Making DTNs Robust Against Spoofing Attacks

Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures
Md Yusuf Sarwar Uddin, Ahmed Khurshid, Hee Dong Jung, Carl Gunter, Matthew Caesar and Tarek Abdelzaher
IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’11), Salt Lake City, UT, June 2011. [BIB]

Last updated on Wednesday, December 7, 2011, 4:04 pm

DoS Protection for Reliably Authenticated Broadcast

DoS Protection for Reliably Authenticated Broadcast
Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, and Santosh Venkatesh.
ICSOC Network and Distributed Systems Security Symposium (NDSS ’04), San Diego, CA, February 2004.

Last updated on Thursday, June 26, 2014, 12:48 pm

Tiered Incentives for Integrity Based Queuing

Tiered Incentives for Integrity Based Queuing
Fariba Khan and Carl A. Gunter
USENIX OSDI, Workshop on the Economics of Networks, Systems, and Computation (NetEcon ’10), Vancouver, BC, Canada, October 2010. [BIB]

Last updated on Thursday, June 26, 2014, 1:01 pm

Resource Inflation Threats to Denial of Service Countermeasures

Resource Inflation Threats to Denial of Service Countermeasures
Ravinder Shankesi, Omid Fatemieh and Carl A. Gunter
Technical Report, University of Illinois at Urbana-Champaign, October 2010.

Last updated on Thursday, June 26, 2014, 1:00 pm

Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers

Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers
Rohit Chadha, Carl A. Gunter, Jose Meseguer, Ravinder Shankesi and Mahesh Viswanathan
IFIP Formal Methods for Open Object-based Distributed Systems (FMOODS ’08), Oslo, Norway, June 2008. [BIB]

Last updated on Monday, July 25, 2011, 4:21 pm

Adaptive Selective Verification

Adaptive Selective Verification
Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan and Carl A. Gunter
IEEE Conference on Computer Communications (INFOCOM ’08), Phoenix, AZ, April 2008. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:55 pm

How Much Bandwidth Can Botnets Commandeer?

How Much Bandwidth Can Botnets Commandeer?Michael Greenwald, Sanjeev Khanna and Santosh Venkatesh
2nd Annual Information Theory and Applications Workshop, San Diego, CA, February 2007.

Last updated on Thursday, June 26, 2014, 12:52 pm

Mitigating DoS Attack Through Selective Bin Verification

Mitigating DoS Attack Through Selective Bin Verification
Micah Sherr, Michael Greenwald, Carl A. Gunter, Sanjeev Khanna and Santosh Venkatesh
IEEE Workshop on Secure Network Protocols (NPsec ’05), Boston, MA, November 2005. [PPT][BIB]

Last updated on Monday, July 25, 2011, 4:28 pm

Formal Modeling and Analysis of DoS Using Probabilistic Rewrite Theories

Formal Modeling and Analysis of DoS Using Probabilistic Rewrite Theories
Gul Agha, Michael Greenwald, Carl A. Gunter, Sanjeev Khanna, Jose Meseguer, Koushik Sen and Prasannaa Thati
IEEE Workshop on Foundations of Computer Security (FCS ’05), Chicago, IL, June 2005. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:50 pm

DoS Proection for Reliably Authenticated Broadcast

DoS Protection for Reliably Authenticated Broadcast
Carl A. Gunter, Sanjeev Khanna, Kaijun Tan and Santosh Venkatesh
ICSOC Network and Distributed Systems Security Symposium (NDSS ’04), San Diego, CA, February 2004.

Last updated on Thursday, June 26, 2014, 12:48 pm