Author of the publication

Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.

, , , , , , and . NDSS, The Internet Society, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ellipsis: Towards Efficient System Auditing for Real-Time Systems., , , , , and . CoRR, (2022)Accountable wiretapping - or - I know they can hear you now., , , , , and . J. Comput. Secur., 23 (2): 167-195 (2015)Making USB Great Again with USBFILTER., , , , and . USENIX Security Symposium, page 415-430. USENIX Association, (2016)Skill Squatting Attacks on Amazon Alexa., , , , , , and . USENIX Security Symposium, page 33-47. USENIX Association, (2018)NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage., , , , , , and . NDSS, The Internet Society, (2019)Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution., , , , , , and . NDSS, The Internet Society, (2020)Fear and Logging in the Internet of Things., , , and . NDSS, The Internet Society, (2018)A Provenance Model for the European Union General Data Protection Regulation., , and . IPAW, volume 11017 of Lecture Notes in Computer Science, page 45-57. Springer, (2018)Tactical Provenance Analysis for Endpoint Detection and Response Systems., , and . SP, page 1172-1189. IEEE, (2020)Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks., , , , , and . CCS, page 3337-3351. ACM, (2021)