Hamed Okhravi
Hamed Okhravi
Senior Researcher at MIT Lincoln Laboratory
Verified email at mit.edu - Homepage
Title
Cited by
Cited by
Year
SCADA cyber security testbed development
CM Davis, JE Tate, H Okhravi, C Grier, TJ Overbye, D Nicol
North American Power Symposium (NAPS), 483-488, 2006
2192006
Control jujutsu: On the weaknesses of fine-grained control flow integrity
I Evans, F Long, U Otgonbaatar, H Shrobe, M Rinard, H Okhravi, ...
ACM Conference on Computer and Communications Security (CCS), 901-913, 2015
2092015
Missing the Point (er): On the Effectiveness of Code Pointer Integrity
I Evans, S Fingeret, J González, U Otgonbaatar, T Tang, H Shrobe, ...
IEEE Symposium on Security and Privacy (Oakland), 2015
1642015
Finding focus in the blur of moving-target techniques
H Okhravi, T Hobson, D Bigelow, W Streilein
IEEE Security & Privacy 12 (2), 16-26, 2013
1592013
Information leaks without memory disclosures: Remote side channel attacks on diversified code
J Seibert, H Okhravi, E Söderström
ACM Conference on Computer and Communications Security (CCS), 54-65, 2014
1502014
Timely rerandomization for mitigating memory disclosures
D Bigelow, T Hobson, R Rudd, W Streilein, H Okhravi
ACM Conference on Computer and Communications Security (CCS), 268-279, 2015
1472015
Creating a cyber moving target for critical infrastructure applications using platform diversity
H Okhravi, A Comella, E Robinson, J Haines
International Journal of Critical Infrastructure Protection 5 (1), 30-39, 2012
712012
A game theoretic approach to strategy determination for dynamic platform defenses
KM Carter, JF Riordan, H Okhravi
Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 21-30, 2014
632014
Survey of cyber moving target techniques
H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ...
MIT Lincoln Laboratory Technical Report, 2013
542013
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
Network & Distributed System Security (NDSS), 2017
492017
Quantitative evaluation of dynamic platform techniques as a defensive mechanism
H Okhravi, J Riordan, K Carter
Symposium on Research in Attacks, Intrusions and Defenses (RAID), 405-425, 2014
452014
Identifier binding attacks and defenses in software-defined networks
S Jero, W Koch, R Skowyra, H Okhravi, C Nita-Rotaru, D Bigelow
26th {USENIX} Security Symposium ({USENIX} Security 17), 415-432, 2017
432017
Design, implementation and evaluation of covert channel attacks
H Okhravi, S Bak, ST King
IEEE International Conference on Technologies for Homeland Security (HST …, 2010
432010
On the challenges of effective movement
T Hobson, H Okhravi, D Bigelow, R Rudd, W Streilein
Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 41-50, 2014
422014
Survey of cyber moving targets
H Okhravi, MA Rabe, TJ Mayberry, WG Leonard, TR Hobson, D Bigelow, ...
Massachusetts Inst of Technology Lexington Lincoln Lab, No. MIT/LL-TR-1166, 2013
402013
Effective topology tampering attacks and defenses in software-defined networks
R Skowyra, L Xu, G Gu, V Dedhia, T Hobson, H Okhravi, J Landry
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
322018
Have No PHEAR: Networks Without Identifiers
R Skowyra, K Bauer, V Dedhia, H Okhravi
Proceedings of ACM CCS Workshop on Moving Target Defense (MTD), 3-14, 2016
322016
Myabdac: compiling xacml policies for attribute-based database access control
S Jahid, CA Gunter, I Hoque, H Okhravi
ACM Conference on Data and Application Security and Privacy (CODASPY), 97-108, 2011
282011
Systematic analysis of defenses against return-oriented programming
R Skowyra, K Casteel, H Okhravi, N Zeldovich, W Streilein
Symposium on Research in Attacks, Intrusions and Defenses (RAID), 82-102, 2013
262013
Beads: automated attack discovery in openflow-based sdn systems
S Jero, X Bu, C Nita-Rotaru, H Okhravi, R Skowyra, S Fahmy
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
252017
The system can't perform the operation now. Try again later.
Articles 1–20