Author of the publication

Cross-App Poisoning in Software-Defined Networking.

, , , , , , , , , and . ACM Conference on Computer and Communications Security, page 648-663. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity., , and . CoRR, (2014)BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems., , , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 311-333. Springer, (2017)FirmFuzz: Automated IoT Firmware Introspection and Analysis., , , , , and . IoT S&P@CCS, page 15-21. ACM, (2019)MyABDAC: compiling XACML policies for attribute-based database access control., , , and . CODASPY, page 97-108. ACM, (2011)Covert channel resistant information leakage protection using a multi-agent architecture., , , and . IET Information Security, 4 (4): 233-247 (2010)Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity., , , , , , and . ACM Conference on Computer and Communications Security, page 901-913. ACM, (2015)Dedicated vs. distributed: A study of mission survivability metrics., , , , and . MILCOM, page 1345-1350. IEEE, (2011)On the Challenges of Effective Movement., , , , and . MTD@CCS, page 41-50. ACM, (2014)On the Effectiveness of Type-based Control Flow Integrity., , , , , and . ACSAC, page 28-39. ACM, (2018)Data diodes in support of trustworthy cyber infrastructure., and . CSIIRW, page 23. ACM, (2010)