Follow
Hamed Okhravi
Hamed Okhravi
Senior Researcher at MIT Lincoln Laboratory
Verified email at mit.edu - Homepage
Title
Cited by
Cited by
Year
Control jujutsu: On the weaknesses of fine-grained control flow integrity
I Evans, F Long, U Otgonbaatar, H Shrobe, M Rinard, H Okhravi, ...
ACM Conference on Computer and Communications Security (CCS), 901-913, 2015
3332015
SCADA cyber security testbed development
CM Davis, JE Tate, H Okhravi, C Grier, TJ Overbye, D Nicol
North American Power Symposium (NAPS), 483-488, 2006
2742006
Missing the Point (er): On the Effectiveness of Code Pointer Integrity
I Evans, S Fingeret, J González, U Otgonbaatar, T Tang, H Shrobe, ...
IEEE Symposium on Security and Privacy (Oakland), 2015
2412015
Finding focus in the blur of moving-target techniques
H Okhravi, T Hobson, D Bigelow, W Streilein
IEEE Security & Privacy 12 (2), 16-26, 2013
2302013
Timely rerandomization for mitigating memory disclosures
D Bigelow, T Hobson, R Rudd, W Streilein, H Okhravi
ACM Conference on Computer and Communications Security (CCS), 268-279, 2015
2152015
Information leaks without memory disclosures: Remote side channel attacks on diversified code
J Seibert, H Okhravi, E Söderström
ACM Conference on Computer and Communications Security (CCS), 54-65, 2014
1972014
Survey of cyber moving target techniques
H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ...
MIT Lincoln Laboratory Technical Report, 2013
127*2013
Firmfuzz: Automated iot firmware introspection and analysis
P Srivastava, H Peng, J Li, H Okhravi, H Shrobe, M Payer
Proceedings of the 2nd International ACM Workshop on Security and Privacy …, 2019
1052019
Creating a cyber moving target for critical infrastructure applications using platform diversity
H Okhravi, A Comella, E Robinson, J Haines
International Journal of Critical Infrastructure Protection 5 (1), 30-39, 2012
1012012
A game theoretic approach to strategy determination for dynamic platform defenses
KM Carter, JF Riordan, H Okhravi
Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 21-30, 2014
952014
Effective topology tampering attacks and defenses in software-defined networks
R Skowyra, L Xu, G Gu, V Dedhia, T Hobson, H Okhravi, J Landry
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
942018
Identifier binding attacks and defenses in {Software-Defined} networks
S Jero, W Koch, R Skowyra, H Okhravi, C Nita-Rotaru, D Bigelow
26th USENIX Security Symposium (USENIX Security 17), 415-432, 2017
932017
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
Network & Distributed System Security (NDSS), 2017
932017
Perspectives on the solarwinds incident
S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ...
IEEE Security & Privacy 19 (2), 7-13, 2021
922021
Control-flow integrity for real-time embedded systems
RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward
31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019
682019
Survey of cyber moving targets second edition
BC Ward, SR Gomez, R Skowyra, D Bigelow, J Martin, J Landry, ...
MIT Lincoln Laboratory Lexington United States, Tech. Rep, 2018
662018
Design, implementation and evaluation of covert channel attacks
H Okhravi, S Bak, ST King
IEEE International Conference on Technologies for Homeland Security (HST …, 2010
642010
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
632018
On the effectiveness of type-based control flow integrity
RM Farkhani, S Jafari, S Arshad, W Robertson, E Kirda, H Okhravi
Proceedings of the 34th Annual Computer Security Applications Conference, 28-39, 2018
602018
Preventing Kernel Hacks with HAKCs.
DP McKee, Y Giannaris, C Ortega, HE Shrobe, M Payer, H Okhravi, ...
NDSS, 1-17, 2022
592022
The system can't perform the operation now. Try again later.
Articles 1–20