Author:
Chang Richard,Jiang Guofei,Ivancic Franjo,Sankaranarayanan Sriram,Shmatikov Vitaly
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Defending hash tables from algorithmic complexity attacks with resource burning;Theoretical Computer Science;2024-10
2. Worst-Case Convergence Time of ML Algorithms via Extreme Value Theory;Proceedings of the IEEE/ACM 3rd International Conference on AI Engineering - Software Engineering for AI;2024-04-14
3. Defending Hash Tables from Subterfuge with Depth Charge;Proceedings of the 25th International Conference on Distributed Computing and Networking;2024-01-04
4. Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses;2023-10-16
5. Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks;2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE);2023-09-11