Hamed Okhravi
Orcid: 0000-0003-1450-3744
According to our database1,
Hamed Okhravi
authored at least 60 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies.
IEEE Secur. Priv., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Real-Time Systems Symposium, 2021
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 31st Euromicro Conference on Real-Time Systems, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019
2018
There's a Hole in the Bottom of the C: On the Effectiveness of Allocation Protection.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
TabulaROSA: Tabular Operating System Architecture for Massively Parallel Heterogeneous Compute Engines.
Proceedings of the 2018 IEEE High Performance Extreme Computing Conference, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Getting Beyond Tit for Tat: Better Strategies for Moving Target Prototyping and Evaluation.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
CoRR, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
2012
Creating a cyber moving target for critical infrastructure applications using platform diversity.
Int. J. Crit. Infrastructure Prot., 2012
2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the Critical Infrastructure Protection V, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2010
Covert channel resistant information leakage protection using a multi-agent architecture.
IET Inf. Secur., 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Int. J. Crit. Infrastructure Prot., 2009
PolicyGlobe: a framework for integrating network and operating system security policies.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009
Proceedings of the IEEE Symposium on Intelligent Agents, IA 2009, part of the IEEE Symposium Series on Computational Intelligence 2009, Nashville, TN, USA, March 30, 2009, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Critical Infrastructure Protection II, 2008
2005
Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, 2005