What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hamed Okhravi
Google Scholar
ORCID:
0000-0003-1450-3744
31
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking.
Ben Weintraub
Jiwon Kim
Ran Tao
Cristina Nita-Rotaru
Hamed Okhravi
Dave (Jing) Tian
Benjamin E. Ujcich
2024
conf/uss
VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection.
Samiha Shimmi
Ashiqur Rahman
Mohan Gadde
Hamed Okhravi
Mona Rahimi
2024
conf/acsac
Software Vulnerability Detection Using LLM: Does Additional Information Help?
Samiha Shimmi
Yash Saini
Mark Schaefer
Hamed Okhravi
Mona Rahimi
2022
conf/ccs
MTD '22: 9th ACM Workshop on Moving Target Defense.
Hamed Okhravi
Cliff Wang
2022
conf/ndss
Cross-Language Attacks.
Samuel Mergendahl
Nathan Burow
Hamed Okhravi
2022
conf/ndss
Preventing Kernel Hacks with HAKCs.
Derrick Paul McKee
Yianni Giannaris
Carolina Ortega
Howard E. Shrobe
Mathias Payer
Hamed Okhravi
Nathan Burow
2021
conf/uss
Causal Analysis for Software-Defined Networking Attacks.
Benjamin E. Ujcich
Samuel Jero
Richard Skowyra
Adam Bates
William H. Sanders
Hamed Okhravi
2021
conf/asiaccs
Conware: Automated Modeling of Hardware Peripherals.
Chad Spensky
Aravind Machiry
Nilo Redini
Colin Unger
Graham Foster
Evan Blasband
Hamed Okhravi
Christopher Kruegel
Giovanni Vigna
2021
conf/ndss
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Leila Rashidi
Daniel Kostecki
Alexander James
Anthony Peterson
Majid Ghaderi
Samuel Jero
Cristina Nita-Rotaru
Hamed Okhravi
Reihaneh Safavi-Naini
2021
conf/dsn
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses.
Chad Spensky
Aravind Machiry
Nathan Burow
Hamed Okhravi
Rick Housley
Zhongshu Gu
Hani Jamjoom
Christopher Kruegel
Giovanni Vigna
2021
conf/acsac
Keeping Safe Rust Safe with Galeed.
Elijah Rivera
Samuel Mergendahl
Howard E. Shrobe
Hamed Okhravi
Nathan Burow
2020
conf/ccs
MTD'20: 7th ACM Workshop on Moving Target Defense.
Hamed Okhravi
Cliff Wang
2020
conf/ndss
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.
Benjamin E. Ujcich
Samuel Jero
Richard Skowyra
Steven R. Gomez
Adam Bates
William H. Sanders
Hamed Okhravi
2019
conf/ccs
FirmFuzz: Automated IoT Firmware Introspection and Analysis.
Prashast Srivastava
Hui Peng
Jiahao Li
Hamed Okhravi
Howard E. Shrobe
Mathias Payer
2019
conf/esorics
The Leakage-Resilience Dilemma.
Bryan C. Ward
Richard Skowyra
Chad Spensky
Jason Martin
Hamed Okhravi
2019
conf/dsn
Controller-Oblivious Dynamic Access Control in Software-Defined Networks.
Steven R. Gomez
Samuel Jero
Richard Skowyra
Jason Martin
Patrick Sullivan
David Bigelow
Zachary Ellenbogen
Bryan C. Ward
Hamed Okhravi
James W. Landry
2018
conf/ccs
Cross-App Poisoning in Software-Defined Networking.
Benjamin E. Ujcich
Samuel Jero
Anne Edmundson
Qi Wang
Richard Skowyra
James Landry
Adam Bates
William H. Sanders
Cristina Nita-Rotaru
Hamed Okhravi
2018
conf/dsn
Effective Topology Tampering Attacks and Defenses in Software-Defined Networks.
Richard Skowyra
Lei Xu
Guofei Gu
Veer Dedhia
Thomas Hobson
Hamed Okhravi
James Landry
2018
conf/acsac
On the Effectiveness of Type-based Control Flow Integrity.
Reza Mirzazade Farkhani
Saman Jafari
Sajjad Arshad
William K. Robertson
Engin Kirda
Hamed Okhravi
2017
conf/ccs
MTD 2017: Fourth ACM Workshop on Moving Target Defense (MTD).
Hamed Okhravi
Xinming Ou
2017
conf/uss
Identifier Binding Attacks and Defenses in Software-Defined Networks.
Samuel Jero
William Koch
Richard Skowyra
Hamed Okhravi
Cristina Nita-Rotaru
David Bigelow
2017
conf/ndss
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Robert Rudd
Richard Skowyra
David Bigelow
Veer Dedhia
Thomas Hobson
Stephen Crane
Christopher Liebchen
Per Larsen
Lucas Davi
Michael Franz
Ahmad-Reza Sadeghi
Hamed Okhravi
2017
conf/acsac
QUASAR: Quantitative Attack Space Analysis and Reasoning.
