scispace - formally typeset
K

Karim El Defrawy

Researcher at HRL Laboratories

Publications -  60
Citations -  860

Karim El Defrawy is an academic researcher from HRL Laboratories. The author has contributed to research in topics: Secure multi-party computation & Encryption. The author has an hindex of 14, co-authored 55 publications receiving 756 citations. Previous affiliations of Karim El Defrawy include University of California, Irvine & AT&T.

Papers
More filters
Proceedings ArticleDOI

Attacks on physical-layer identification

TL;DR: The feasibility of performing impersonation attacks on the modulation-based and transient-based fingerprinting techniques are studied to improve access control in wireless networks, revent device cloning and complement message authentication protocols.
Patent

Filtering unwanted data traffic via a per-customer blacklist

TL;DR: In this article, traffic flow from a traffic source with a source IP address to a customer system with a destination IP address is filtered by comparing the source IP addresses to the customer blacklist.
Proceedings Article

BotTorrent: misusing BitTorrent to launch DDoS attacks

TL;DR: It is shown that BitTorrent can be exploited by misdirecting clients to send their traffic toward any host on the Internet, converted into firepower for launching a distributed denial-of-service attack that can exhaust the victim's resources, including access bandwidth and connection resources.
Book ChapterDOI

5PM: secure pattern matching

TL;DR: The techniques reduction pattern matching and generalized Hamming distance problem to a novel linear algebra formulation that allows for generic solutions based on any additively homomorphic encryption are believed to be of independent interest.
Journal ArticleDOI

5PM: Secure pattern matching

TL;DR: The problem of secure pattern matching that allows single-character wildcards and substring matching in the malicious stand-alone setting is considered and the first secure expressive pattern matching protocol designed to optimize round complexity by carefully specifying the entire protocol round by round is considered.