Hamed Okhravi
Massachusetts Institute of Technology
H-index: 29
North America-United States
Top articles of Hamed Okhravi
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Preventing Kernel Hacks with HAKCs. | Derrick Paul McKee Yianni Giannaris Carolina Ortega Howard E Shrobe Mathias Payer | 2022/4 | |
Cross-Language Attacks. | Samuel Mergendahl Nathan Burow Hamed Okhravi | 2022 | |
Tag: Tagged architecture guide | Samuel Jero Nathan Burow Bryan Ward Richard Skowyra Roger Khazan | 2022/12/7 | |
MTD'22: 9th ACM Workshop on Moving Target Defense | Hamed Okhravi Cliff Wang | 2022/11/7 | |
“Free” as in Freedom to Protest? | IEEE Security & Privacy | Fabio Massacci Antonino Sabetta Jelena Mirkovic Toby Murray Hamed Okhravi | 2022/9/13 |
Lincoln Laboratory-Campus Interaction Committee | Kerri Cahoy Dirk R Englund Danna Erit Freedman Qing Hu William D Oliver | 2022/7/25 | |
C: Automated Modeling of Hardware Peripherals | Chad Spensky Aravind Machiry Nilo Redini Colin Unger Graham Foster | 2021 | |
Glitching demystified: analyzing control-flow-based glitching attacks and defenses | Chad Spensky Aravind Machiry Nathan Burow Hamed Okhravi Rick Housley | 2021/6/21 | |
Causal Analysis for {Software-Defined} Networking Attacks | Benjamin E Ujcich Samuel Jero Richard Skowyra Adam Bates William H Sanders | 2021 | |
Conware: Automated modeling of hardware peripherals | Chad Spensky Aravind Machiry Nilo Redini Colin Unger Graham Foster | 2021/5/24 | |
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes. | Leila Rashidi Daniel Kostecki Alexander James Anthony Peterson Majid Ghaderi | 2021 | |
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies | IEEE Security & Privacy | Amy Dettmer Hamed Okhravi Kevin Perry Nabil Schear Richard Shay | 2021/5/11 |
TORTIS: Retry-free software transactional memory for real-time systems | Claire Nord Shai Caspin Catherine E Nemitz Howard Shrobe Hamed Okhravi | 2021/12/7 | |
Perspectives on the SolarWinds incident | IEEE Security & Privacy | Sean Peisert Bruce Schneier Hamed Okhravi Fabio Massacci Terry Benzel | 2021/3/22 |
Keeping safe rust safe with galeed | Elijah Rivera Samuel Mergendahl Howard Shrobe Hamed Okhravi Nathan Burow | 2021/12/6 | |
A cybersecurity moonshot | IEEE Security & Privacy | Hamed Okhravi | 2021/3/10 |
Analyzing Control-flow-based Glitching Attacks and Defenses | Chad Spensky Aravind MacHiry Nathan Burow Hamed Okhravi Rick Housley | 2021/6/21 | |
Dynamic flow system | 2020/9/15 | ||
One giant leap for computer security | IEEE Security & Privacy | Hamed Okhravi Nathan Burow Richard Skowyra Bryan Ward Samuel Jero | 2020/4/23 |
Automated discovery of cross-plane event-based vulnerabilities in software-defined networking | Network and Distributed System Security Symposium | Benjamin E Ujcich Samuel Jero Richard Skowyra Steven R Gomez Adam Bates | 2020/1 |