Control jujutsu: On the weaknesses of fine-grained control flow integrity I Evans, F Long, U Otgonbaatar, H Shrobe, M Rinard, H Okhravi, ... ACM Conference on Computer and Communications Security (CCS), 901-913, 2015 | 317 | 2015 |
SCADA cyber security testbed development CM Davis, JE Tate, H Okhravi, C Grier, TJ Overbye, D Nicol North American Power Symposium (NAPS), 483-488, 2006 | 269 | 2006 |
Missing the Point (er): On the Effectiveness of Code Pointer Integrity I Evans, S Fingeret, J González, U Otgonbaatar, T Tang, H Shrobe, ... IEEE Symposium on Security and Privacy (Oakland), 2015 | 230 | 2015 |
Finding focus in the blur of moving-target techniques H Okhravi, T Hobson, D Bigelow, W Streilein IEEE Security & Privacy 12 (2), 16-26, 2013 | 229 | 2013 |
Timely rerandomization for mitigating memory disclosures D Bigelow, T Hobson, R Rudd, W Streilein, H Okhravi ACM Conference on Computer and Communications Security (CCS), 268-279, 2015 | 208 | 2015 |
Information leaks without memory disclosures: Remote side channel attacks on diversified code J Seibert, H Okhravi, E Söderström ACM Conference on Computer and Communications Security (CCS), 54-65, 2014 | 193 | 2014 |
Survey of cyber moving target techniques H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ... MIT Lincoln Laboratory Technical Report, 2013 | 127* | 2013 |
Creating a cyber moving target for critical infrastructure applications using platform diversity H Okhravi, A Comella, E Robinson, J Haines International Journal of Critical Infrastructure Protection 5 (1), 30-39, 2012 | 99 | 2012 |
Firmfuzz: Automated iot firmware introspection and analysis P Srivastava, H Peng, J Li, H Okhravi, H Shrobe, M Payer Proceedings of the 2nd International ACM Workshop on Security and Privacy …, 2019 | 91 | 2019 |
A game theoretic approach to strategy determination for dynamic platform defenses KM Carter, JF Riordan, H Okhravi Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 21-30, 2014 | 91 | 2014 |
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ... Network & Distributed System Security (NDSS), 2017 | 90 | 2017 |
Identifier binding attacks and defenses in {Software-Defined} networks S Jero, W Koch, R Skowyra, H Okhravi, C Nita-Rotaru, D Bigelow 26th USENIX Security Symposium (USENIX Security 17), 415-432, 2017 | 87 | 2017 |
Effective topology tampering attacks and defenses in software-defined networks R Skowyra, L Xu, G Gu, V Dedhia, T Hobson, H Okhravi, J Landry 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 83 | 2018 |
Perspectives on the solarwinds incident S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ... IEEE Security & Privacy 19 (2), 7-13, 2021 | 75 | 2021 |
Design, implementation and evaluation of covert channel attacks H Okhravi, S Bak, ST King IEEE International Conference on Technologies for Homeland Security (HST …, 2010 | 63 | 2010 |
Survey of cyber moving targets second edition BC Ward, SR Gomez, R Skowyra, D Bigelow, J Martin, J Landry, ... MIT Lincoln Laboratory Lexington United States, Tech. Rep, 2018 | 62 | 2018 |
Control-flow integrity for real-time embedded systems RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward 31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019 | 59 | 2019 |
Cross-app poisoning in software-defined networking BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ... Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 59 | 2018 |
Quantitative evaluation of dynamic platform techniques as a defensive mechanism H Okhravi, J Riordan, K Carter Symposium on Research in Attacks, Intrusions and Defenses (RAID), 405-425, 2014 | 57 | 2014 |
Beads: Automated attack discovery in openflow-based sdn systems S Jero, X Bu, C Nita-Rotaru, H Okhravi, R Skowyra, S Fahmy Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 55 | 2017 |