SGX-based Data Provenance System, 17th International Conference on Security and Cryptography (SECRYPT), 2020. [PDF]
- Yuta Nakamura, Tanu Malik, and Ashish Gehani, Efficient Provenance Alignment in Reproduced Executions, 12th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2020. [PDF]
- Raza Ahmad, Eunjin Jung, Carolina de Senne Garcia, Hassaan Irshad, and Ashish Gehani, Discrepancy Detection in Whole Network Provenance, 12th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2020. [PDF]
- Sheung Chi Chan, Ashish Gehani, Hassaan Irshad, and James Cheney, Integrity Checking and Abnormality Detection of Provenance Records, 12th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2020. [PDF]
- Chaitra Niddodi, Ashish Gehani, Tanu Malik, Jorge Navas, and Sibin Mohan, MiDas: Containerizing Data-Intensive Applications with I/O Specialization, 3rd ACM Workshop on Practical Reproducible Evaluation of Computer Systems (P-RECS), affiliated with the 29th ACM International Symposium on High-Performance Parallel and Distributed Computing (HPDC), 2020. [PDF]
- Xueyuan Han, James Mickens, Ashish Gehani, Margo Seltzer, and Thomas Pasquier, Xanthus: Push-button Orchestration of Host Provenance Data Collection, 3rd ACM Workshop on Practical Reproducible Evaluation of Computer Systems (P-RECS), affiliated with the 29th ACM International Symposium on High-Performance Parallel and Distributed Computing (HPDC), 2020. [PDF]
- Nham Le, Ashish Gehani, Arie Gurfinkel, Susmit Jha, and Jorge Navas, Reinforcement Learning Guided Software Debloating, 2nd Workshop on Machine Learning for Systems, affiliated with the 33rd Conference on Neural Information Processing Systems (NeurIPS), 2019. [PDF]
- Sheung Chi Chan, James Cheney, Pramod Bhatotia, Thomas Pasquier, Ashish Gehani, Hassaan Irshad, Lucian Carata, and Margo Seltzer, ProvMark: A Provenance Expressiveness Benchmarking System, 20th ACM/IFIP International Middleware Conference, 2019. [PDF]
- Eunjin Jung, Marion Le Tilly, Ashish Gehani, and Yunjie Ge, Data Mining-based Ethereum Fraud Detection, 2nd IEEE International Conference on Blockchain, 2019. [PDF]
- Karim Eldefrawy, Ashish Gehani, and Alexandre Matton, Longitudinal Analysis of Misuse of Bitcoin, 17th International Conference on Applied Cryptography and Network Security (ACNS), 2019. [PDF]
- Mathieu Barre, Ashish Gehani, and Vinod Yegneswaran, Mining Data Provenance to Detect Advanced Persistent Threats, 11th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2019. [PDF]
- Amn Rahman and Ashish Gehani, On the Effects of Enterprise Security on Employee Privacy, Information Systems Security Association Journal, Vol. 16(9), 2018. [PDF]
- Hashim Sharif, Muhammad Abubakar, Ashish Gehani, and Fareed Zaffar, Trimmer: Application Specialization for Code Debloating, 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018. [PDF]
- Loic Gelle, Hassen Saidi, and Ashish Gehani, Wholly!: A Build System for the Modern Software Stack, 23rd International Conference on Formal Methods for Industrial Critical Systems (FMICS), 2018. [PDF]
- Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, and Somesh Jha, Kernel-Supported Cost-Effective Audit Logging for Causality Tracking, 29th USENIX Annual Technical Conference (ATC), 2018. [PDF]
- Raza Ahmad, Melanie Bru, and Ashish Gehani, Streaming Provenance Compression, Provenance and Annotation of Data and Processes, Lecture Notes in Computer Science, Vol. 11017, Springer, 2018. [PDF]
- Eunjin Jung, Robin Coste, Ashish Gehani, Samrat Ray, Chahal Arora, and Surajit Nundy, Automating the Classification of Post-surgery Complication Grades, 7th Workshop on Data Mining for Medicine and Healthcare (DMMH), affiliated with the 18th SIAM International Conference on Data Mining (SDM), 2018. [PDF]
- Nesrine Kaaniche, Eunjin Jung, and Ashish Gehani, Efficiently Validating Aggregated IoT Data Integrity, IEEE Workshop on Big Data Security and Services, affiliated with the 4th IEEE International Conference on Big Data Computing Service and Applications, 2018. [PDF]
- Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela Ciocarlie, Ashish Gehani, and Vinod Yegneswaran, MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation, 25th Network and Distributed System Security Symposium (NDSS), 2018. [PDF]
- Shalini Ghosh, Ariyam Das, Phil Porras, Vinod Yegneswaran, and Ashish Gehani, Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem, 23rd ACM International Conference on Knowledge Discovery and Data Mining (KDD), 2017. [PDF]
- Sheung Chi Chan, Ashish Gehani, James Cheney, Ripduman Sohan, and Hassaan Irshad, Expressiveness Benchmarking for System-Level Provenance, 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2017. [PDF]
- Fernando Krell, Gabriela Ciocarlie, Ashish Gehani, and Mariana Raykova, Low-Leakage Secure Search for Boolean Expressions, Cryptographer's Track - RSA Conference, Lecture Notes in Computer Science, Vol. 10159, Springer, 2017. [PDF]
- Bruno Dutertre, Ashish Gehani, Hassen Saidi, Martin Schaef, and Ashish Tiwari, Beyond Binary Program Transformation, 1st Workshop on Forming an Ecosystem Around Software Transformation (FEAST), affiliated with the 23rd ACM Conference on Computer and Communications Security (CCS), 2016. [PDF]
- Hasanat Kazmi, Hasnain Lakhani, Ashish Gehani, Rashid Tahir, Fareed Zaffar, To Route or To Secure: Tradeoffs in ICNs over MANETs, 15th IEEE International Symposium on Network Computing and Applications (NCA), IEEE Computer Society, 2016. [PDF]
- Joshua Joy, Mario Gerla, Yu-Ting Yu, Ashish Gehani, Hasnain Lakhani, and Minyoung Kim, Energy-Efficient, Context-Aware Cache Coding for Mobile Information-Centric Networks, 10th ACM International Conference on Distributed and Event-Based Systems (DEBS), 2016. [PDF]
- Ashish Gehani, Hasanat Kazmi, and Hassaan Irshad, Scaling SPADE to "Big Provenance'', 8th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2016. [PDF]
- Manolis Stamatogiannakis, Hasanat Kazmi, Hashim Sharif, Remco Vermeulen, Ashish Gehani, Herbert Bos, and Paul Groth, Tradeoffs in Automatic Provenance Capture, Provenance and Annotation of Data and Processes, Lecture Notes in Computer Science, Vol. 9672, Springer, 2016. [PDF]
- Ashish Gehani, On the Costs of Bitcoin Connectivity, Information Systems Security Association Journal, Vol. 14(5), 2016. [PDF]
- Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, and Ashish Gehani, Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks, 31st Annual Computer Security Applications Conference (ACSAC), 2015. [PDF]
- Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, and Guofei Gu, Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps, 11th International Conference on Security and Privacy in Communication Networks (SecureComm), 2015. [PDF]
- Samuel Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid Sadjadpour, and J.J. Garcia-Luna-Aceves, ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge, Logic, Rewriting, and Concurrency, Lecture Notes in Computer Science, Vol. 9200, Springer, 2015. [PDF]
- Gregory Malecha, Ashish Gehani, and Natarajan Shankar, Automated Software Winnowing, 30th ACM Symposium on Applied Computing (SAC), 2015. [PDF]
- Ashish Gehani and Dawood Tariq, Provenance-Only Integration, 6th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2014. [PDF]
- Rizwan Asghar, Ashish Gehani, Bruno Crispo, and Giovanni Russello, PIDGIN: Privacy-Preserving Interest and Content Sharing in Opportunistic Networks, 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014. [PDF]
- Hassen Saidi and Ashish Gehani, Mobile Security: Challenges, Lessons, and Future Directions, Information Systems Security Association Journal, Vol. 11(9), 2013. [PDF]
- Ashish Gehani, Gabriela Ciocarlie, and Natarajan Shankar, Accountable Clouds, 13th IEEE Conference on Technologies for Homeland Security, 2013. [PDF]
- Samuel Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid Sadjadpour, and J.J. Garcia-Luna-Aceves, ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge, 32nd IEEE Military Communications Conference (MILCOM), 2013. [PDF]
