Hamed Okhravi

Orcid: 0000-0003-1450-3744

Affiliations:
  • Massachusetts Institute of Technology, Lexington, MA, USA


According to our database1, Hamed Okhravi authored at least 61 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Security Challenges of Intent-Based Networking.
Commun. ACM, July, 2024

Memory Safety.
IEEE Secur. Priv., 2024

VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
TAG: Tagged Architecture Guide.
ACM Comput. Surv., 2023

2022
"Free" as in Freedom to Protest?
IEEE Secur. Priv., 2022

Cross-Language Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Preventing Kernel Hacks with HAKCs.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

MTD '22: 9th ACM Workshop on Moving Target Defense.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Perspectives on the SolarWinds Incident.
IEEE Secur. Priv., 2021

A Cybersecurity Moonshot.
IEEE Secur. Priv., 2021

Lessons Learned From Designing a Security Architecture for Real-World Government Agencies.
IEEE Secur. Priv., 2021

Causal Analysis for Software-Defined Networking Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems.
Proceedings of the 42nd IEEE Real-Time Systems Symposium, 2021

More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Conware: Automated Modeling of Hardware Peripherals.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Keeping Safe Rust Safe with Galeed.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
One Giant Leap for Computer Security.
IEEE Secur. Priv., 2020

Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

MTD'20: 7th ACM Workshop on Moving Target Defense.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
The Leakage-Resilience Dilemma.
Proceedings of the Computer Security - ESORICS 2019, 2019

Control-Flow Integrity for Real-Time Embedded Systems.
Proceedings of the 31st Euromicro Conference on Real-Time Systems, 2019

Controller-Oblivious Dynamic Access Control in Software-Defined Networks.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

FirmFuzz: Automated IoT Firmware Introspection and Analysis.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
Changing the Game of Software Security.
IEEE Secur. Priv., 2018

There's a Hole in the Bottom of the C: On the Effectiveness of Allocation Protection.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

TabulaROSA: Tabular Operating System Architecture for Massively Parallel Heterogeneous Compute Engines.
Proceedings of the 2018 IEEE High Performance Extreme Computing Conference, 2018

Effective Topology Tampering Attacks and Defenses in Software-Defined Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Cross-App Poisoning in Software-Defined Networking.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

On the Effectiveness of Type-based Control Flow Integrity.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Diversity and information leaks.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Identifier Binding Attacks and Defenses in Software-Defined Networks.
Proceedings of the 26th USENIX Security Symposium, 2017

BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

MTD 2017: Fourth ACM Workshop on Moving Target Defense (MTD).
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

QUASAR: Quantitative Attack Space Analysis and Reasoning.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Have No PHEAR: Networks Without Identifiers.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

2015
Missing the Point(er): On the Effectiveness of Code Pointer Integrity.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Getting Beyond Tit for Tat: Better Strategies for Moving Target Prototyping and Evaluation.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Timely Rerandomization for Mitigating Memory Disclosures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Finding Focus in the Blur of Moving-Target Techniques.
IEEE Secur. Priv., 2014

Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity.
CoRR, 2014

Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

On the Challenges of Effective Movement.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
Systematic Analysis of Defenses against Return-Oriented Programming.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Creating a cyber moving target for critical infrastructure applications using platform diversity.
Int. J. Crit. Infrastructure Prot., 2012

2011
Dedicated vs. distributed: A study of mission survivability metrics.
Proceedings of the MILCOM 2011, 2011

Creating a Cyber Moving Target for Critical Infrastructure Applications.
Proceedings of the Critical Infrastructure Protection V, 2011

MyABDAC: compiling XACML policies for attribute-based database access control.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Trusted and high assurance systems
PhD thesis, 2010

Covert channel resistant information leakage protection using a multi-agent architecture.
IET Inf. Secur., 2010

Data diodes in support of trustworthy cyber infrastructure.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Application of trusted network technology to industrial control networks.
Int. J. Crit. Infrastructure Prot., 2009

PolicyGlobe: a framework for integrating network and operating system security policies.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Information Leakage Detection in Distributed Systems using Software Agent.
Proceedings of the IEEE Symposium on Intelligent Agents, IA 2009, part of the IEEE Symposium Series on Computational Intelligence 2009, Nashville, TN, USA, March 30, 2009, 2009

TrustGraph: Trusted Graphics Subsystem for High Assurance Systems.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Applying Trusted Network Technology To Process Control Systems.
Proceedings of the Critical Infrastructure Protection II, 2008

2005
Performance analysis of binary code protection.
Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, 2005


  Loading...