Hamed Okhravi
Hamed Okhravi
Senior Researcher at MIT Lincoln Laboratory
Bestätigte E-Mail-Adresse bei mit.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
SCADA cyber security testbed development
CM Davis, JE Tate, H Okhravi, C Grier, TJ Overbye, D Nicol
North American Power Symposium (NAPS), 483-488, 2006
2162006
Control jujutsu: On the weaknesses of fine-grained control flow integrity
I Evans, F Long, U Otgonbaatar, H Shrobe, M Rinard, H Okhravi, ...
ACM Conference on Computer and Communications Security (CCS), 901-913, 2015
2052015
Missing the Point (er): On the Effectiveness of Code Pointer Integrity
I Evans, S Fingeret, J González, U Otgonbaatar, T Tang, H Shrobe, ...
IEEE Symposium on Security and Privacy (Oakland), 2015
1602015
Finding focus in the blur of moving-target techniques
H Okhravi, T Hobson, D Bigelow, W Streilein
IEEE Security & Privacy 12 (2), 16-26, 2013
1562013
Information leaks without memory disclosures: Remote side channel attacks on diversified code
J Seibert, H Okhravi, E Söderström
ACM Conference on Computer and Communications Security (CCS), 54-65, 2014
1452014
Timely rerandomization for mitigating memory disclosures
D Bigelow, T Hobson, R Rudd, W Streilein, H Okhravi
ACM Conference on Computer and Communications Security (CCS), 268-279, 2015
1422015
Creating a cyber moving target for critical infrastructure applications using platform diversity
H Okhravi, A Comella, E Robinson, J Haines
International Journal of Critical Infrastructure Protection 5 (1), 30-39, 2012
672012
A game theoretic approach to strategy determination for dynamic platform defenses
KM Carter, JF Riordan, H Okhravi
Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 21-30, 2014
602014
Survey of cyber moving target techniques
H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ...
MIT Lincoln Laboratory Technical Report, 2013
532013
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
Network & Distributed System Security (NDSS), 2017
442017
Identifier binding attacks and defenses in software-defined networks
S Jero, W Koch, R Skowyra, H Okhravi, C Nita-Rotaru, D Bigelow
26th {USENIX} Security Symposium ({USENIX} Security 17), 415-432, 2017
422017
On the challenges of effective movement
T Hobson, H Okhravi, D Bigelow, R Rudd, W Streilein
Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 41-50, 2014
422014
Quantitative evaluation of dynamic platform techniques as a defensive mechanism
H Okhravi, J Riordan, K Carter
Symposium on Research in Attacks, Intrusions and Defenses (RAID), 405-425, 2014
422014
Design, implementation and evaluation of covert channel attacks
H Okhravi, S Bak, ST King
IEEE International Conference on Technologies for Homeland Security (HST …, 2010
422010
Survey of cyber moving targets
H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ...
Lincoln Laboratory-Massachusetts Institute of Technology Technical Report, 2013
382013
Effective topology tampering attacks and defenses in software-defined networks
R Skowyra, L Xu, G Gu, V Dedhia, T Hobson, H Okhravi, J Landry
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
312018
Have No PHEAR: Networks Without Identifiers
R Skowyra, K Bauer, V Dedhia, H Okhravi
Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 3-14, 2016
302016
Myabdac: compiling xacml policies for attribute-based database access control
S Jahid, CA Gunter, I Hoque, H Okhravi
ACM Conference on Data and Application Security and Privacy (CODASPY), 97-108, 2011
282011
BEADS: automated attack discovery in OpenFlow-based SDN systems
S Jero, X Bu, C Nita-Rotaru, H Okhravi, R Skowyra, S Fahmy
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
242017
Systematic analysis of defenses against return-oriented programming
R Skowyra, K Casteel, H Okhravi, N Zeldovich, W Streilein
Symposium on Research in Attacks, Intrusions and Defenses (RAID), 82-102, 2013
242013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20