Richard Skowyra

According to our database1, Richard Skowyra authored at least 24 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
TAG: Tagged Architecture Guide.
ACM Comput. Surv., 2023

2022
The Thundering Herd: Amplifying Kernel Interference to Attack Response Times.
Proceedings of the 28th IEEE Real-Time and Embedded Technology and Applications Symposium, 2022

2021
Causal Analysis for Software-Defined Networking Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

Practical Principle of Least Privilege for Secure Embedded Systems.
Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium, 2021

2020
One Giant Leap for Computer Security.
IEEE Secur. Priv., 2020

Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Lessons Learned in Network and Memory-Based Moving Target Defenses.
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020

2019
The Leakage-Resilience Dilemma.
Proceedings of the Computer Security - ESORICS 2019, 2019

Controller-Oblivious Dynamic Access Control in Software-Defined Networks.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Adversarial co-evolution of attack and defense in a segmented computer network environment.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Effective Topology Tampering Attacks and Defenses in Software-Defined Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Cross-App Poisoning in Software-Defined Networking.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Identifier Binding Attacks and Defenses in Software-Defined Networks.
Proceedings of the 26th USENIX Security Symposium, 2017

BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

QUASAR: Quantitative Attack Space Analysis and Reasoning.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Using Alloy to Formally Model and Reason About an OpenFlow Network Switch.
CoRR, 2016

Have No PHEAR: Networks Without Identifiers.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

2014
Verificare: a platform for composable verification with application to SDN-Enabled systems
PhD thesis, 2014

A Verification Platform for SDN-Enabled Applications.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Systematic Analysis of Defenses against Return-Oriented Programming.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Towards accessible integration and deployment of formal tools and techniques.
Proceedings of the 3rd International Workshop on Developing Tools as Plug-ins, 2013

Software-Defined IDS for securing embedded mobile devices.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2013

Verifiably-safe software-defined networks for CPS.
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (part of CPS Week), 2013


  Loading...