SRI Logo
About Us|R and D Divisions|Careers|Newsroom|Contact Us|SRI Home
     
  SRI Logo

Dr. Ashish Gehani
Principal Computer Scientist

SRI International
Room EK343
333 Ravenswood Avenue
Menlo Park, CA, 94025
USA

Phone: +1 (650) 859-2200
Fax:+1 (650) 859-2844

Ashish Gehani's research interests are data provenance and security. He holds a Ph.D. degree in Computer Science from Duke University and a B.S. degree in Mathematics from the University of Chicago.

Projects:

  • Neuromorphic Forensics
  • Contextual Bitcoin Analysis
  • Protecting Provenance Integrity and Privacy
  • Tracking and Analysis of Causality at the Enterprise Level
  • Synthesizing Self-Contained Scientific Software
  • Binary Static Previrtualization

Past Projects:

  • Bitcoin Resilience
  • Accountable Clouds
  • Learning Android Leaks
  • Bounded Error Approximation Algorithms for Risk-Based Intrusion Response
  • Edge Networking with Content-Oriented Declarative Enhanced Routing and Storage
  • Scalable Integration and Analysis of the Provenance of Diverse Scientific Data
  • Deployable Android Security
  • Research Enabling MILS Development and Deployment
  • Ensuring Security and Availability Through Model-Based Cross-Layer Adaptation
  • Principled Virtualization
  • Scalable Authentication of Grid Data Provenance
  • Verifying Multimedia Sensor Data Provenance

Papers:

  • Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela Ciocarlie, Ashish Gehani, and Vinod Yegneswaran, MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation, 25th Annual Network and Distributed System Security Symposium (NDSS), 2018. [PDF]

  • Shalini Ghosh, Ariyam Das, Phil Porras, Vinod Yegneswaran, and Ashish Gehani, Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem, 23rd ACM International Conference on Knowledge Discovery and Data Mining (KDD), 2017. [PDF]

  • Sheung Chi Chan, Ashish Gehani, James Cheney, Ripduman Sohan, and Hassaan Irshad, Expressiveness Benchmarking for System-Level Provenance, 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2017. [PDF]

  • Fernando Krell, Gabriela Ciocarlie, Ashish Gehani, and Mariana Raykova, Low-Leakage Secure Search for Boolean Expressions, Cryptographer's Track - RSA Conference, Lecture Notes in Computer Science, Vol. 10159, Springer, 2017. [PDF]

  • Bruno Dutertre, Ashish Gehani, Hassen Saidi, Martin Schaef, and Ashish Tiwari, Beyond Binary Program Transformation, 1st Workshop on Forming an Ecosystem Around Software Transformation (FEAST), affiliated with the 23rd ACM Conference on Computer and Communications Security (CCS), 2016. [PDF]

  • Hasanat Kazmi, Hasnain Lakhani, Ashish Gehani, Rashid Tahir, Fareed Zaffar, To Route or To Secure: Tradeoffs in ICNs over MANETs, 15th IEEE International Symposium on Network Computing and Applications (NCA), IEEE Computer Society, 2016. [PDF]

  • Joshua Joy, Mario Gerla, Yu-Ting Yu, Ashish Gehani, Hasnain Lakhani, and Minyoung Kim, Energy-Efficient, Context-Aware Cache Coding for Mobile Information-Centric Networks, 10th ACM International Conference on Distributed and Event-Based Systems (DEBS), 2016. [PDF]

  • Ashish Gehani, Hasanat Kazmi, and Hassaan Irshad, Scaling SPADE to "Big Provenance'', 8th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2016. [PDF]

  • Manolis Stamatogiannakis, Hasanat Kazmi, Hashim Sharif, Remco Vermeulen, Ashish Gehani, Herbert Bos, and Paul Groth, Tradeoffs in Automatic Provenance Capture, Provenance and Annotation of Data and Processes, Lecture Notes in Computer Science, Vol. 9672, Springer, 2016. [PDF]

  • Ashish Gehani, On the Costs of Bitcoin Connectivity, Information Systems Security Association Journal, Vol. 14(5), 2016. [PDF]

  • Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, and Ashish Gehani, Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks, 31st Annual Computer Security Applications Conference (ACSAC), 2015. [PDF]

  • Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, and Guofei Gu, Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps, 11th International Conference on Security and Privacy in Communication Networks (SecureComm), 2015. [PDF]

  • Samuel Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid Sadjadpour, and J.J. Garcia-Luna-Aceves, ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge, Logic, Rewriting, and Concurrency, Lecture Notes in Computer Science, Vol. 9200, Springer, 2015. [PDF]

  • Gregory Malecha, Ashish Gehani, and Natarajan Shankar, Automated Software Winnowing, 30th ACM Symposium on Applied Computing (SAC), 2015. [PDF]

