2025
|
31. | Raffa G; Blasco J; O'Keeffe D; Dash S K: CloudFlow: Identifying Security-sensitive Data Flows in Serverless Applications. Usenix Security 2025, Forthcoming. @conference{giuseppe_usenix,
title = {CloudFlow: Identifying Security-sensitive Data Flows in Serverless Applications},
author = {Giuseppe Raffa and Jorge Blasco and Dan O'Keeffe and Santanu Kumar Dash},
year = {2025},
date = {2025-06-26},
urldate = {2025-06-26},
booktitle = {Usenix Security 2025},
keywords = {},
pubstate = {forthcoming},
tppubtype = {conference}
}
|
30. | Butler A; O'Keeffe D; Dash S K: Links Between Package Popularity, Criticality, and Security in Software Ecosystems. In: IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C), pp. 89 - 97, 2025. @inproceedings{ButlerAlexis2024LBPP,
title = {Links Between Package Popularity, Criticality, and Security in Software Ecosystems},
author = {Alexis Butler and Dan O'Keeffe and Santanu Kumar Dash},
doi = {10.1109/SANER-C66551.2025.00020},
year = {2025},
date = {2025-01-01},
urldate = {2025-01-01},
booktitle = {IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)},
journal = {IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)},
volume = {ahead of print},
pages = {89 - 97},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
2024
|
29. | Tileria M; Blasco J; Dash S K: DocFlow: Extracting Taint Specifications from Software Documentation. In: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering, ACM, Lisbon, Portugal, 2024. @inproceedings{10.1145/3597503.3623312,
title = {DocFlow: Extracting Taint Specifications from Software Documentation},
author = {Marcos Tileria and Jorge Blasco and Santanu Kumar Dash},
url = {https://doi.org/10.1145/3597503.3623312},
doi = {10.1145/3597503.3623312},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {Proceedings of the IEEE/ACM 46th International Conference on Software Engineering},
publisher = {ACM},
address = {Lisbon, Portugal},
series = {ICSE '24},
abstract = {Security practitioners routinely use static analysis to detect security problems and privacy violations in Android apps. The soundness of these analyses depends on how the platform is modelled and the list of sensitive methods. Collecting these methods often becomes impractical given the number of methods available, the pace at which the Android platform is updated, and the proprietary libraries Google releases on each new version. Despite the constant evolution of the Android platform, app developers cope with all these new features thanks to the documentation that comes with each new Android release. In this work, we take advantage of the rich documentation provided by platforms like Android and propose DocFlow, a framework to generate taint specifications for a platform, directly from its documentation. DocFlow models the semantics of API methods using their documentation to detect sensitive methods (sources and sinks) and assigns them semantic labels. Our approach does not require access to source code, enabling the analysis of proprietary libraries for which the code is unavailable. We evaluate DocFlow using Android platform packages and closed-source Google Play Services libraries. Our results show that our framework detects sensitive methods with high precision, adapts to new API versions, and can be easily extended to detect other method types. Our approach provides evidence that Android documentation encodes rich semantic information to categorise sensitive methods, removing the need to analyse source code or perform feature extraction.