D
Danai Chasaki
Researcher at Villanova University
Publications - 51
Citations - 250
Danai Chasaki is an academic researcher from Villanova University. The author has contributed to research in topics: Packet processing & Network packet. The author has an hindex of 7, co-authored 39 publications receiving 231 citations. Previous affiliations of Danai Chasaki include University of Massachusetts Amherst & University of Pennsylvania.
Papers
More filters
Journal ArticleDOI
Security challenges in the internet of things
TL;DR: This paper categorises the major components in the IoT domain and provides a classification of security requirements and security threats applicable to each component, and discusses open security problems and provides directions for future research.
Journal ArticleDOI
Attacks and Defenses in the Data Plane of Networks
Danai Chasaki,Tilman Wolf +1 more
TL;DR: This work demonstrates the first-practical attack that exploits a vulnerability in packet processing software to launch a devastating denial-of-service attack from within the network infrastructure.
Proceedings ArticleDOI
Attacks on Network Infrastructure
TL;DR: This paper demonstrates a specific attack that can launch a devastating denial-of-service attack by sending just a single packet and shows that defense techniques based on processor monitoring that have been proposed in prior work can help in detecting and avoiding such attacks.
Proceedings ArticleDOI
Design of a secure packet processor
Danai Chasaki,Tilman Wolf +1 more
TL;DR: This work presents a design and proof-of-concept implementation of a packet processing system that uses two security techniques to defend against potential attacks: a processing monitor is used to track operations on each processor core to detect attacks at the processing instruction level; an I/O monitor isused to track operation of the router to detect attacked devices at the protocol level.
Journal ArticleDOI
Vulnerabilities of Control Systems in Internet of Things Applications
TL;DR: This first study about vulnerability of applied control systems in general, and especially in the IoT environment, examines fundamentals of linear control systems and considers vulnerability of its main features and concepts used in IoT applications under potential malicious attacks.