scispace - formally typeset
D

Danai Chasaki

Researcher at Villanova University

Publications -  51
Citations -  250

Danai Chasaki is an academic researcher from Villanova University. The author has contributed to research in topics: Packet processing & Network packet. The author has an hindex of 7, co-authored 39 publications receiving 231 citations. Previous affiliations of Danai Chasaki include University of Massachusetts Amherst & University of Pennsylvania.

Papers
More filters
Journal ArticleDOI

Security challenges in the internet of things

TL;DR: This paper categorises the major components in the IoT domain and provides a classification of security requirements and security threats applicable to each component, and discusses open security problems and provides directions for future research.
Journal ArticleDOI

Attacks and Defenses in the Data Plane of Networks

TL;DR: This work demonstrates the first-practical attack that exploits a vulnerability in packet processing software to launch a devastating denial-of-service attack from within the network infrastructure.
Proceedings ArticleDOI

Attacks on Network Infrastructure

TL;DR: This paper demonstrates a specific attack that can launch a devastating denial-of-service attack by sending just a single packet and shows that defense techniques based on processor monitoring that have been proposed in prior work can help in detecting and avoiding such attacks.
Proceedings ArticleDOI

Design of a secure packet processor

TL;DR: This work presents a design and proof-of-concept implementation of a packet processing system that uses two security techniques to defend against potential attacks: a processing monitor is used to track operations on each processor core to detect attacks at the processing instruction level; an I/O monitor isused to track operation of the router to detect attacked devices at the protocol level.
Journal ArticleDOI

Vulnerabilities of Control Systems in Internet of Things Applications

TL;DR: This first study about vulnerability of applied control systems in general, and especially in the IoT environment, examines fundamentals of linear control systems and considers vulnerability of its main features and concepts used in IoT applications under potential malicious attacks.