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Security practitioners routinely use static analysis to detect security problems and privacy violations in Android apps. The soundness of these analyses depends on how the platform is modelled and the list of sensitive methods. Collecting these methods often becomes impractical given the number of methods available, the pace at which the Android platform is updated, and the proprietary libraries Google releases on each new version. Despite the constant evolution of the Android platform, app developers cope with all these new features thanks to the documentation that comes with each new Android release. In this work, we take advantage of the rich documentation provided by platforms like Android and propose DocFlow, a framework to generate taint specifications for a platform, directly from its documentation. DocFlow models the semantics of API methods using their documentation to detect sensitive methods (sources and sinks) and assigns them semantic labels. Our approach does not require access to source code, enabling the analysis of proprietary libraries for which the code is unavailable. We evaluate DocFlow using Android platform packages and closed-source Google Play Services libraries. Our results show that our framework detects sensitive methods with high precision, adapts to new API versions, and can be easily extended to detect other method types. Our approach provides evidence that Android documentation encodes rich semantic information to categorise sensitive methods, removing the need to analyse source code or perform feature extraction. |
28. | Tereszkowski-Kaminski M; Dash S K; Suarez-Tangil G: A Study of Malicious Source Code Reuse Among GitHub, StackOverflow
and Underground Forums. In: García-Alfaro, Joaquín; Kozik, Rafal; Choras, Michal; Katsikas, Sokratis K. (Ed.): Computer Security - ESORICS 2024 - 29th European Symposium on Research
in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings,
Part III, pp. 45–66, Springer, 2024. @inproceedings{DBLP:conf/esorics/TereszkowskiKaminskiDS24,
title = {A Study of Malicious Source Code Reuse Among GitHub, StackOverflow
and Underground Forums},
author = {Michal Tereszkowski-Kaminski and Santanu Kumar Dash and Guillermo Suarez-Tangil},
editor = {Joaquín García-Alfaro and Rafal Kozik and Michal Choras and Sokratis K. Katsikas},
url = {https://doi.org/10.1007/978-3-031-70896-1_3},
doi = {10.1007/978-3-031-70896-1_3},
year = {2024},
date = {2024-01-01},
booktitle = {Computer Security - ESORICS 2024 - 29th European Symposium on Research
in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings,
Part III},
volume = {14984},
pages = {45--66},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
27. | Petrescu C C; Smith S; Butler A; Dash S K: Checking Test Suite Efficacy Through Dual-Channel Techniques. In: Testing Software and Systems - 36th IFIP WG 6.1 International
Conference, ICTSS 2024, London, UK, October 30 - November 1, 2024,
Proceedings, pp. 275–291, Springer, 2024. @inproceedings{DBLP:conf/pts/PetrescuSBD24,
title = {Checking Test Suite Efficacy Through Dual-Channel Techniques},
author = {Constantin Cezar Petrescu and Sam Smith and Alexis Butler and Santanu Kumar Dash},
url = {https://doi.org/10.1007/978-3-031-80889-0_19},
doi = {10.1007/978-3-031-80889-0_19},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {Testing Software and Systems - 36th IFIP WG 6.1 International
Conference, ICTSS 2024, London, UK, October 30 - November 1, 2024,
Proceedings},
volume = {15383},
pages = {275--291},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
26. | Raffa G; Blasco J; O'Keeffe D; Dash S K: Towards Inter-Service Data Flow Analysis of Serverless Applications. In: 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 654-658, 2024. @inproceedings{10589827,
title = {Towards Inter-Service Data Flow Analysis of Serverless Applications},
author = {Giuseppe Raffa and Jorge Blasco and Dan O'Keeffe and Santanu Kumar Dash},
doi = {10.1109/SANER60148.2024.00072},
year = {2024},
date = {2024-01-01},
booktitle = {2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)},
pages = {654-658},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
2023
|
25. | Petrescu C C; Smith S; Giavrimis R; Dash S K: Do Names echo Semantics? A Large-Scale Study of Identifiers used in C++'s Named Casts. In: Journal of Systems and Software, vol. 202, iss. C, 2023, (Selected for presentation at 2023 ESEM Journal-First Papers). @article{cast,
