Author of the publication

Identifier Binding Attacks and Defenses in Software-Defined Networks.

, , , , , and . USENIX Security Symposium, page 415-432. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems., , , , , , , and . RTSS, page 469-481. IEEE, (2021)Data diodes in support of trustworthy cyber infrastructure., and . CSIIRW, page 23. ACM, (2010)On the Challenges of Effective Movement., , , , and . MTD@CCS, page 41-50. ACM, (2014)Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity., , , , , , and . ACM Conference on Computer and Communications Security, page 901-913. ACM, (2015)MTD'20: 7th ACM Workshop on Moving Target Defense., and . ACM Conference on Computer and Communications Security, page 2137-2138. ACM, (2020)Dedicated vs. distributed: A study of mission survivability metrics., , , , and . MILCOM, page 1345-1350. IEEE, (2011)On the Effectiveness of Type-based Control Flow Integrity., , , , , and . ACSAC, page 28-39. ACM, (2018)Causal Analysis for Software-Defined Networking Attacks., , , , , and . USENIX Security Symposium, page 3183-3200. USENIX Association, (2021)Preventing Kernel Hacks with HAKCs., , , , , , and . NDSS, The Internet Society, (2022)Performance analysis of binary code protection., and . WSC, page 601-610. IEEE Computer Society, (2005)