default search action
Hamed Okhravi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Jiwon Kim, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich:
Security Challenges of Intent-Based Networking. Commun. ACM 67(7): 56-65 (2024) - [j12]Hamed Okhravi:
Memory Safety. IEEE Secur. Priv. 22(4): 13-15 (2024) - [c44]Samiha Shimmi, Ashiqur Rahman, Mohan Gadde, Hamed Okhravi, Mona Rahimi:
VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection. USENIX Security Symposium 2024 - 2023
- [j11]Samuel Jero, Nathan Burow, Bryan C. Ward, Richard Skowyra, Roger Khazan, Howard E. Shrobe, Hamed Okhravi:
TAG: Tagged Architecture Guide. ACM Comput. Surv. 55(6): 124:1-124:34 (2023) - 2022
- [j10]Fabio Massacci, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, Daniel E. Geer:
"Free" as in Freedom to Protest? IEEE Secur. Priv. 20(5): 16-21 (2022) - [c43]Hamed Okhravi, Cliff Wang:
MTD '22: 9th ACM Workshop on Moving Target Defense. CCS 2022: 3539-3540 - [c42]Derrick Paul McKee, Yianni Giannaris, Carolina Ortega, Howard E. Shrobe, Mathias Payer, Hamed Okhravi, Nathan Burow:
Preventing Kernel Hacks with HAKCs. NDSS 2022 - [c41]Samuel Mergendahl, Nathan Burow, Hamed Okhravi:
Cross-Language Attacks. NDSS 2022 - [e3]Hamed Okhravi, Cliff Wang:
Proceedings of the 9th ACM Workshop on Moving Target Defense, MTD 2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9878-7 [contents] - 2021
- [j9]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j8]Hamed Okhravi:
A Cybersecurity Moonshot. IEEE Secur. Priv. 19(3): 8-16 (2021) - [j7]Amy Dettmer, Hamed Okhravi, Kevin Perry, Nabil Schear, Richard Shay, Mary Ellen Zurko, Paula J. Donovan:
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies. IEEE Secur. Priv. 19(4): 28-36 (2021) - [c40]Elijah Rivera, Samuel Mergendahl, Howard E. Shrobe, Hamed Okhravi, Nathan Burow:
Keeping Safe Rust Safe with Galeed. ACSAC 2021: 824-836 - [c39]Chad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi, Christopher Kruegel, Giovanni Vigna:
Conware: Automated Modeling of Hardware Peripherals. AsiaCCS 2021: 95-109 - [c38]Chad Spensky, Aravind Machiry, Nathan Burow, Hamed Okhravi, Rick Housley, Zhongshu Gu, Hani Jamjoom, Christopher Kruegel, Giovanni Vigna:
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses. DSN 2021: 400-412 - [c37]Leila Rashidi, Daniel Kostecki, Alexander James, Anthony Peterson, Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Hamed Okhravi, Reihaneh Safavi-Naini:
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes. NDSS 2021 - [c36]Claire Nord, Shai Caspin, Catherine E. Nemitz, Howard E. Shrobe, Hamed Okhravi, James H. Anderson, Nathan Burow, Bryan C. Ward:
TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems. RTSS 2021: 469-481 - [c35]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, Hamed Okhravi:
Causal Analysis for Software-Defined Networking Attacks. USENIX Security Symposium 2021: 3183-3200 - 2020
- [j6]Hamed Okhravi, Nathan Burow, Richard Skowyra, Bryan C. Ward, Samuel Jero, Roger Khazan, Howard E. Shrobe:
One Giant Leap for Computer Security. IEEE Secur. Priv. 18(4): 8-19 (2020) - [c34]Hamed Okhravi, Cliff Wang:
MTD'20: 7th ACM Workshop on Moving Target Defense. CCS 2020: 2137-2138 - [c33]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi:
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking. NDSS 2020 - [e2]Hamed Okhravi, Cliff Wang:
Proceedings of the 7th ACM Workshop on Moving Target Defense, MTD@CCS 2020, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8085-0 [contents]
2010 – 2019
- 2019
- [c32]Prashast Srivastava, Hui Peng, Jiahao Li, Hamed Okhravi, Howard E. Shrobe, Mathias Payer:
