Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Position paper: why are there so many vulnerabilities in web applications?, , , , and . NSPW, page 83-94. ACM, (2011)Lightyear: Using Modularity to Scale BGP Control Plane Verification., , , , , , and . SIGCOMM, page 94-107. ACM, (2023)Credentials Management for High-Value Transactions., , , , and . MMM-ACNS, volume 6258 of Lecture Notes in Computer Science, page 169-182. Springer, (2010)Enforcing Request Integrity in Web Applications., , , and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 225-240. Springer, (2010)Checking Beliefs in Dynamic Networks, , , , and . MSR-TR-2014-58. (April 2014)Test coverage metrics for the network., , , , and . SIGCOMM, page 775-787. ACM, (2021)Invisinets: Removing Networking from Cloud Networks., , , , , , , , and . NSDI, page 479-496. USENIX Association, (2023)Automatic error finding in access-control policies., , , , and . CCS, page 163-174. ACM, (2011)Validating datacenters at scale., , , , , , , , , and 7 other author(s). SIGCOMM, page 200-213. ACM, (2019)Finding Network Misconfigurations by Automatic Template Inference., , , , , , and . NSDI, page 999-1013. USENIX Association, (2020)