[go: up one dir, main page]

Follow
Max Schuchard
Max Schuchard
Assistant Professor, University of Tennessee
Verified email at utk.edu - Homepage
Title
Cited by
Cited by
Year
Losing control of the internet: using the data plane to attack the control plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1592010
Routing around decoys
M Schuchard, J Geddes, C Thompson, N Hopper
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1172012
Cover your ACKs: Pitfalls of covert channel censorship circumvention
J Geddes, M Schuchard, N Hopper
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1122013
Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing
JM Smith, M Schuchard
2018 IEEE Symposium on Security and Privacy (SP), 599-617, 2018
1102018
{PKU} pitfalls: Attacks on {PKU-based} memory isolation systems
E Connor, T McDaniel, JM Smith, M Schuchard
29th USENIX Security Symposium (USENIX Security 20), 1409-1426, 2020
1062020
Protecting access privacy of cached contents in information centric networks
A Mohaisen, X Zhang, M Schuchard, H Xie, Y Kim
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
742013
Balancing the shadows
M Schuchard, AW Dean, V Heorhiadi, N Hopper, Y Kim
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
312010
Withdrawing the bgp re-routing curtain: Understanding the security impact of bgp poisoning through real-world measurements
JM Smith, K Birkeland, T McDaniel, M Schuchard
Proceedings 2020 Network and Distributed System Security Symposium, 2020
222020
Flexsealing BGP against route leaks: peerlock active measurement and analysis
T McDaniel, JM Smith, M Schuchard
arXiv preprint arXiv:2006.06576, 2020
182020
Secure encounter-based social networks: requirements, challenges, and designs
A Mohaisen, EY Vasserman, M Schuchard, D Foo Kune, Y Kim
Proceedings of the 17th ACM conference on Computer and communications …, 2010
132010
An Internet-scale feasibility study of BGP poisoning as a security primitive
JM Smith, K Birkeland, M Schuchard
arXiv preprint arXiv:1811.03716 23, 36, 2018
10*2018
Fuzzbomb: Autonomous cyber vulnerability detection and repair
DJ Musliner, SE Friedman, M Boldt, J Benton, M Schuchard, P Keller, ...
Fourth International Conference on Communications, Computation, Networks and …, 2015
92015
Peer pressure: Exerting malicious influence on routers at a distance
M Schuchard, C Thompson, N Hopper, Y Kim
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
82013
Withdrawing the bgp re-routing curtain
JM Smith, K Birkeland, T McDaniel, M Schuchard
Network and Distributed System Security Symposium (NDSS), 2020
72020
Nation scale mobile ad hoc network for normally isolated topologies
S Oesch, M Schuchard
2019 international conference on internet of things (iThings) and IEEE green …, 2019
52019
Blind Bernoulli Trials: A Noninteractive Protocol For {Hidden-Weight} Coin Flips
E Connor, M Schuchard
28th USENIX Security Symposium (USENIX Security 19), 1483-1500, 2019
52019
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.
M Schuchard, C Thompson, N Hopper, Y Kim
NDSS, 2012
52012
The maestro attack: Orchestrating malicious flows with bgp
T McDaniel, JM Smith, M Schuchard
International Conference on Security and Privacy in Communication Systems …, 2020
42020
Measuring Irregular Geographic Exposure on the Internet
J Holland, J Smith, M Schuchard
arXiv preprint arXiv:1904.09375, 2019
22019
Not so predictable mining pools: Attacking solo mining pools by bagging blocks and conning competitors
J Holland, RJ Connor, JP Diamond, JM Smith, M Schuchard
International Conference on Financial Cryptography and Data Security, 272-287, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20