Follow
Benjamin E. Ujcich
Title
Cited by
Cited by
Year
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
632018
Provenance for intent-based networking
BE Ujcich, A Bates, WH Sanders
2020 6th IEEE conference on network softwarization (NetSoft), 195-199, 2020
302020
Attain: An attack injection framework for software-defined networking
BE Ujcich, U Thakore, WH Sanders
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
282017
A provenance model for the european union general data protection regulation
BE Ujcich, A Bates, WH Sanders
Provenance and Annotation of Data and Processes: 7th International …, 2018
262018
Data protection intents for software-defined networking
BE Ujcich, WH Sanders
2019 IEEE Conference on Network Softwarization (NetSoft), 271-275, 2019
212019
Automated discovery of cross-plane event-based vulnerabilities in software-defined networking
BE Ujcich, S Jero, R Skowyra, SR Gomez, A Bates, WH Sanders, ...
Network and Distributed System Security Symposium, 2020
182020
Causal Analysis for {Software-Defined} Networking Attacks
BE Ujcich, S Jero, R Skowyra, A Bates, WH Sanders, H Okhravi
30th USENIX Security Symposium (USENIX Security 21), 3183-3200, 2021
162021
Towards an accountable software-defined networking architecture
BE Ujcich, A Miller, A Bates, WH Sanders
2017 IEEE Conference on Network Softwarization (NetSoft), 1-5, 2017
92017
Thoughts on the Internet architecture from a modern enterprise network outage
BE Ujcich, KC Wang, B Parker, D Schmiedt
Network Operations and Management Symposium (NOMS), 2012 IEEE, 494-497, 2012
82012
Intender: Fuzzing {Intent-Based} Networking with {Intent-State} Transition Guidance
J Kim, BE Ujcich, DJ Tian
32nd USENIX Security Symposium (USENIX Security 23), 4463-4480, 2023
52023
Remax: Reachability-maximizing p2p detection of erroneous readings in wireless sensor networks
VB Krishna, M Rausch, BE Ujcich, I Gupta, WH Sanders
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
42017
Netshuffle: Circumventing censorship with shuffle proxies at the edge
PTJ Kon, A Gattani, D Saharia, T Cao, D Barradas, A Chen, M Sherr, ...
2024 IEEE Symposium on Security and Privacy (SP), 3497-3514, 2024
32024
Securing the software-defined networking control plane by using control and data dependency techniques
BE Ujcich
University of Illinois at Urbana-Champaign, 2020
22020
An attack model, language, and injector for the control plane of software-defined networks
BE Ujcich
University of Illinois at Urbana-Champaign, 2016
12016
Security Challenges of Intent-Based Networking
J Kim, H Okhravi, D Tian, BE Ujcich
Communications of the ACM 67 (7), 56-65, 2024
2024
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-Based Networking
B Weintraub, J Kim, R Tao, C Nita-Rotaru, H Okhravi, DJ Tian, BE Ujcich
2024
Data Provenance for Accountability Mechanisms and Properties
BE Ujcich, A Bates, WH Sanders
First Workshop on Supporting Algorithm Accountability using Provenance (SAAP …, 2018
2018
Modeling Downtime and Service Levels of an Enterprise Computer Network
BE Ujcich, VB Krishna
The system can't perform the operation now. Try again later.
Articles 1–18