Kashyap Thimmaraju

According to our database1, Kashyap Thimmaraju authored at least 18 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Count Me If You Can: Enumerating QUIC Servers Behind Load Balancers.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

2021
Preacher: Network Policy Checker for Adversarial Environments.
IEEE/ACM Trans. Netw., 2021

The Elephant in the Background: A Quantitative Approachto Empower Users Against Web Browser Fingerprinting.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

Macchiato: Importing Cache Side Channels to SDNs.
Proceedings of the ANCS '21: Symposium on Architectures for Networking and Communications Systems, Layfette, IN, USA, December 13, 2021

2020
From threats to solutions in data center networks.
PhD thesis, 2020

Towards an Insightful Computer Security Seminar.
CoRR, 2020

Towards Fine-Grained Billing For Cloud Networking.
CoRR, 2020

2019
MTS: Bringing Multi-Tenancy to Virtual Networking.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

2018
Taking Control of SDN-based Cloud Systems via the Data Plane.
Proceedings of the Symposium on SDN Research, 2018

Virtual Network Isolation: Are We There Yet?
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018

I DPID It My Way! A Covert Timing Channel in Software-Defined Networks.
Proceedings of the 17th International IFIP TC6 Networking Conference, 2018

2017
Software-Defined Adversarial Trajectory Sampling.
CoRR, 2017

Static Program Analysis as a Fuzzing Aid.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Outsmarting Network Security with SDN Teleportation.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

2016
Reigns to the Cloud: Compromising Cloud Systems via the Data Plane.
CoRR, 2016

Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

NetCo: Reliable Routing With Unreliable Routers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016


  Loading...