Year : 2024
Runtime verification on abstract finite state models
Cite this Research Publication : K.P. Jevitha, Bharat Jayaraman, M. Sethumadhavan, Runtime verification on abstract finite state models, Journal of Systems and Software, 2024.
Year : 2023
Security Analysis of OAuth 2.0 Implementation
Cite this Research Publication :
Swarag Sharma, Jevitha KP, Security Analysis of OAuth 2.0 Implementation, 2023 Innovations in Power and Advanced Computing Technologies (i-PACT), 2023.
Publisher : IEEE
Year : 2020
Finite-state model extraction and visualization from Java program execution
Cite this Research Publication : K.P. Jevitha, J. Swaminathan, B. Jayaraman, M. Sethumadhavan, “Finite-state model extraction and visualization from Java program execution”, Software: Practice and Experience, vol. 51, pp. 409-437, 2021. DOI: https://doi.org/10.1002/spe.2910
Publisher : Wiley
Year : 2017
Stride based analysis of the chrome browser extensions API
Cite this Research Publication : P. K. Akshay Dev and Jevitha, K. P., “Stride based analysis of the chrome browser extensions API”, Advances in Intelligent Systems and Computing, vol. 516, pp. 169-178, 2017.
Publisher : Advances in Intelligent Systems and Computing
Year : 2017
Prevention of PAC File Based Attack Using DHCP Snooping
Cite this Research Publication : K. R. Atul and Jevitha, K. P., “Prevention of PAC File Based Attack Using DHCP Snooping”, Communications in Computer and Information Science, vol. 746, pp. 195-204, 2017.
Publisher : Communications in Computer and Information Science
Year : 2016
Static analysis of Firefox OS privileged applications to detect permission policy violations
Cite this Research Publication : S. P and Jevitha, K. P., “Static analysis of Firefox OS privileged applications to detect permission policy violations”, International Journal of Control Theory and Applications, vol. 9, no. 7, pp. 3085-3093, 2016.
Publisher : International Journal of Control Theory and Applications, International Science Press, Volume 9, Issue 7, p.3085-3093 .
Year : 2016
An encryption technique to thwart android binder exploits
Cite this Research Publication : Ya Kaladharan, Mateti, Pb, and Jevitha, K. P., “An encryption technique to thwart android binder exploits”, Advances in Intelligent Systems and Computing, vol. 385, pp. 13-21, 2016.
Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.
Year : 2015
An automata based approach for the prevention of NOSQL injections
Cite this Research Publication :
S. Joseph and Jevitha, K. P., “An automata based approach for the prevention of NOSQL injections”, Communications in Computer and Information Science, vol. 536, pp. 538-546, 2015.
Publisher : Communications in Computer and Information Science
Year : 2014
Web Services Attacks and Security- A Systematic Literature Review
Cite this Research Publication : V. R. Mouli and Jevitha, K. P., “Web Services Attacks and Security- A Systematic Literature Review”, Procedia Computer Science, vol. 93, pp. 870-877, 2014.
Publisher : Procedia Computer Science, Elsevier.