Seguir
Martín Ochoa
Título
Citado por
Citado por
Ano
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis
Y Meidan, M Bohadana, A Shabtai, JD Guarnizo, M Ochoa, ...
Proceedings of the symposium on applied computing, 506-509, 2017
3252017
Detection of unauthorized IoT devices using machine learning techniques
Y Meidan, M Bohadana, A Shabtai, M Ochoa, NO Tippenhauer, ...
arXiv preprint arXiv:1709.04647, 2017
1992017
Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures
I Homoliak, F Toffalini, J Guarnizo, Y Elovici, M Ochoa
ACM Computing Surveys (CSUR) 52 (2), 1-40, 2019
1552019
Automatic quantification of cache side-channels
B Köpf, L Mauborgne, M Ochoa
International Conference on Computer Aided Verification, 564-580, 2012
1422012
Siphon: Towards scalable high-interaction physical honeypots
JD Guarnizo, A Tambe, SS Bhunia, M Ochoa, NO Tippenhauer, A Shabtai, ...
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 57-68, 2017
1102017
Robust and effective malware detection through quantitative data flow graph metrics
T Wüchner, M Ochoa, A Pretschner
International Conference on Detection of Intrusions and Malware, and …, 2015
662015
Malware detection with quantitative data flow graphs
T Wüchner, M Ochoa, A Pretschner
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
582014
Leveraging compression-based graph mining for behavior-based malware detection
T Wüchner, A Cisłak, M Ochoa, A Pretschner
IEEE Transactions on Dependable and Secure Computing 16 (1), 99-112, 2017
542017
NoisePrint Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
CM Ahmed, M Ochoa, J Zhou, AP Mathur, R Qadeer, C Murguia, J Ruths
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
532018
Gamifying ICS security training and research: Design, implementation, and results of S3
D Antonioli, HR Ghaeini, S Adepu, M Ochoa, NO Tippenhauer
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
44*2017
Innercircle: A parallelizable decentralized privacy-preserving location proximity protocol
P Hallgren, M Ochoa, A Sabelfeld
2015 13th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2015
432015
A framework for measuring software obfuscation resilience against automated attacks
S Banescu, M Ochoa, A Pretschner
2015 IEEE/ACM 1st International Workshop on Software Protection, 45-51, 2015
352015
Twos: A dataset of malicious insider threat behavior based on a gamified competition
A Harilal, F Toffalini, J Castellanos, J Guarnizo, I Homoliak, M Ochoa
Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017
332017
MACKE: Compositional analysis of low-level vulnerabilities with symbolic execution
S Ognawala, M Ochoa, A Pretschner, T Limmer
Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016
332016
Vera: A flexible model-based vulnerability testing tool
A Blome, M Ochoa, K Li, M Peroli, MT Dashti
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
312013
Model-based security verification and testing for smart-cards
E Fourneret, M Ochoa, F Bouquet, J Botella, J Jurjens, P Yousefi
2011 Sixth International Conference on Availability, Reliability and …, 2011
282011
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
A Harilal, F Toffalini, I Homoliak, JH Castellanos, J Guarnizo, S Mondal, ...
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (1), 54-85, 2018
272018
A framework for empirical evaluation of malware detection resilience against behavior obfuscation
S Banescu, T Wuchner, A Salem, M Guggenmos, M Ochoa, A Pretschner
2015 10th international conference on malicious and unwanted software …, 2015
27*2015
Leakage resilience against concurrent cache attacks
G Barthe, B Köpf, L Mauborgne, M Ochoa
International Conference on Principles of Security and Trust, 140-158, 2014
272014
Improving network intrusion detection classifiers by non-payload-based exploit-independent obfuscations: An adversarial approach
I Homoliak, M Teknos, M Ochoa, D Breitenbacher, S Hosseini, P Hanacek
arXiv preprint arXiv:1805.02684, 2018
232018
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20