FirmFuzz: Automated IoT Firmware Introspection and Analysis. IoT S&P@CCS 2019: 15-21 - [c31]Steven R. Gomez, Samuel Jero, Richard Skowyra, Jason Martin, Patrick Sullivan, David Bigelow, Zachary Ellenbogen, Bryan C. Ward, Hamed Okhravi, James W. Landry:
Controller-Oblivious Dynamic Access Control in Software-Defined Networks. DSN 2019: 447-459 - [c30]Robert J. Walls, Nicholas F. Brown, Thomas Le Baron, Craig A. Shue, Hamed Okhravi, Bryan C. Ward:
Control-Flow Integrity for Real-Time Embedded Systems. ECRTS 2019: 2:1-2:24 - [c29]Bryan C. Ward, Richard Skowyra, Chad Spensky, Jason Martin, Hamed Okhravi:
The Leakage-Resilience Dilemma. ESORICS (1) 2019: 87-106 - 2018
- [j5]Timothy Vidas, Per Larsen, Hamed Okhravi, Ahmad-Reza Sadeghi:
Changing the Game of Software Security. IEEE Secur. Priv. 16(2): 10-11 (2018) - [c28]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. ACSAC 2018: 28-39 - [c27]Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi:
Cross-App Poisoning in Software-Defined Networking. CCS 2018: 648-663 - [c26]Richard Skowyra, Lei Xu, Guofei Gu, Veer Dedhia, Thomas Hobson, Hamed Okhravi, James Landry:
Effective Topology Tampering Attacks and Defenses in Software-Defined Networks. DSN 2018: 374-385 - [c25]Jeremy Kepner, Ron Brightwell, Alan Edelman, Vijay Gadepally, Hayden Jananthan, Michael Jones, Sam Madden, Peter Michaleas, Hamed Okhravi, Kevin T. Pedretti, Albert Reuther, Thomas L. Sterling, Mike Stonebraker:
TabulaROSA: Tabular Operating System Architecture for Massively Parallel Heterogeneous Compute Engines. HPEC 2018: 1-8 - [c24]Ronald Gil, Hamed Okhravi, Howard E. Shrobe:
There's a Hole in the Bottom of the C: On the Effectiveness of Allocation Protection. SecDev 2018: 102-109 - [p1]Stephen Crane, Andrei Homescu, Per Larsen, Hamed Okhravi, Michael Franz:
Diversity and information leaks. The Continuing Arms Race 2018: 61-79 - [i3]Jeremy Kepner, Ron Brightwell, Alan Edelman, Vijay Gadepally, Hayden Jananthan, Michael Jones, Sam Madden, Peter Michaleas, Hamed Okhravi, Kevin T. Pedretti, Albert Reuther, Thomas L. Sterling, Mike Stonebraker:
TabulaROSA: Tabular Operating System Architecture for Massively Parallel Heterogeneous Compute Engines. CoRR abs/1807.05308 (2018) - [i2]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. CoRR abs/1810.10649 (2018) - 2017
- [c23]Richard Skowyra, Steven R. Gomez, David Bigelow, James Landry, Hamed Okhravi:
QUASAR: Quantitative Attack Space Analysis and Reasoning. ACSAC 2017: 68-78 - [c22]Hamed Okhravi, Xinming Ou:
MTD 2017: Fourth ACM Workshop on Moving Target Defense (MTD). CCS 2017: 2637-2638 - [c21]Robert Rudd, Richard Skowyra, David Bigelow, Veer Dedhia, Thomas Hobson, Stephen Crane, Christopher Liebchen, Per Larsen, Lucas Davi, Michael Franz, Ahmad-Reza Sadeghi, Hamed Okhravi:
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. NDSS 2017 - [c20]Samuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi, Richard Skowyra, Sonia Fahmy:
BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems. RAID 2017: 311-333 - [c19]Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow:
Identifier Binding Attacks and Defenses in Software-Defined Networks. USENIX Security Symposium 2017: 415-432 - [e1]Hamed Okhravi, Xinming Ou:
Proceedings of the 2017 Workshop on Moving Target Defense, MTD@CCS 2017, Dallas, TX, USA, October 30, 2017. ACM 2017, ISBN 978-1-4503-5176-8 [contents] - 2016
- [c18]Richard Skowyra, Kevin Bauer, Veer Dedhia, Hamed Okhravi:
Have No PHEAR: Networks Without Identifiers. MTD@CCS 2016: 3-14 - 2015
- [c17]Hamed Okhravi:
Getting Beyond Tit for Tat: Better Strategies for Moving Target Prototyping and Evaluation. MTD@CCS 2015: 55 - [c16]David Bigelow, Thomas Hobson, Robert Rudd, William W. Streilein, Hamed Okhravi:
