SurgeProtector

Author:

Atre Nirav1,Sadok Hugo1,Chiang Erica1,Wang Weina1,Sherry Justine1

Affiliation:

1. Carnegie Mellon University

Funder

Google

Intel

VMware

Cylab

Publisher

ACM

Reference58 articles.

1. Yehuda Afek , Anat Bremler-Barr , Yotam Harchol , David Hay , and Yaron Koral . MCA2 : Multi-Core Architecture for Mitigating Complexity Attacks . In Proceedings of the Eighth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS '12 , page 235 -- 246 , New York, NY, USA , 2012 . Association for Computing Machinery. Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, and Yaron Koral. MCA2: Multi-Core Architecture for Mitigating Complexity Attacks. In Proceedings of the Eighth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS '12, page 235--246, New York, NY, USA, 2012. Association for Computing Machinery.

2. Albert Gran Alcoz , Alexander Dietmüller , and Laurent Vanbever. SP-PIFO: Approximating Push-in First-out Behaviors Using Strict-Priority Queues. In Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, NSDI '20 , page 59 -- 76 , USA, 2020 . USENIX Association. Albert Gran Alcoz, Alexander Dietmüller, and Laurent Vanbever. SP-PIFO: Approximating Push-in First-out Behaviors Using Strict-Priority Queues. In Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, NSDI '20, page 59--76, USA, 2020. USENIX Association.

3. Noa Bar-Yosef and Avishai Wool . Remote Algorithmic Complexity Attacks against Randomized Hash Tables . In Joaquim Filipe and Mohammad S. Obaidat, editors, E-business and Telecommunications , pages 162 -- 174 , Berlin, Heidelberg , 2009 . Springer Berlin Heidelberg . Noa Bar-Yosef and Avishai Wool. Remote Algorithmic Complexity Attacks against Randomized Hash Tables. In Joaquim Filipe and Mohammad S. Obaidat, editors, E-business and Telecommunications, pages 162--174, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg.

4. Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks

5. On making TCP more robust to packet reordering

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Defending Hash Tables from Subterfuge with Depth Charge;Proceedings of the 25th International Conference on Distributed Computing and Networking;2024-01-04

2. Runtime Verification for Programmable Switches;IEEE/ACM Transactions on Networking;2023-08

3. In-Network Probabilistic Monitoring Primitives under the Influence of Adversarial Network Inputs;Proceedings of the 7th Asia-Pacific Workshop on Networking;2023-06-29

4. Improving Developers’ Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies;2023 IEEE Symposium on Security and Privacy (SP);2023-05

5. Pigasus 2.0;Proceedings of the SIGCOMM '22 Poster and Demo Sessions;2022-08-22

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3