- Bugra Caskurlu, Ashish Gehani, Cemal Cagatay Bilgin, and K. Subramani, Analytical Models for Risk-Based Intrusion Response, Computer Networks, Vol. 57(10), 2013. [PDF]
- Scott Moore, Ashish Gehani, and Natarajan Shankar, Declaratively Processing
Provenance Metadata, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]
- Nathaniel Husted, Sharjeel Qureshi, Dawood Tariq, and Ashish Gehani, Android Provenance: Diagnosing Device Disorders, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]
- Ashish Gehani and Dawood Tariq, Cross-Platform Provenance, 1st Provenance Benchmark Challenge (ProvBench), affiliated with the 16th International Conference on Extending Database Technology (EDBT) and 16th International Conference on Database Theory (ICDT), 2013. [PDF]
- Minyoung Kim, Je-Min Kim, Mark-Oliver Stehr, Ashish Gehani, Dawood Tariq, and Jin-Soo Kim, Maximizing Availability of Content in Disruptive Environments by Cross-Layer Optimization, 28th ACM Symposium on Applied Computing (SAC), 2013. [PDF]
- Hasnain Lakhani, Rashid Tahir, Azeem Aqil, Fareed Zaffar, Dawood Tariq, and Ashish Gehani, Optimized Rollback and Re-computation, 46th IEEE Hawaii International Conference on Systems Science (HICSS), IEEE Computer Society, 2013. [PDF]
- Tanu Malik, Ashish Gehani, Dawood Tariq, and Fareed Zaffar, Sketching Distributed Data Provenance, Data Provenance and Data Management for eScience, Studies in Computational Intelligence, Vol. 426, Springer, 2013. [PDF]
- Ashish Gehani and Gabriela Ciocarlie, Composing Cross-Domain Solutions, 6th Layered Assurance Workshop (LAW), affiliated with the 28th Annual Computer Security Applications Conference (ACSAC), 2012. [PDF]
- Ashish Gehani and Dawood Tariq, SPADE: Support for Provenance Auditing in Distributed Environments, 13th ACM/IFIP/USENIX International Middleware Conference, 2012. [PDF]
- Dawood Tariq, Maisem Ali, and Ashish Gehani, Towards Automated Collection of Application-Level Data Provenance, 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 23rd USENIX Annual Technical Conference (ATC), 2012. [PDF]
- Nathaniel Husted, Hassen Saidi, and Ashish Gehani, Smartphone Security Limitations, 2nd Workshop on Governance of Technology, Information, and Policies, affiliated with the 27th Annual Computer Security Applications Conference (ACSAC), 2011. [PDF]
- Ashish Gehani, Lee Zaniewski, and K. Subramani, Algorithmic Aspects of Risk Management, Formal Modeling: Actors, Open Systems, Biological Systems, Lecture Notes in Computer Science, Vol. 7000, Springer, 2011. [PDF]
- Ashish Gehani, David Hanz, John Rushby, Grit Denker, and Rance DeLong, On the (F)utility of Untrusted Data Sanitization, 30th IEEE Military Communications Conference (MILCOM), 2011. [PDF]
- Minyoung Kim, Mark-Oliver Stehr, Ashish Gehani, and Carolyn Talcott, Ensuring Security and Availability Through Model-Based Cross-Layer Adaptation, 8th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), 2011. [PDF]
- Ashish Gehani, Dawood Tariq, Basim Baig, and Tanu Malik, Policy-Based Integration of Provenance Metadata, 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2011. [PDF]
- Dawood Tariq, Basim Baig, Ashish Gehani, Salman Mahmood, Rashid Tahir, Azeem Aqil, and Fareed Zaffar, Identifying the Provenance of Correlated Anomalies, 26th ACM Symposium on Applied Computing (SAC), 2011. [PDF]
- Tanu Malik, Ligia Nistor, and Ashish Gehani, Tracking and Sketching Distributed Data Provenance, 6th IEEE International Conference on e-Science, 2010. [PDF]
- Ashish Gehani, Basim Baig, Salman Mahmood, Dawood Tariq, and Fareed Zaffar, Fine-Grained Tracking of Grid Infections, 11th ACM/IEEE International Conference on Grid Computing (GRID), 2010. [PDF]
- Grit Denker, Ashish Gehani, Minyoung Kim, and David Hanz, Policy-Based Data Downgrading: Toward A Semantic Framework and Automated Tools to Balance Need-To-Protect and Need-To-Share Policies, 11th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010. [PDF]