  • Ashish Gehani and Dawood Tariq, Provenance-Only Integration, 6th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2014. [PDF]

  • Rizwan Asghar, Ashish Gehani, Bruno Crispo, and Giovanni Russello, PIDGIN: Privacy-Preserving Interest and Content Sharing in Opportunistic Networks, 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014. [PDF]

  • Hassen Saidi and Ashish Gehani, Mobile Security: Challenges, Lessons, and Future Directions, Information Systems Security Association Journal, Vol. 11(9), 2013. [PDF]

  • Ashish Gehani, Gabriela Ciocarlie, and Natarajan Shankar, Accountable Clouds, 13th IEEE Conference on Technologies for Homeland Security, 2013. [PDF]

  • Samuel Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid Sadjadpour, and J.J. Garcia-Luna-Aceves, ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge, 32nd IEEE Military Communications Conference (MILCOM), 2013. [PDF]

  • Bugra Caskurlu, Ashish Gehani, Cemal Cagatay Bilgin, and K. Subramani, Analytical Models for Risk-Based Intrusion Response, Computer Networks, Vol. 57(10), 2013. [PDF]

  • Scott Moore, Ashish Gehani, and Natarajan Shankar, Declaratively Processing Provenance Metadata, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]

  • Nathaniel Husted, Sharjeel Qureshi, Dawood Tariq, and Ashish Gehani, Android Provenance: Diagnosing Device Disorders, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]

  • Ashish Gehani and Dawood Tariq, Cross-Platform Provenance, 1st Provenance Benchmark Challenge (ProvBench), affiliated with the 16th International Conference on Extending Database Technology (EDBT) and 16th International Conference on Database Theory (ICDT), 2013. [PDF]

  • Minyoung Kim, Je-Min Kim, Mark-Oliver Stehr, Ashish Gehani, Dawood Tariq, and Jin-Soo Kim, Maximizing Availability of Content in Disruptive Environments by Cross-Layer Optimization, 28th ACM Symposium on Applied Computing (SAC), 2013. [PDF]

  • Hasnain Lakhani, Rashid Tahir, Azeem Aqil, Fareed Zaffar, Dawood Tariq, and Ashish Gehani, Optimized Rollback and Re-computation, 46th IEEE Hawaii International Conference on Systems Science (HICSS), IEEE Computer Society, 2013. [PDF]

  • Tanu Malik, Ashish Gehani, Dawood Tariq, and Fareed Zaffar, Sketching Distributed Data Provenance, Data Provenance and Data Management for eScience, Studies in Computational Intelligence, Vol. 426, Springer, 2013. [PDF]

  • Ashish Gehani and Gabriela Ciocarlie, Composing Cross-Domain Solutions, 2nd Layered Assurance Workshop (LAW), affiliated with the 28th Annual Computer Security Applications Conference (ACSAC), 2012. [PDF]

  • Ashish Gehani and Dawood Tariq, SPADE: Support for Provenance Auditing in Distributed Environments, 13th ACM/IFIP/USENIX International Conference on Middleware, 2012. [PDF]

  • Dawood Tariq, Maisem Ali, and Ashish Gehani, Towards Automated Collection of Application-Level Data Provenance, 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 23rd USENIX Annual Technical Conference (ATC), 2012. [PDF]

  • Nathaniel Husted, Hassen Saidi, and Ashish Gehani, Smartphone Security Limitations, 2nd Workshop on Governance of Technology, Information, and Policies, affiliated with the 27th Annual Computer Security Applications Conference (ACSAC), 2011. [PDF]

  • Ashish Gehani, Lee Zaniewski, and K. Subramani, Algorithmic Aspects of Risk Management, Formal Modeling: Actors, Open Systems, Biological Systems, Lecture Notes in Computer Science, Vol. 7000, Springer, 2011. [PDF]

  • Ashish Gehani, David Hanz, John Rushby, Grit Denker, and Rance DeLong, On the (F)utility of Untrusted Data Sanitization, 30th IEEE Military Communications Conference (MILCOM), 2011. [PDF]

  • Minyoung Kim, Mark-Oliver Stehr, Ashish Gehani, and Carolyn Talcott, Ensuring Security and Availability Through Model-Based Cross-Layer Adaptation, 8th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), 2011. [PDF]

  • Ashish Gehani, Dawood Tariq, Basim Baig, and Tanu Malik, Policy-Based Integration of Provenance Metadata, 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2011. [PDF]

  • Dawood Tariq, Basim Baig, Ashish Gehani, Salman Mahmood, Rashid Tahir, Azeem Aqil, and Fareed Zaffar, Identifying the Provenance of Correlated Anomalies, 26th ACM Symposium on Applied Computing (SAC), 2011. [PDF]

  • Tanu Malik, Ligia Nistor, and Ashish Gehani, Tracking and Sketching Distributed Data Provenance, 6th IEEE International Conference on e-Science, 2010. [PDF]

