Folgen
Samuel Jero
Samuel Jero
Network Security Researcher, MIT Lincoln Laboratory
Bestätigte E-Mail-Adresse bei ll.mit.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols
AM Kakhki, S Jero, D Choffnes, A Mislove, C Nita-Rotaru
ACM Internet Measurement Conference (IMC), 2017
1262017
How secure and quick is QUIC? Provable security and performance analyses
R Lychev, S Jero, A Boldyreva, C Nita-Rotaru
2015 IEEE Symposium on Security and Privacy, 214-231, 2015
1062015
Identifier Binding Attacks and Defenses in Software-Defined Networks
S Jero, W Koch, R Skowyra, H Okhravi, C Nita-Rotaru, D Bigelow
26th USENIX Security Symposium, 415-432, 2017
572017
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
372018
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach
S Jero, E Hoque, D Choffnes, A Mislove, C Nita-Rotaru
Network and Distributed Systems Security Symposium (NDSS), 2018
352018
BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems
S Jero, X Bu, C Nita-Rotaru, H Okhravi, R Skowyra, S Fahmy
20th International Symposium on Research in Attacks, Intrusions, and …, 2017
352017
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
S Jero, H Lee, C Nita-Rotaru
45th IEEE/IFIP International Conference on Dependable Systems and Networks …, 2015
252015
Datagram Convergence Layers for the Delay-and Disruption-Tolerant Networking (DTN) Bundle Protocol and Licklider Transmission Protocol (LTP).
H Kruse, S Jero, S Ostermann
RFC 7122, 1-11, 2014
16*2014
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru
The European Symposium on Research in Computer Security (ESORICS), 2019
132019
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols
AM Kakhki, S Jero, D Choffnes, C Nita-Rotaru, A Mislove
Communications of the ACM 62 (7), 86-94, 2019
132019
Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols
S Jero, ML Pacheco, D Goldwasser, C Nita-Rotaru
Conference on Innovative Applications of Artificial Intelligence (IAAI), 2019
102019
Dynamic control of real-time communication (RTC) using SDN: A case study of a 5G end-to-end service
S Jero, VK Gurbani, R Miller, B Cilli, C Payette, S Sharma
IEEE/IFIP Network Operations and Management Symposium, 2016
92016
Controller-Oblivious Dynamic Access Control in Software-Defined Networks
SR Gomez, S Jero, R Skowyra, J Martin, P Sullivan, D Bigelow, ...
49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019
72019
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking
BE Ujcich, S Jero, R Skowyra, SR Gomez, A Bates, WH Sanders, ...
Network and Distributed Systems Security Symposium (NDSS), 2020
52020
Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC
S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru
Journal of Cryptology 34 (3), 1-41, 2021
22021
Practical Principle of Least Privilege for Secure Embedded Systems
S Jero, J Furgala, R Pan, PK Gadepalli, A Clifford, B Ye, R Khazan, ...
27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2021
22021
aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach
A Peterson, S Jero, E Hoque, D Choffnes, C Nita-Rotaru
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
22020
One Giant Leap for Computer Security
H Okhravi, N Burow, R Skowyra, B Ward, S Jero, R Khazan, H Shrobe
22020
Causal Analysis for Software-Defined Networking Attacks
BE Ujcich, S Jero, R Skowyra, A Bates, WH Sanders, H Okhravi
30th USENIX Security Symposium (USENIX Security 21), 2021
12021
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes
L Rashidi, D Kostecki, A James, A Peterson, M Ghaderi, S Jero, ...
Network and Distributed Systems Security Symposium (NDSS), 2021
12021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20