title = {Do Names echo Semantics? A Large-Scale Study of Identifiers used in C++'s Named Casts},
author = {Constantin Cezar Petrescu and Sam Smith and Rafail Giavrimis and Santanu Kumar Dash},
year = {2023},
date = {2023-03-17},
urldate = {2023-03-17},
booktitle = {Under Review},
journal = {Journal of Systems and Software},
volume = {202},
issue = {C},
note = {Selected for presentation at 2023 ESEM Journal-First Papers},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
24. | Raffa G; Alís J B; O'Keeffe D; Dash S K: AWSomePy: A Dataset and Characterization of Serverless Applications. In: Proceedings of the 1st Workshop on SErverless Systems, Applications and MEthodologies, SESAME 2023, Rome, Italy, 8 May 2023, pp. 50–56, ACM, 2023. @inproceedings{DBLP:conf/sesame/RaffaAO023,
title = {AWSomePy: A Dataset and Characterization of Serverless Applications},
author = {Giuseppe Raffa and Jorge Blasco Alís and Daniel O'Keeffe and Santanu Kumar Dash},
url = {https://doi.org/10.1145/3592533.3592811},
doi = {10.1145/3592533.3592811},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Proceedings of the 1st Workshop on SErverless Systems, Applications and MEthodologies, SESAME 2023, Rome, Italy, 8 May 2023},
pages = {50--56},
publisher = {ACM},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
2021
|
23. | Giavrimis R; Butler A; Petrescu C C; Basios M; Dash S K: Genetic Optimisation of C++ Applications. Automated Software Engineering (ASE), Late Breaking Results Track, 2021. @conference{optimisation,
title = {Genetic Optimisation of C++ Applications},
author = {Rafail Giavrimis and Alexis Butler and Constantin Cezar Petrescu and Michail Basios and Santanu Kumar Dash},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
booktitle = {Automated Software Engineering (ASE), Late Breaking Results Track},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
2020
|
22. | Pârtachi P; Dash S K; Allamanis M; Barr E T: Flexeme: Untangling Commits Using Lexical Flows. 28th ACM Joint European Software Engineering Conference
and Symposium on the Foundations of Software Engineering, ESEC/FSE '20 ACM, 2020. @conference{DBLP:conf/sigsoft/PartachiDAB20,
title = {Flexeme: Untangling Commits Using Lexical Flows},
author = {Profir-Petru Pârtachi and Santanu Kumar Dash and Miltiadis Allamanis and Earl T. Barr},
editor = {Prem Devanbu and Myra B. Cohen and Thomas Zimmermann},
url = {https://doi.org/10.1145/3368089.3409693},
doi = {10.1145/3368089.3409693},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
booktitle = {28th ACM Joint European Software Engineering Conference
and Symposium on the Foundations of Software Engineering},
pages = {63--74},
publisher = {ACM},
series = {ESEC/FSE '20},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
21. | Pârtachi P; Dash S K; Treude C; Barr E T: POSIT: Simultaneously Tagging Natural and Programming Languages. ICSE '20: 42nd International Conference on Software Engineering,
Seoul, South Korea, 27 June - 19 July, 2020, ACM, 2020. @conference{DBLP:conf/icse/PartachiDTB20,
title = {POSIT: Simultaneously Tagging Natural and Programming Languages},
author = {Profir-Petru Pârtachi and Santanu Kumar Dash and Christoph Treude and Earl T. Barr},
editor = {Gregg Rothermel and Doo-Hwan Bae},
url = {https://doi.org/10.1145/3377811.3380440},
doi = {10.1145/3377811.3380440},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
booktitle = {ICSE '20: 42nd International Conference on Software Engineering,
Seoul, South Korea, 27 June - 19 July, 2020},
pages = {1348--1358},
publisher = {ACM},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
20. | Louis A; Dash S K; Barr E T; Ernst M D; Sutton C: Where Should I Comment My Code?: A Dataset and Model for Predicting Locations that need Comments. ICSE-NIER 2020: 42nd International Conference on Software Engineering,
New Ideas and Emerging Results, Seoul, South Korea, 27 June - 19 July,
2020, ACM, 2020. @conference{DBLP:conf/icse/LouisDBES20,