- Ashish Gehani and Minyoung Kim, Mendel: Efficiently Verifying the Lineage of Data Modified in Multiple Trust Domains, 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]
- Ashish Gehani, Minyoung Kim, and Tanu Malik, Efficient Querying of Distributed Provenance Stores, 8th Workshop on the Challenges of Large Applications in Distributed Environments (CLADE), affiliated with the 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]
- Aditya Rajgarhia and Ashish Gehani, Performance and Extension of User Space File Systems, 25th ACM Symposium on Applied Computing (SAC), 2010. [PDF]
- Ashish Gehani, Minyoung Kim, and Jian Zhang, Steps Toward Managing Lineage Metadata in Grid Clusters, 1st Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 7th USENIX Conference on File and Storage Technologies (FAST), 2009. [PDF]
- Ashish Gehani, Florent Kirchner, and Natarajan Shankar, System Support for Forensic Inference, Advances in Digital Forensics, Vol. V, Springer, 2009. [PDF]
- Ashish Gehani and Surendar Chandra, Parameterized Access Control: From Design To Prototype, 4th International Conference on Security and Privacy in Communication Networks (SecureComm), ACM SIGSAC, 2008. [PDF]
- Ashish Gehani and Ulf Lindqvist, Bonsai: Balanced Lineage Authentication, 23rd Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2007. [PDF]
- Ashish Gehani and Ulf Lindqvist, VEIL: A System for Certifying Video Provenance, 9th IEEE International Symposium on Multimedia (ISM), 2007. [PDF]
- Ashish Gehani and Surendar Chandra, Parameterizing Access Control for Heterogeneous Peer-to-Peer Applications, 3rd International Conference on Security and Privacy in Communication Networks (SecureComm), IEEE Computer Society, 2007. [PDF]
- Ashish Gehani and John Reif, Super-Resolution Video Analysis for Forensic Investigations, Advances in Digital Forensics, Vol. III, Springer, 2007. [PDF]
- Surendar Chandra, Ashish Gehani, and Xuwen Yu, Automated Storage Reclamation Using Temporal Importance Annotations, 27th International Conference on Distributed Computing Systems (ICDCS), IEEE Computer Society, 2007. [PDF]
- Ashish Gehani and Surendar Chandra, PAST: Probabilistic Authentication of Sensor Timestamps, 22nd Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2006. [PDF]
- Ashish Gehani, Surendar Chandra, and Gershon Kedem, Augmenting Storage with an Intrusion Response Primitive to Ensure the Security of Critical Data, 1st ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2006. [PDF]
- Fareed Zaffar, Gershon Kedem, and Ashish Gehani, Paranoid: A Global Secure File Access Control System, 21st Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2005. [PDF]
- Ashish Gehani and Gershon Kedem, RheoStat : Real-time Risk Management, 7th International Symposium on Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, Vol. 3224, Springer-Verlag, 2004. [PDF]
- Ashish Gehani, Thomas LaBean, and John Reif, DNA-based Cryptography, Aspects of Molecular Computing, Lecture Notes in Computer Science, Vol. 2950, Springer-Verlag, 2004. [PDF]
- Ashish Gehani and Gershon Kedem, Real-time Access Control Reconfiguration, International Infrastructure Survivability Workshop, affiliated with the 25th IEEE International Real-Time Systems Symposium (RTSS), 2004. [PDF]
- Ashish Gehani, Performance-sensitive Real-time Risk Management is NP-Hard, Workshop on Foundations of Computer Security, affiliated with the 19th IEEE Symposium on Logic in Computer Science (LICS), 2004. [PDF]
- Ashish Gehani and Gershon Kedem, SADDLE: An Adaptive Auditing Architecture, 14th FIRST Conference on Computer Security Incident Handling, 2002. [PDF]
- Surendar Chandra, Ashish Gehani, Carla Ellis, and Amin Vahdat, Transcoding Characteristics of Web Images, Multimedia Computing and Networking (MMCN), Vol. 4312, SPIE, 2001. [PDF]
- Ashish Gehani and John Reif, Microflow Biomolecular Computation, Biosystems, Journal of Biological and Information Processing Sciences, Vol. 52(1-3), 1999. [PDF]
| | | |