  • Ashish Gehani, Basim Baig, Salman Mahmood, Dawood Tariq, and Fareed Zaffar, Fine-Grained Tracking of Grid Infections, 11th ACM/IEEE International Conference on Grid Computing (GRID), 2010. [PDF]

  • Grit Denker, Ashish Gehani, Minyoung Kim, and David Hanz, Policy-Based Data Downgrading: Toward A Semantic Framework and Automated Tools to Balance Need-To-Protect and Need-To-Share Policies, 11th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010. [PDF]

  • Ashish Gehani and Minyoung Kim, Mendel: Efficiently Verifying the Lineage of Data Modified in Multiple Trust Domains, 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]

  • Ashish Gehani, Minyoung Kim, and Tanu Malik, Efficient Querying of Distributed Provenance Stores, 8th Workshop on the Challenges of Large Applications in Distributed Environments (CLADE), affiliated with the 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]

  • Aditya Rajgarhia and Ashish Gehani, Performance and Extension of User Space File Systems, 25th ACM Symposium on Applied Computing (SAC), 2010. [PDF]

  • Ashish Gehani, Minyoung Kim, and Jian Zhang, Steps Toward Managing Lineage Metadata in Grid Clusters, 1st Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 7th USENIX Conference on File and Storage Technologies (FAST), 2009. [PDF]

  • Ashish Gehani, Florent Kirchner, and Natarajan Shankar, System Support for Forensic Inference, Advances in Digital Forensics V, Springer, 2009. [PDF]

  • Ashish Gehani and Surendar Chandra, Parameterized Access Control: From Design To Prototype, 4th International Conference on Security and Privacy in Communication Networks (SecureComm), ACM SIGSAC, 2008. [PDF]

  • Ashish Gehani and Ulf Lindqvist, Bonsai: Balanced Lineage Authentication, 23rd Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2007. [PDF]

  • Ashish Gehani and Ulf Lindqvist, VEIL: A System for Certifying Video Provenance, 9th IEEE International Symposium on Multimedia (ISM), 2007. [PDF]

  • Ashish Gehani and Surendar Chandra, Parameterizing Access Control for Heterogeneous Peer-to-Peer Applications, 3rd International Conference on Security and Privacy in Communication Networks (SecureComm), IEEE Computer Society, 2007. [PDF]

  • Surendar Chandra, Ashish Gehani, and Xuwen Yu, Automated Storage Reclamation Using Temporal Importance Annotations, 27th International Conference on Distributed Computing Systems (ICDCS), IEEE Computer Society, 2007. [PDF]

  • Ashish Gehani and John Reif, Super-Resolution Video Analysis for Forensic Investigations, Advances in Digital Forensics III, Springer, 2007. [PDF]

  • Ashish Gehani and Surendar Chandra, PAST: Probabilistic Authentication of Sensor Timestamps, 22nd Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2006. [PDF]

  • Ashish Gehani, Surendar Chandra, and Gershon Kedem, Augmenting Storage with an Intrusion Response Primitive to Ensure the Security of Critical Data, 1st ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2006. [PDF]

  • Fareed Zaffar, Gershon Kedem, and Ashish Gehani, Paranoid: A Global Secure File Access Control System, 21st Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2005. [PDF]

  • Ashish Gehani and Gershon Kedem, RheoStat : Real-time Risk Management, 7th International Symposium on Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, Vol. 3224, Springer-Verlag, 2004. [PDF]

  • Ashish Gehani, Thomas LaBean, and John Reif, DNA-based Cryptography, Aspects of Molecular Computing, Lecture Notes in Computer Science, Vol. 2950, Springer-Verlag, 2004. [PDF]

  • Ashish Gehani and Gershon Kedem, Real-time Access Control Reconfiguration, International Infrastructure Survivability Workshop, affiliated with the 25th IEEE International Real-Time Systems Symposium (RTSS), 2004. [PDF]

  • Ashish Gehani, Performance-sensitive Real-time Risk Management is NP-Hard, Workshop on Foundations of Computer Security, affiliated with the 19th IEEE Symposium on Logic in Computer Science (LICS), 2004.

  • Surendar Chandra, Ashish Gehani, Carla Ellis, and Amin Vahdat, Transcoding Characteristics of Web Images, Multimedia Computing and Networking (MMCN), Vol. 4312, SPIE, 2001. [PDF]

  • Ashish Gehani and John Reif, Microflow Biomolecular Computation, Biosystems, Journal of Biological and Information Processing Sciences, Vol. 52(1-3), 1999. [PDF]

 













 

About Us  |  R&D Divisions  |  Careers  |  Newsroom  |  Contact Us
© 2017 SRI International 333 Ravenswood Avenue, Menlo Park, CA 94025-3493
SRI International is an independent, nonprofit corporation. Privacy policy