title = {Where Should I Comment My Code?: A Dataset and Model for Predicting Locations that need Comments},
author = {Annie Louis and Santanu Kumar Dash and Earl T. Barr and Michael D. Ernst and Charles Sutton},
editor = {Gregg Rothermel and Doo-Hwan Bae},
url = {https://doi.org/10.1145/3377816.3381736},
doi = {10.1145/3377816.3381736},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
booktitle = {ICSE-NIER 2020: 42nd International Conference on Software Engineering,
New Ideas and Emerging Results, Seoul, South Korea, 27 June - 19 July,
2020},
pages = {21--24},
publisher = {ACM},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
19. | Casalnuovo C; Barr E T; Dash S K; Devanbu P; Morgan E: A Theory of Dual Channel Constraints. 42nd International Conference on Software Engineering, New Ideas and Emerging Results (ICSE-NIER 2020) ACM, 2020. @conference{DBLP:conf/icse/CasalnuovoBDDM20,
title = {A Theory of Dual Channel Constraints},
author = {Casey Casalnuovo and Earl T. Barr and Santanu Kumar Dash and Prem Devanbu and Emily Morgan},
editor = {Gregg Rothermel and Doo-Hwan Bae},
url = {https://doi.org/10.1145/3377816.3381720},
doi = {10.1145/3377816.3381720},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
pages = {25--28},
publisher = {ACM},
series = {42nd International Conference on Software Engineering, New Ideas and Emerging Results (ICSE-NIER 2020)},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
18. | Dash S K; Wu F; Basios M; Li L; Kanthan L: Checkers: Multi-modal Darwinian API Optimisation. ICSE '20: 42nd International Conference on Software Engineering,
Workshops, Seoul, Republic of Korea, 27 June - 19 July, 2020, ACM, 2020. @workshop{DBLP:conf/icse/DashWBLK20,
title = {Checkers: Multi-modal Darwinian API Optimisation},
author = {Santanu Kumar Dash and Fan Wu and Michail Basios and Lingbo Li and Leslie Kanthan},
url = {https://doi.org/10.1145/3387940.3392173},
doi = {10.1145/3387940.3392173},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
booktitle = {ICSE '20: 42nd International Conference on Software Engineering,
Workshops, Seoul, Republic of Korea, 27 June - 19 July, 2020},
pages = {291--292},
publisher = {ACM},
keywords = {},
pubstate = {published},
tppubtype = {workshop}
}
|
2019
|
17. | Louis A; Dash S K; Barr E T; Sutton C: Deep Learning to Detect Redundant Method Comments. 2019. @techreport{redundant,
title = {Deep Learning to Detect Redundant Method Comments},
author = {Annie Louis and Santanu Kumar Dash and Earl T. Barr and Charles Sutton},
year = {2019},
date = {2019-01-01},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
|
2018
|
16. | Guillermo Suarez-Tangil P G: Anomaly-based exploratory analysis and detection of exploits in android mediaserver. In: IET Information Security, vol. 12, iss. 5, pp. 404-413(9), 2018. @article{<LineBreak>come,
title = {Anomaly-based exploratory analysis and detection of exploits in android mediaserver},
author = {Guillermo Suarez-Tangil, Santanu Kumar Dash, Pedro Garcia-Teodoro, Jose Camacho, Lorenzo Cavallaro},
year = {2018},
date = {2018-09-01},
urldate = {2018-09-01},
journal = {IET Information Security},
volume = {12},
issue = {5},
pages = {404-413(9)},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
15. | Suarez-Tangil P G S K D G: Anomaly-based exploratory analysis and detection of exploits in android mediaserver. In: IET Information Security, vol. 12, iss. 5, pp. 404-413(9), 2018. @article{<LineBreak>come,
title = {Anomaly-based exploratory analysis and detection of exploits in android mediaserver},
author = {Pedro Garcia-Teodoro Santanu Kumar Dash Guillermo Suarez-Tangil},
year = {2018},
date = {2018-09-01},
urldate = {2018-09-01},
journal = {IET Information Security},
volume = {12},
issue = {5},
pages = {404-413(9)},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
14. | Dash S K; Allamanis M; Barr E T: RefiNym: Using Names to Refine Types. 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE'18 2018. @conference{refinym,
title = {RefiNym: Using Names to Refine Types},
