Open-source software supply chain security
Large-scale open-source software ecosystems, such as npm for JavaScript and PyPI for Python, are critical entities in the software supply chain. They provide...
Large-scale open-source software ecosystems, such as npm for JavaScript and PyPI for Python, are critical entities in the software supply chain. They provide...
Home networks of smart (IoT) devices are rapidly growing in complexity. Most home users lack training in cybersecurity and are thus left coping with securing...
IoT firmware security is notoriously problematic. IoT software ships with potentially insecure components, and may be bloated by unnecessary functionality. T...
Ransomware is one of the most dangerous malware threats, as it has the potential of disrupting operations of organizations, governments, and critical infrast...
Detecting malware communication from vantage points within the network is complex for various reasons. The rate at which new malware families are released ma...
Traffic analysis performed by intrusion detection systems (IDSs) present unique challenges: on one hand, analysis has to sustain high throughput to search ev...
PLUG and other similar communication-exposed architectures allow the compiler significant freedom in mapping instructions to cores (and organizing the necess...
During my internship at Microsoft Research India, I contributed to the development of a tool - Deja vu - for identifying and classifying network problems. Th...
As part of my research I participated in the development of PLUG (Pipelined LookUp Grid) - a flexible network lookup module designed to be employed in networ...
For my master thesis, I participated in the development of a session-layer protocol - called PATTHEL - that aggregates multiple TCP connections in a single l...
IoT firmware security is notoriously problematic. IoT software ships with potentially insecure components, and may be bloated by unnecessary functionality. T...
Detecting malware communication from vantage points within the network is complex for various reasons. The rate at which new malware families are released ma...
Traffic analysis performed by intrusion detection systems (IDSs) present unique challenges: on one hand, analysis has to sustain high throughput to search ev...
PLUG and other similar communication-exposed architectures allow the compiler significant freedom in mapping instructions to cores (and organizing the necess...
During my internship at Microsoft Research India, I contributed to the development of a tool - Deja vu - for identifying and classifying network problems. Th...
As part of my research I participated in the development of PLUG (Pipelined LookUp Grid) - a flexible network lookup module designed to be employed in networ...
For my master thesis, I participated in the development of a session-layer protocol - called PATTHEL - that aggregates multiple TCP connections in a single l...
Large-scale open-source software ecosystems, such as npm for JavaScript and PyPI for Python, are critical entities in the software supply chain. They provide...
Home networks of smart (IoT) devices are rapidly growing in complexity. Most home users lack training in cybersecurity and are thus left coping with securing...
Ransomware is one of the most dangerous malware threats, as it has the potential of disrupting operations of organizations, governments, and critical infrast...