Aliakbar Sadeghi

Orcid: 0009-0005-0451-9621

According to our database1, Aliakbar Sadeghi authored at least 6 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
On the Performance and Consistency Trade-off of the eSIM M2M Remote Provisioning Protocol.
Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025

Saecred: A State-Aware, Over-the-Air Protocol Testing Approach for Discovering Parsing Bugs in SAE Handshake Implementations of COTS Wi-Fi Access Points.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

KubeKeeper: Protecting Kubernetes Secrets Against Excessive Permissions.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

2018
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions.
J. Comput. Virol. Hacking Tech., 2018

2017
Dwarf Frankenstein is still in your memory: tiny code reuse attacks.
ISC Int. J. Inf. Secur., 2017

2014
Tazhi: A novel technique for hunting trampoline gadgets of jump oriented programming (A class of code reuse attacks).
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014


  Loading...