author = {Santanu Kumar Dash and Miltiadis Allamanis and Earl T. Barr},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
booktitle = {26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering},
series = {ESEC/FSE'18},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
2017
|
13. | Jordaney R; Sharad K; Dash S K; Wang Z; Papini D; Nouretdinov I; Cavallaro L: Transcend: Detecting Concept Drift in Malware Classification Models. 26th USENIX Security Symposium (USENIX Security 17), USENIX Association, 2017. @conference{transcend,
title = {Transcend: Detecting Concept Drift in Malware Classification Models},
author = {Roberto Jordaney and Kumar Sharad and Santanu K. Dash and Zhi Wang and Davide Papini and Ilia Nouretdinov and Lorenzo Cavallaro},
year = {2017},
date = {2017-01-01},
urldate = {2017-01-01},
booktitle = {26th USENIX Security Symposium (USENIX Security 17)},
pages = {625--642},
publisher = {USENIX Association},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
12. | Suarez-Tangil G; Dash S K; Ahmadi M; Kinder J; Giacinto G; Cavallaro L: DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17 2017. @conference{droidsieve,
title = {DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware},
author = {Guillermo Suarez-Tangil and Santanu Kumar Dash and Mansour Ahmadi and Johannes Kinder and Giorgio Giacinto and Lorenzo Cavallaro},
year = {2017},
date = {2017-01-01},
urldate = {2017-01-01},
booktitle = {Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy},
pages = {309--320},
series = {CODASPY '17},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
11. | Hurier M; Suarez-Tangil G; Dash S K; Bissyandé T F; Traon Y L; Klein J; Cavallaro L: Euphony: Harmonious Unification of Cacophonous Anti-virus Vendor Labels for Android Malware. Proceedings of the 14th International Conference on Mining Software Repositories, MSR '17 2017, (textbf[CORE A]). @conference{euphony,
title = {Euphony: Harmonious Unification of Cacophonous Anti-virus Vendor Labels for Android Malware},
author = {Médéric Hurier and Guillermo Suarez-Tangil and Santanu Kumar Dash and Tegawendé F. Bissyandé and Yves Le Traon and Jacques Klein and Lorenzo Cavallaro},
year = {2017},
date = {2017-01-01},
urldate = {2017-01-01},
booktitle = {Proceedings of the 14th International Conference on Mining Software Repositories},
pages = {425--435},
series = {MSR '17},
note = {textbf[CORE A]},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
2016
|
10. | Dash S K; Suarez-Tangil G; Khan S; Tam K; Ahmadi M; Kinder J; Cavallaro L: DroidScribe: Classifying Android Malware Based on Runtime Behavior. In: Mobile Security Technologies (MoST 2016), vol. 7148, pp. 1–12, 2016. @article{dash2016droidscribe,
title = {DroidScribe: Classifying Android Malware Based on Runtime Behavior},
author = {Santanu Kumar Dash and Guillermo Suarez-Tangil and Salahuddin Khan and Kimberly Tam and Mansour Ahmadi and Johannes Kinder and Lorenzo Cavallaro},
year = {2016},
date = {2016-01-01},
journal = {Mobile Security Technologies (MoST 2016)},
volume = {7148},
pages = {1--12},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
9. | Deo A; Dash S K; Suarez-Tangil G; Vovk V; Cavallaro L: Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection. In: Artificial Intelligence and Security (AISec 2016), 2016. @article{deo2016prescience,
title = {Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection},
author = {Amit Deo and Santanu Kumar Dash and Guillermo Suarez-Tangil and Volodya Vovk and Lorenzo Cavallaro},
year = {2016},
date = {2016-01-01},
journal = {Artificial Intelligence and Security (AISec 2016)},
publisher = {ACM},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2015
|
8. | Dash S K: Adaptive Constraint Solving for Information Flow Analysis. University of Hertfordshire, 2015. @phdthesis{dash2015adaptive,
title = {Adaptive Constraint Solving for Information Flow Analysis},
author = {Santanu Kumar Dash},
year = {2015},
date = {2015-01-01},
