Follow
Samuel Jero
Samuel Jero
Network Security Researcher, MIT Lincoln Laboratory
Verified email at ll.mit.edu - Homepage
Title
Cited by
Cited by
Year
Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols
AM Kakhki, S Jero, D Choffnes, A Mislove, C Nita-Rotaru
ACM Internet Measurement Conference (IMC), 2017
1742017
How secure and quick is QUIC? Provable security and performance analyses
R Lychev, S Jero, A Boldyreva, C Nita-Rotaru
2015 IEEE Symposium on Security and Privacy, 214-231, 2015
1292015
Identifier Binding Attacks and Defenses in Software-Defined Networks
S Jero, W Koch, R Skowyra, H Okhravi, C Nita-Rotaru, D Bigelow
26th USENIX Security Symposium, 415-432, 2017
812017
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
552018
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach
S Jero, E Hoque, D Choffnes, A Mislove, C Nita-Rotaru
Network and Distributed Systems Security Symposium (NDSS), 2018
522018
BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems
S Jero, X Bu, C Nita-Rotaru, H Okhravi, R Skowyra, S Fahmy
20th International Symposium on Research in Attacks, Intrusions, and …, 2017
522017
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
S Jero, H Lee, C Nita-Rotaru
45th IEEE/IFIP International Conference on Dependable Systems and Networks …, 2015
302015
Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols
S Jero, ML Pacheco, D Goldwasser, C Nita-Rotaru
Conference on Innovative Applications of Artificial Intelligence (IAAI), 2019
262019
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru
The European Symposium on Research in Computer Security (ESORICS), 2019
212019
Taking a long look at QUIC: An approach for rigorous evaluation of rapidly evolving transport protocols
AM Kakhki, S Jero, D Choffnes, C Nita-Rotaru, A Mislove
Communications of the ACM 62 (7), 86-94, 2019
192019
Datagram Convergence Layers for the Delay-and Disruption-Tolerant Networking (DTN) Bundle Protocol and Licklider Transmission Protocol (LTP).
H Kruse, S Jero, S Ostermann
RFC 7122, 1-11, 2014
19*2014
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking
BE Ujcich, S Jero, R Skowyra, SR Gomez, A Bates, WH Sanders, ...
Network and Distributed Systems Security Symposium (NDSS), 2020
132020
Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC
S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru
Journal of Cryptology 34 (3), 26, 2021
122021
Controller-Oblivious Dynamic Access Control in Software-Defined Networks
SR Gomez, S Jero, R Skowyra, J Martin, P Sullivan, D Bigelow, ...
49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019
112019
Dynamic control of real-time communication (RTC) using SDN: A case study of a 5G end-to-end service
S Jero, VK Gurbani, R Miller, B Cilli, C Payette, S Sharma
IEEE/IFIP Network Operations and Management Symposium, 2016
112016
Causal Analysis for Software-Defined Networking Attacks
BE Ujcich, S Jero, R Skowyra, A Bates, WH Sanders, H Okhravi
30th USENIX Security Symposium (USENIX Security 21), 2021
102021
Practical Principle of Least Privilege for Secure Embedded Systems
S Jero, J Furgala, R Pan, PK Gadepalli, A Clifford, B Ye, R Khazan, ...
27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2021
92021
TAG: Tagged Architecture Guide
S Jero, N Burow, B Ward, R Skowyra, R Khazan, H Shrobe, H Okhravi
ACM Computing Surveys (CSUR), 2022
72022
The thundering herd: Amplifying kernel interference to attack response times
S Mergendahl, S Jero, BC Ward, J Furgala, G Parmer, R Skowyra
2022 IEEE 28th Real-Time and Embedded Technology and Applications Symposium …, 2022
62022
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes
L Rashidi, D Kostecki, A James, A Peterson, M Ghaderi, S Jero, ...
Network and Distributed Systems Security Symposium (NDSS), 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20