Follow
Benjamin E. Ujcich
Title
Cited by
Cited by
Year
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
552018
Attain: An attack injection framework for software-defined networking
BE Ujcich, U Thakore, WH Sanders
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
272017
Provenance for intent-based networking
BE Ujcich, A Bates, WH Sanders
2020 6th IEEE conference on network softwarization (NetSoft), 195-199, 2020
232020
A provenance model for the european union general data protection regulation
BE Ujcich, A Bates, WH Sanders
Provenance and Annotation of Data and Processes: 7th International …, 2018
232018
Data protection intents for software-defined networking
BE Ujcich, WH Sanders
2019 IEEE Conference on Network Softwarization (NetSoft), 271-275, 2019
182019
Automated discovery of cross-plane event-based vulnerabilities in software-defined networking
BE Ujcich, S Jero, R Skowyra, SR Gomez, A Bates, WH Sanders, ...
Network and Distributed System Security Symposium, 2020
132020
Causal Analysis for {Software-Defined} Networking Attacks
BE Ujcich, S Jero, R Skowyra, A Bates, WH Sanders, H Okhravi
30th USENIX Security Symposium (USENIX Security 21), 3183-3200, 2021
102021
Towards an accountable software-defined networking architecture
BE Ujcich, A Miller, A Bates, WH Sanders
2017 IEEE Conference on Network Softwarization (NetSoft), 1-5, 2017
92017
Thoughts on the Internet architecture from a modern enterprise network outage
BE Ujcich, KC Wang, B Parker, D Schmiedt
Network Operations and Management Symposium (NOMS), 2012 IEEE, 494-497, 2012
82012
Remax: Reachability-maximizing p2p detection of erroneous readings in wireless sensor networks
VB Krishna, M Rausch, BE Ujcich, I Gupta, WH Sanders
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
42017
Securing the software-defined networking control plane by using control and data dependency techniques
BE Ujcich
University of Illinois at Urbana-Champaign, 2020
22020
An attack model, language, and injector for the control plane of software-defined networks
BE Ujcich
University of Illinois at Urbana-Champaign, 2016
12016
Intender: Fuzzing {Intent-Based} Networking with {Intent-State} Transition Guidance
J Kim, BE Ujcich, DJ Tian
32nd USENIX Security Symposium (USENIX Security 23), 4463-4480, 2023
2023
Data Provenance for Accountability Mechanisms and Properties
BE Ujcich, A Bates, WH Sanders
First Workshop on Supporting Algorithm Accountability using Provenance (SAAP …, 2018
2018
Modeling Downtime and Service Levels of an Enterprise Computer Network
BE Ujcich, VB Krishna
The system can't perform the operation now. Try again later.
Articles 1–15