Follow
Benjamin E. Ujcich
Title
Cited by
Cited by
Year
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
602018
Attain: An attack injection framework for software-defined networking
BE Ujcich, U Thakore, WH Sanders
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
282017
Provenance for intent-based networking
BE Ujcich, A Bates, WH Sanders
2020 6th IEEE conference on network softwarization (NetSoft), 195-199, 2020
272020
A provenance model for the european union general data protection regulation
BE Ujcich, A Bates, WH Sanders
Provenance and Annotation of Data and Processes: 7th International …, 2018
242018
Data protection intents for software-defined networking
BE Ujcich, WH Sanders
2019 IEEE Conference on Network Softwarization (NetSoft), 271-275, 2019
202019
Automated discovery of cross-plane event-based vulnerabilities in software-defined networking
BE Ujcich, S Jero, R Skowyra, SR Gomez, A Bates, WH Sanders, ...
Network and Distributed System Security Symposium, 2020
182020
Causal Analysis for {Software-Defined} Networking Attacks
BE Ujcich, S Jero, R Skowyra, A Bates, WH Sanders, H Okhravi
30th USENIX Security Symposium (USENIX Security 21), 3183-3200, 2021
112021
Towards an accountable software-defined networking architecture
BE Ujcich, A Miller, A Bates, WH Sanders
2017 IEEE Conference on Network Softwarization (NetSoft), 1-5, 2017
92017
Thoughts on the Internet architecture from a modern enterprise network outage
BE Ujcich, KC Wang, B Parker, D Schmiedt
Network Operations and Management Symposium (NOMS), 2012 IEEE, 494-497, 2012
82012
Remax: Reachability-maximizing p2p detection of erroneous readings in wireless sensor networks
VB Krishna, M Rausch, BE Ujcich, I Gupta, WH Sanders
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
42017
Intender: Fuzzing {Intent-Based} Networking with {Intent-State} Transition Guidance
J Kim, BE Ujcich, DJ Tian
32nd USENIX Security Symposium (USENIX Security 23), 4463-4480, 2023
32023
Securing the software-defined networking control plane by using control and data dependency techniques
BE Ujcich
University of Illinois at Urbana-Champaign, 2020
22020
An attack model, language, and injector for the control plane of software-defined networks
BE Ujcich
University of Illinois at Urbana-Champaign, 2016
12016
Security Challenges of Intent-Based Networking
J Kim, H Okhravi, D Tian, BE Ujcich
Communications of the ACM, 2024
2024
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-Based Networking
B Weintraub, J Kim, R Tao, C Nita-Rotaru, H Okhravi, DJ Tian, BE Ujcich
2024
Data Provenance for Accountability Mechanisms and Properties
BE Ujcich, A Bates, WH Sanders
First Workshop on Supporting Algorithm Accountability using Provenance (SAAP …, 2018
2018
Modeling Downtime and Service Levels of an Enterprise Computer Network
BE Ujcich, VB Krishna
The system can't perform the operation now. Try again later.
Articles 1–17