Timely Rerandomization for Mitigating Memory Disclosures. CCS 2015: 268-279 - [c15]Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard E. Shrobe, Martin C. Rinard, Hamed Okhravi, Stelios Sidiroglou-Douskos:
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. CCS 2015: 901-913 - [c14]Isaac Evans, Sam Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard E. Shrobe, Stelios Sidiroglou-Douskos, Martin C. Rinard, Hamed Okhravi:
Missing the Point(er): On the Effectiveness of Code Pointer Integrity. IEEE Symposium on Security and Privacy 2015: 781-796 - 2014
- [j4]Hamed Okhravi, Thomas Hobson, David Bigelow, William W. Streilein:
Finding Focus in the Blur of Moving-Target Techniques. IEEE Secur. Priv. 12(2): 16-26 (2014) - [c13]Kevin M. Carter, James Riordan, Hamed Okhravi:
A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses. MTD@CCS 2014: 21-30 - [c12]Thomas Hobson, Hamed Okhravi, David Bigelow, Robert Rudd, William W. Streilein:
On the Challenges of Effective Movement. MTD@CCS 2014: 41-50 - [c11]Hamed Okhravi, James Riordan, Kevin M. Carter:
Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism. RAID 2014: 405-425 - [i1]Kevin M. Carter, Hamed Okhravi, James Riordan:
Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity. CoRR abs/1401.8255 (2014) - 2013
- [c10]Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein:
Systematic Analysis of Defenses against Return-Oriented Programming. RAID 2013: 82-102 - 2012
- [j3]Hamed Okhravi, Adam Comella, Eric Robinson, Joshua W. Haines:
Creating a cyber moving target for critical infrastructure applications using platform diversity. Int. J. Crit. Infrastructure Prot. 5(1): 30-39 (2012) - 2011
- [c9]Sonia Jahid, Carl A. Gunter, Imranul Hoque, Hamed Okhravi:
MyABDAC: compiling XACML policies for attribute-based database access control. CODASPY 2011: 97-108 - [c8]Hamed Okhravi, Adam Comella, Eric Robinson, Stephen Yannalfo, Peter Michaleas, Joshua W. Haines:
Creating a Cyber Moving Target for Critical Infrastructure Applications. Critical Infrastructure Protection 2011: 107-123 - [c7]Hamed Okhravi, Andrew Johnson, Joshua W. Haines, Travis Mayberry, Agnes Hui Chan:
Dedicated vs. distributed: A study of mission survivability metrics. MILCOM 2011: 1345-1350 - 2010
- [b1]Hamed Okhravi:
Trusted and high assurance systems. University of Illinois Urbana-Champaign, USA, 2010 - [j2]Stephen Bishop, Hamed Okhravi, Shahram Rahimi, Yung-Chuan Lee:
Covert channel resistant information leakage protection using a multi-agent architecture. IET Inf. Secur. 4(4): 233-247 (2010) - [c6]Hamed Okhravi, Frederick T. Sheldon:
Data diodes in support of trustworthy cyber infrastructure. CSIIRW 2010: 23
2000 – 2009
- 2009
- [j1]Hamed Okhravi, David M. Nicol:
Application of trusted network technology to industrial control networks. Int. J. Crit. Infrastructure Prot. 2(3): 84-94 (2009) - [c5]Hamed Okhravi, David M. Nicol:
TrustGraph: Trusted Graphics Subsystem for High Assurance Systems. ACSAC 2009: 254-265 - [c4]Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Shahram Rahimi:
Information Leakage Detection in Distributed Systems using Software Agent. IEEE IA 2009: 128-135 - [c3]Hamed Okhravi, Ryan H. Kagin, David M. Nicol:
PolicyGlobe: a framework for integrating network and operating system security policies. SafeConfig 2009: 53-62 - 2008
- [c2]Hamed Okhravi, David M. Nicol:
Applying Trusted Network Technology To Process Control Systems. Critical Infrastructure Protection 2008: 57-70 - 2005
- [c1]David M. Nicol, Hamed Okhravi:
Performance analysis of binary code protection. WSC 2005: 601-610
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint