Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols AM Kakhki, S Jero, D Choffnes, A Mislove, C Nita-Rotaru ACM Internet Measurement Conference (IMC), 2017 | 180 | 2017 |
How secure and quick is QUIC? Provable security and performance analyses R Lychev, S Jero, A Boldyreva, C Nita-Rotaru 2015 IEEE Symposium on Security and Privacy, 214-231, 2015 | 129 | 2015 |
Identifier Binding Attacks and Defenses in Software-Defined Networks S Jero, W Koch, R Skowyra, H Okhravi, C Nita-Rotaru, D Bigelow 26th USENIX Security Symposium, 415-432, 2017 | 91 | 2017 |
Cross-app poisoning in software-defined networking BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ... Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 60 | 2018 |
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach S Jero, E Hoque, D Choffnes, A Mislove, C Nita-Rotaru Network and Distributed Systems Security Symposium (NDSS), 2018 | 57 | 2018 |
BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems S Jero, X Bu, C Nita-Rotaru, H Okhravi, R Skowyra, S Fahmy 20th International Symposium on Research in Attacks, Intrusions, and …, 2017 | 55 | 2017 |
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations S Jero, H Lee, C Nita-Rotaru 45th IEEE/IFIP International Conference on Dependable Systems and Networks …, 2015 | 31 | 2015 |
Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols S Jero, ML Pacheco, D Goldwasser, C Nita-Rotaru Conference on Innovative Applications of Artificial Intelligence (IAAI), 2019 | 29 | 2019 |
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru The European Symposium on Research in Computer Security (ESORICS), 2019 | 23 | 2019 |
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols AM Kakhki, S Jero, D Choffnes, C Nita-Rotaru, A Mislove Communications of the ACM 62 (7), 86-94, 2019 | 19 | 2019 |
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking BE Ujcich, S Jero, R Skowyra, SR Gomez, A Bates, WH Sanders, ... Network and Distributed Systems Security Symposium (NDSS), 2020 | 18 | 2020 |
Datagram Convergence Layers for the Delay-and Disruption-Tolerant Networking (DTN) Bundle Protocol and Licklider Transmission Protocol (LTP). H Kruse, S Jero, S Ostermann RFC 7122, 1-11, 2014 | 17* | 2014 |
TAG: Tagged Architecture Guide S Jero, N Burow, B Ward, R Skowyra, R Khazan, H Shrobe, H Okhravi ACM Computing Surveys (CSUR), 2022 | 15 | 2022 |
Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru Journal of Cryptology 34 (3), 26, 2021 | 14 | 2021 |
Controller-Oblivious Dynamic Access Control in Software-Defined Networks SR Gomez, S Jero, R Skowyra, J Martin, P Sullivan, D Bigelow, ... 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019 | 12 | 2019 |
Practical Principle of Least Privilege for Secure Embedded Systems S Jero, J Furgala, R Pan, PK Gadepalli, A Clifford, B Ye, R Khazan, ... 27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2021 | 11 | 2021 |
Causal Analysis for Software-Defined Networking Attacks BE Ujcich, S Jero, R Skowyra, A Bates, WH Sanders, H Okhravi 30th USENIX Security Symposium (USENIX Security 21), 2021 | 11 | 2021 |
Dynamic control of real-time communication (RTC) using SDN: A case study of a 5G end-to-end service S Jero, VK Gurbani, R Miller, B Cilli, C Payette, S Sharma IEEE/IFIP Network Operations and Management Symposium, 2016 | 11 | 2016 |
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes L Rashidi, D Kostecki, A James, A Peterson, M Ghaderi, S Jero, ... Network and Distributed Systems Security Symposium (NDSS), 2021 | 7 | 2021 |
The thundering herd: Amplifying kernel interference to attack response times S Mergendahl, S Jero, BC Ward, J Furgala, G Parmer, R Skowyra 2022 IEEE 28th Real-Time and Embedded Technology and Applications Symposium …, 2022 | 6 | 2022 |