Richard Skowyra
Steven R. Gomez
David Bigelow
James Landry
Hamed Okhravi
2016
conf/ccs
Have No PHEAR: Networks Without Identifiers.
Richard Skowyra
Kevin Bauer
Veer Dedhia
Hamed Okhravi
2015
conf/ccs
Getting Beyond Tit for Tat: Better Strategies for Moving Target Prototyping and Evaluation.
Hamed Okhravi
2015
conf/ccs
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity.
Isaac Evans
Fan Long
Ulziibayar Otgonbaatar
Howard E. Shrobe
Martin C. Rinard
Hamed Okhravi
Stelios Sidiroglou-Douskos
2015
conf/ccs
Timely Rerandomization for Mitigating Memory Disclosures.
David Bigelow
Thomas Hobson
Robert Rudd
William W. Streilein
Hamed Okhravi
2015
conf/sp
Missing the Point(er): On the Effectiveness of Code Pointer Integrity.
Isaac Evans
Sam Fingeret
Julian Gonzalez
Ulziibayar Otgonbaatar
Tiffany Tang
Howard E. Shrobe
Stelios Sidiroglou-Douskos
Martin C. Rinard
Hamed Okhravi
2014
conf/ccs
A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses.
Kevin M. Carter
James Riordan
Hamed Okhravi
2014
conf/ccs
On the Challenges of Effective Movement.
Thomas Hobson
Hamed Okhravi
David Bigelow
Robert Rudd
William W. Streilein
2009
conf/acsac
TrustGraph: Trusted Graphics Subsystem for High Assurance Systems.
Hamed Okhravi
David M. Nicol
Coauthors
Adam Bates
(3)
Ahmad-Reza Sadeghi
(1)
Alexander James
(1)
Anne Edmundson
(1)
Anthony Peterson
(1)
Aravind Machiry
(2)
Ashiqur Rahman
(1)
Ben Weintraub
(1)
Benjamin E. Ujcich
(4)
Bryan C. Ward
(2)
Carolina Ortega
(1)
Chad Spensky
(3)
Christopher Kruegel
(2)
Christopher Liebchen
(1)
Cliff Wang
(2)
Colin Unger
(1)
Cristina Nita-Rotaru
(4)
Daniel Kostecki
(1)
Dave (Jing) Tian
(1)
David Bigelow
(6)
David M. Nicol
(1)
Derrick Paul McKee
(1)
Elijah Rivera
(1)
Engin Kirda
(1)
Evan Blasband
(1)
Fan Long
(1)
Giovanni Vigna
(2)
Graham Foster
(1)
Guofei Gu
(1)
Hamed Okhravi
(31)
Hani Jamjoom
(1)
Howard E. Shrobe
(5)
Hui Peng
(1)
Isaac Evans
(2)
James Landry
(3)
James Riordan
(1)
James W. Landry
(1)
Jason Martin
(2)
Jiahao Li
(1)
Jiwon Kim
(1)
Julian Gonzalez
(1)
Kevin Bauer
(1)
Kevin M. Carter
(1)
Lei Xu
(1)
Leila Rashidi
(1)
Lucas Davi
(1)
Majid Ghaderi
(1)
Mark Schaefer
(1)
Martin C. Rinard
(2)
Mathias Payer
(2)
Michael Franz
(1)
Mohan Gadde
(1)
Mona Rahimi
(2)
Nathan Burow
(4)
Nilo Redini
(1)
Patrick Sullivan
(1)
Per Larsen
(1)
Prashast Srivastava
(1)
Qi Wang
(1)
Ran Tao
(1)
Reihaneh Safavi-Naini
(1)
Reza Mirzazade Farkhani
(1)
Richard Skowyra
(10)
Rick Housley
(1)
Robert Rudd
(3)
Sajjad Arshad
(1)
Sam Fingeret
(1)
Saman Jafari
(1)
Samiha Shimmi
(2)
Samuel Jero
(6)
Samuel Mergendahl
(2)
Stelios Sidiroglou-Douskos
(2)
Stephen Crane
(1)
Steven R. Gomez
(3)
Thomas Hobson
(4)
Tiffany Tang
(1)
Ulziibayar Otgonbaatar
(2)
Veer Dedhia
(3)
William H. Sanders
(3)
William K. Robertson
(1)
William Koch
(1)
William W. Streilein
(2)
Xinming Ou
(1)
Yash Saini
(1)
Yianni Giannaris
(1)
Zachary Ellenbogen
(1)
Zhongshu Gu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to