Eyasu Getahun Chekole

Orcid: 0000-0002-6307-3595

According to our database1, Eyasu Getahun Chekole authored at least 14 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies.
Comput. Secur., May, 2023

VulnGen: Vulnerable Virtual Machine Generator.
Proceedings of the IEEE International Conference on Service Operations and Logistics, 2023

EARIC: Exploiting ADC Registers in IoT and Control Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2021
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems.
Int. J. Crit. Infrastructure Prot., 2021

Threat Modeling and Security Analysis of Containers: A Survey.
CoRR, 2021

Enhance Enterprise Security through Implementing ISO/IEC 27001 Standard.
Proceedings of the 2021 IEEE International Conference on Service Operations and Logistics, 2021

DARUD: Detecting and Arresting Rogue USB Devices in the V2X Ecosystem.
Proceedings of the 2021 IEEE International Conference on Service Operations and Logistics, 2021

2020
CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems.
Comput. Secur., 2020

2019
ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS.
Proceedings of the Fifth Annual Industrial Control System Security Workshop, 2019

2018
Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS.
CoRR, 2018

Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems.
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018

2017
Enforcing Memory Safety in Cyber-Physical Systems.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

2014
Selective Release of Smart Metering Data in Multi-domain Smart Grids.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Attribute based access control for APIs in spring security.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014


  Loading...