Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller |
DEF CON 26
|
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer |
ACM CCS 2017
|
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware |
ACM CCS 2017
|
Online algorithms for adaptive cyber defense on Bayesian attack graphs |
ACM CCS 2017
|
MTD 2016: Third ACM Workshop on Moving Target Defense |
ACM CCS 2016
|