Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Hierarchical Change Mining to Manage Network Security Policy Evolution., , , , and . Hot-ICE, USENIX Association, (2011)Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios., , , , and . WOOT, page 54-61. USENIX Association, (2011)Bolt-On Security Extensions for Industrial Control System Protocols: A Case Study of DNP3 SAv5., and . IEEE Security & Privacy, 13 (3): 74-79 (2015)Why Do Street-Smart People Do Stupid Things Online?, , and . IEEE Security & Privacy, 6 (3): 71-74 (2008)Hacker Curriculum: How We Can Use It in Teaching., and . IEEE Distributed Systems Online, (2007)Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel., , and . ACSAC, page 528-541. ACM, (2017)'Weird Machine' Patterns., , , , , and . Cyberpatterns, Springer, (2014)Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware., , and . ACSAC, page 116-125. ACM, (2014)Security Applications of Formal Language Theory., , , and . IEEE Systems Journal, 7 (3): 489-500 (2013)Why Wassenaar Arrangement's Definitions of "Intrusion Software" and "Controlled Items" Put Security Research and Defense At Risk., , and . ;login:, (2014)