default search action
Kapil Singh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Sunil Manandhar, Kapil Singh, Adwait Nadkarni:
Towards Automated Regulation Analysis for Effective Privacy Compliance. NDSS 2024 - [c28]Kaushal Kafle, Prianka Mandal, Kapil Singh, Benjamin Andow, Adwait Nadkarni:
Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites. SP 2024: 3404-3422 - 2022
- [c27]Sunil Manandhar, Kaushal Kafle, Benjamin Andow, Kapil Singh, Adwait Nadkarni:
Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage. USENIX Security Symposium 2022: 3521-3538 - 2020
- [c26]Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman:
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. USENIX Security Symposium 2020: 985-1002
2010 – 2019
- 2019
- [c25]Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Tao Xie:
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. USENIX Security Symposium 2019: 585-602 - [c24]Hasini Gunasinghe, Ashish Kundu, Elisa Bertino, Hugo Krawczyk, Suresh Chari, Kapil Singh, Dong Su:
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. WWW 2019: 594-604 - 2017
- [c23]Benjamin Andow, Akhil Acharya, Dengfeng Li, William Enck, Kapil Singh, Tao Xie:
UiRef: analysis of sensitive user inputs in Android applications. WISEC 2017: 23-34 - 2016
- [j1]Marc Ph. Stoecklin, Kapil Singh, Larry Koved, Xin Hu, Suresh N. Chari, Josyula R. Rao, Pau-Chen Cheng, Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales:
Passive security intelligence to analyze the security risks of mobile/BYOD activities. IBM J. Res. Dev. 60(4): 9 (2016) - [c22]Suwen Zhu, Long Lu, Kapil Singh:
CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices. MobiSys 2016: 375-386 - [c21]Xuxian Jiang, Kapil Singh, Yajin Zhou:
AppShell: Making data protection practical for lost or stolen Android devices. NOMS 2016: 502-508 - [c20]Shari Trewin, Calvin Swart, Larry Koved, Kapil Singh:
Perceptions of Risk in Mobile Transaction. IEEE Symposium on Security and Privacy Workshops 2016: 214-223 - 2015
- [c19]Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li:
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers. CCS 2015: 133-145 - [c18]Abner Mendoza, Kapil Singh, Guofei Gu:
What is wrecking your data plan? A measurement study of mobile web overhead. INFOCOM 2015: 2740-2748 - 2014
- [c17]Kapil Singh, Zhenkai Liang:
CCS'14 Co-Located Workshop Summary for SPSM 2014. CCS 2014: 1558-1559 - [c16]Yajin Zhou, Kapil Singh, Xuxian Jiang:
Owner-Centric Protection of Unstructured Data on Smartphones. TRUST 2014: 55-73 - [e1]Cliff Wang, Dijiang Huang, Kapil Singh, Zhenkai Liang:
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014. ACM 2014, ISBN 978-1-4503-3155-5 [contents] - [i1]Larry Koved, Kapil Singh, Hao Chen, Mike Just:
Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014. CoRR abs/1410.6674 (2014) - 2013
- [c15]Zheng Wang, Kapil Singh, Chao Chen, Anupam Chattopadhyay:
Accurate and efficient reliability estimation techniques during ADL-driven embedded processor design. DATE 2013: 547-552 - [c14]Kapil Singh, Larry Koved:
Practical out-of-band authentication for mobile applications. Middleware (Industry Track) 2013: 3:1-3:6 - [c13]Kapil Singh:
Practical Context-Aware Permission Control for Hybrid Mobile Applications. RAID 2013: 307-327 - 2012
- [c12]Chirag Gupta, Kapil Singh, Dheeraj Sanghi:
Unity metric based highly adaptive scheduler for smartphones (UMBASS). IEEE ANTS 2012: 131-136 - [c11]Shari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David:
Biometric authentication on a mobile device: a study of user effort, error and task disruption. ACSAC 2012: 159-168 - [c10]Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor:
VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security. ICISS 2012: 16-34 - [c9]Kapil Singh:
xAccess: A unified user-centric access control framework for web applications. NOMS 2012: 530-533 - [c8]Kapil Singh, Helen J. Wang, Alexander Moshchuk, Collin Jackson, Wenke Lee:
Practical end-to-end web content integrity. WWW 2012: 659-668 - 2010
- [c7]Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee:
Evaluating Bluetooth as a Medium for Botnet Command and Control. DIMVA 2010: 61-80 - [c6]Kapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee:
On the Incoherencies in Web Browser Access Control Policies. IEEE Symposium on Security and Privacy 2010: 463-478
2000 – 2009
- 2009
- [c5]Kapil Singh, Sumeer Bhola, Wenke Lee:
xBook: Redesigning Privacy Control in Social Networking Platforms. USENIX Security Symposium 2009: 249-266 - 2008
- [c4]Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee:
Evaluating email's feasibility for botnet command and control. DSN 2008: 376-385 - 2007
- [c3]Monirul Islam Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee:
Understanding Precision in Host Based Intrusion Detection. RAID 2007: 21-41 - 2004
- [c2]Kapil Singh, Son T. Vuong:
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems. ICETE (2) 2004: 238-245 - [c1]Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipozzi, Son T. Vuong:
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System. MATA 2004: 244-253
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 00:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint