Author of the publication

Cross-App Poisoning in Software-Defined Networking.

, , , , , , , , , and . ACM Conference on Computer and Communications Security, page 648-663. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols., , , and . AAAI, page 9478-9483. AAAI Press, (2019)Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach., , , , and . ANRW, page 95. ACM, (2018)Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols., , , and . CoRR, (2018)Datagram Convergence Layers for the Delay- and Disruption-Tolerant Networking (DTN) Bundle Protocol and Licklider Transmission Protocol (LTP)., , and . RFC, (March 2014)Cross-App Poisoning in Software-Defined Networking., , , , , , , , , and . ACM Conference on Computer and Communications Security, page 648-663. ACM, (2018)How Secure and Quick is QUIC? Provable Security and Performance Analyses., , , and . IACR Cryptology ePrint Archive, (2015)BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems., , , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 311-333. Springer, (2017)Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations., , and . DSN, page 1-12. IEEE Computer Society, (2015)Dynamic control of real-time communication (RTC) using SDN: A case study of a 5G end-to-end service., , , , , and . NOMS, page 895-900. IEEE, (2016)Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols., , , , and . Commun. ACM, 62 (7): 86-94 (2019)