school = {University of Hertfordshire},
keywords = {},
pubstate = {published},
tppubtype = {phdthesis}
}
|
2013
|
7. | Dash S K; Scholz S; Christianson B: Modular design of data-parallel graph algorithms. High Performance Computing and Simulation (HPCS), 2013 International Conference on, IEEE 2013. @conference{dash2013modular,
title = {Modular design of data-parallel graph algorithms},
author = {Santanu Kumar Dash and Sven-Bodo Scholz and Bruce Christianson},
year = {2013},
date = {2013-01-01},
urldate = {2013-01-01},
booktitle = {High Performance Computing and Simulation (HPCS), 2013 International Conference on},
pages = {398--404},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
6. | Dash S K; Scholz S; Herhut S; Christianson B: A scalable approach to computing representative lowest common ancestor in directed acyclic graphs. In: Theoretical Computer Science, vol. 513, pp. 25–37, 2013, (textbf[CORE A]). @article{dash2013scalable,
title = {A scalable approach to computing representative lowest common ancestor in directed acyclic graphs},
author = {Santanu Kumar Dash and Sven-Bodo Scholz and Stephan Herhut and Bruce Christianson},
year = {2013},
date = {2013-01-01},
journal = {Theoretical Computer Science},
volume = {513},
pages = {25--37},
publisher = {Elsevier},
note = {textbf[CORE A]},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2010
|
5. | Dash S K; Srikanthan T: Instruction cache tuning for embedded multitasking applications. In: IET computers & digital techniques, vol. 4, no. 6, pp. 439–457, 2010. @article{dash2010instruction,
title = {Instruction cache tuning for embedded multitasking applications},
author = {Santanu Kumar Dash and Thambipillai Srikanthan},
year = {2010},
date = {2010-01-01},
journal = {IET computers & digital techniques},
volume = {4},
number = {6},
pages = {439--457},
publisher = {IET},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2009
|
4. | Dash S K: Profile driven schemes for energy-sensitive cache hierarchy. Nanyang Technological University, 2009. @mastersthesis{dash2009profile,
title = {Profile driven schemes for energy-sensitive cache hierarchy},
author = {Santanu Kumar Dash},
year = {2009},
date = {2009-01-01},
school = {Nanyang Technological University},
keywords = {},
pubstate = {published},
tppubtype = {mastersthesis}
}
|
3. | Dash S K; Srikanthan T: Instruction Cache Tuning for Embedded Multitasking Applications. IEEE/IFIP International Symposium on Rapid System Prototyping, IEEE 2009. @conference{dash2009instruction,
title = {Instruction Cache Tuning for Embedded Multitasking Applications},
author = {Santanu Kumar Dash and Thambipillai Srikanthan},
year = {2009},
date = {2009-01-01},
urldate = {2009-01-01},
booktitle = {IEEE/IFIP International Symposium on Rapid System Prototyping},
pages = {152--158},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
2. | Dash S K; Srikanthan T: Modeling RTOS Components for Instruction Cache Hit Rate Estimation. 2009 IEEE International Symposium on Circuits and Systems, IEEE 2009. @conference{dash2009modeling,
title = {Modeling RTOS Components for Instruction Cache Hit Rate Estimation},
author = {Santanu Kumar Dash and Thambipillai Srikanthan},
year = {2009},
date = {2009-01-01},
urldate = {2009-01-01},
booktitle = {2009 IEEE International Symposium on Circuits and Systems},
pages = {2978--2981},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|
2008
|
1. | Dash S K; Srikanthan T: Rapid estimation of instruction cache hit rates using loop profiling. 2008 International Conference on Application-Specific Systems, Architectures and Processors, IEEE 2008. @conference{dash2008rapid,
title = {Rapid estimation of instruction cache hit rates using loop profiling},
author = {Santanu Kumar Dash and Thambipillai Srikanthan},
year = {2008},
date = {2008-01-01},
urldate = {2008-01-01},
booktitle = {2008 International Conference on Application-Specific Systems, Architectures and Processors},
pages = {263--268},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
|