Varun Srivastava

Learn More
Even experienced developers struggle to implement security policies correctly. For example, despite 15 years of development, standard Java libraries still suffer from missing and incorrectly applied permission checks, which enable untrusted applications to execute native calls or modify private class variables without authorization. Previous techniques for(More)
Software developers are increasingly choosing memory-safe languages. As a result, semantic vulnerabilities---omitted security checks, misconfigured security policies, and other software design errors---are supplanting memory-corruption exploits as the primary cause of security violations. Semantic attacks are difficult to detect because they violate(More)
Regression testing is a maintenance activity that is performed to ensure the validity of modified software. The activity takes a lot of time to run the entire test suite and is very expensive. Thus it becomes a necessity to choose the minimum set of test cases with the ability to cover all the faults in minimum time. The paper presents a new test case(More)
Software developers are increasingly choosing memory-safe languages such as Java because they help deploy higher-quality software faster. As a result, semantic vulnerabilities—omitted security checks, misconfigured security policies, and other software design errors—are supplanting memory-corruption exploits as the primary cause of security violations. We(More)
Histopathology refers to the examination of biopsy samples by a pathologist using a microscope for analysing and classifying diseases. In order to study the manifestations of a disease, the analysis of histopathological image is done manually by a pathologist and therefore the diagnosis is subjective and greatly dependent on the level of expertise of the(More)
The paper presents an offline fingerprint detection technique using a novel minutiae detection approach which considers trifurcation and Eye Enclosure points. Features like bifurcation, ridge ending, core and delta points were being used as unique identifiers. This approach advances bifurcation in the form of trifurcation and combines it with eye enclosure(More)
The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. Various complex methodologies in the past have been proposed for signature verification through feature extraction. This paper presents a new hybrid algorithm for signature verification which incorporates feed forward training of(More)
  • 1