Follow
Hamed Okhravi
Hamed Okhravi
Senior Researcher at MIT Lincoln Laboratory
Verified email at mit.edu - Homepage
Title
Cited by
Cited by
Year
Control jujutsu: On the weaknesses of fine-grained control flow integrity
I Evans, F Long, U Otgonbaatar, H Shrobe, M Rinard, H Okhravi, ...
ACM Conference on Computer and Communications Security (CCS), 901-913, 2015
2712015
SCADA cyber security testbed development
CM Davis, JE Tate, H Okhravi, C Grier, TJ Overbye, D Nicol
North American Power Symposium (NAPS), 483-488, 2006
2502006
Finding focus in the blur of moving-target techniques
H Okhravi, T Hobson, D Bigelow, W Streilein
IEEE Security & Privacy 12 (2), 16-26, 2013
2102013
Missing the Point (er): On the Effectiveness of Code Pointer Integrity
I Evans, S Fingeret, J González, U Otgonbaatar, T Tang, H Shrobe, ...
IEEE Symposium on Security and Privacy (Oakland), 2015
2092015
Timely rerandomization for mitigating memory disclosures
D Bigelow, T Hobson, R Rudd, W Streilein, H Okhravi
ACM Conference on Computer and Communications Security (CCS), 268-279, 2015
1852015
Information leaks without memory disclosures: Remote side channel attacks on diversified code
J Seibert, H Okhravi, E Söderström
ACM Conference on Computer and Communications Security (CCS), 54-65, 2014
1762014
Creating a cyber moving target for critical infrastructure applications using platform diversity
H Okhravi, A Comella, E Robinson, J Haines
International Journal of Critical Infrastructure Protection 5 (1), 30-39, 2012
892012
A game theoretic approach to strategy determination for dynamic platform defenses
KM Carter, JF Riordan, H Okhravi
Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 21-30, 2014
772014
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
Network & Distributed System Security (NDSS), 2017
752017
Survey of cyber moving target techniques
H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ...
MIT Lincoln Laboratory Technical Report, 2013
672013
Identifier Binding Attacks and Defenses in {Software-Defined} Networks
S Jero, W Koch, R Skowyra, H Okhravi, C Nita-Rotaru, D Bigelow
26th USENIX Security Symposium (USENIX Security 17), 415-432, 2017
602017
Effective topology tampering attacks and defenses in software-defined networks
R Skowyra, L Xu, G Gu, V Dedhia, T Hobson, H Okhravi, J Landry
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
552018
Quantitative evaluation of dynamic platform techniques as a defensive mechanism
H Okhravi, J Riordan, K Carter
Symposium on Research in Attacks, Intrusions and Defenses (RAID), 405-425, 2014
542014
Design, implementation and evaluation of covert channel attacks
H Okhravi, S Bak, ST King
IEEE International Conference on Technologies for Homeland Security (HST …, 2010
532010
Firmfuzz: Automated iot firmware introspection and analysis
P Srivastava, H Peng, J Li, H Okhravi, H Shrobe, M Payer
Proceedings of the 2nd International ACM Workshop on Security and Privacy …, 2019
522019
On the challenges of effective movement
T Hobson, H Okhravi, D Bigelow, R Rudd, W Streilein
Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 41-50, 2014
512014
Survey of cyber moving targets
H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ...
Lincoln Laboratory-Massachusetts Institute of Technology Technical Report, 2013
462013
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
402018
Control-flow integrity for real-time embedded systems
RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward
31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019
382019
Beads: automated attack discovery in openflow-based sdn systems
S Jero, X Bu, C Nita-Rotaru, H Okhravi, R Skowyra, S Fahmy
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
382017
The system can't perform the operation now. Try again later.
Articles 1–20