Hamed Okhravi
Hamed Okhravi
Senior Researcher at MIT Lincoln Laboratory
Verified email at - Homepage
Cited by
Cited by
Control jujutsu: On the weaknesses of fine-grained control flow integrity
I Evans, F Long, U Otgonbaatar, H Shrobe, M Rinard, H Okhravi, ...
ACM Conference on Computer and Communications Security (CCS), 901-913, 2015
SCADA cyber security testbed development
CM Davis, JE Tate, H Okhravi, C Grier, TJ Overbye, D Nicol
North American Power Symposium (NAPS), 483-488, 2006
Missing the Point (er): On the Effectiveness of Code Pointer Integrity
I Evans, S Fingeret, J González, U Otgonbaatar, T Tang, H Shrobe, ...
IEEE Symposium on Security and Privacy (Oakland), 2015
Finding focus in the blur of moving-target techniques
H Okhravi, T Hobson, D Bigelow, W Streilein
IEEE Security & Privacy 12 (2), 16-26, 2013
Timely rerandomization for mitigating memory disclosures
D Bigelow, T Hobson, R Rudd, W Streilein, H Okhravi
ACM Conference on Computer and Communications Security (CCS), 268-279, 2015
Information leaks without memory disclosures: Remote side channel attacks on diversified code
J Seibert, H Okhravi, E Söderström
ACM Conference on Computer and Communications Security (CCS), 54-65, 2014
Survey of cyber moving target techniques
H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ...
MIT Lincoln Laboratory Technical Report, 2013
Creating a cyber moving target for critical infrastructure applications using platform diversity
H Okhravi, A Comella, E Robinson, J Haines
International Journal of Critical Infrastructure Protection 5 (1), 30-39, 2012
Firmfuzz: Automated iot firmware introspection and analysis
P Srivastava, H Peng, J Li, H Okhravi, H Shrobe, M Payer
Proceedings of the 2nd International ACM Workshop on Security and Privacy …, 2019
A game theoretic approach to strategy determination for dynamic platform defenses
KM Carter, JF Riordan, H Okhravi
Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 21-30, 2014
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
Network & Distributed System Security (NDSS), 2017
Identifier binding attacks and defenses in {Software-Defined} networks
S Jero, W Koch, R Skowyra, H Okhravi, C Nita-Rotaru, D Bigelow
26th USENIX Security Symposium (USENIX Security 17), 415-432, 2017
Effective topology tampering attacks and defenses in software-defined networks
R Skowyra, L Xu, G Gu, V Dedhia, T Hobson, H Okhravi, J Landry
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Perspectives on the solarwinds incident
S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ...
IEEE Security & Privacy 19 (2), 7-13, 2021
Design, implementation and evaluation of covert channel attacks
H Okhravi, S Bak, ST King
IEEE International Conference on Technologies for Homeland Security (HST …, 2010
Survey of cyber moving targets second edition
BC Ward, SR Gomez, R Skowyra, D Bigelow, J Martin, J Landry, ...
MIT Lincoln Laboratory Lexington United States, Tech. Rep, 2018
Control-flow integrity for real-time embedded systems
RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward
31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Quantitative evaluation of dynamic platform techniques as a defensive mechanism
H Okhravi, J Riordan, K Carter
Symposium on Research in Attacks, Intrusions and Defenses (RAID), 405-425, 2014
Beads: Automated attack discovery in openflow-based sdn systems
S Jero, X Bu, C Nita-Rotaru, H Okhravi, R Skowyra, S Fahmy
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20