default search action
Kashyap Thimmaraju
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Kashyap Thimmaraju, Altaf Shaik, Sunniva Flück, Pere Joan Fullana Mora, Christian Werling, Jean-Pierre Seifert:
Security Testing The O-RAN Near-Real Time RIC & A1 Interface. WISEC 2024: 277-287 - [i8]Kashyap Thimmaraju, Saad Hermak, Gábor Rétvári, Stefan Schmid:
MTS: Bringing Multi-Tenancy to Virtual Networking. CoRR abs/2403.01862 (2024) - [i7]Robert Krösche, Kashyap Thimmaraju, Liron Schiff, Stefan Schmid:
I DPID It My Way! A Covert Timing Channel in Software-Defined Networks. CoRR abs/2403.01878 (2024) - 2022
- [j2]Kashyap Thimmaraju, Björn Scheuermann:
Count Me If You Can: Enumerating QUIC Servers Behind Load Balancers. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - 2021
- [j1]Kashyap Thimmaraju, Liron Schiff, Stefan Schmid:
Preacher: Network Policy Checker for Adversarial Environments. IEEE/ACM Trans. Netw. 29(5): 2087-2100 (2021) - [c12]Amir Sabzi, Liron Schiff, Kashyap Thimmaraju, Andreas Blenk, Stefan Schmid:
Macchiato: Importing Cache Side Channels to SDNs. ANCS 2021: 8-14 - [c11]Julian Fietkau, Kashyap Thimmaraju, Felix Kybranz, Sebastian Neef, Jean-Pierre Seifert:
The Elephant in the Background: A Quantitative Approachto Empower Users Against Web Browser Fingerprinting. WPES@CCS 2021: 167-180 - 2020
- [b1]Kashyap Thimmaraju:
From threats to solutions in data center networks. Technical University of Berlin, Germany, 2020 - [i6]Kashyap Thimmaraju, Stefan Schmid:
Towards Fine-Grained Billing For Cloud Networking. CoRR abs/2003.10745 (2020) - [i5]Kashyap Thimmaraju, Julian Fietkau, Fatemeh Ganji:
Towards an Insightful Computer Security Seminar. CoRR abs/2003.11340 (2020)
2010 – 2019
- 2019
- [c10]Kashyap Thimmaraju, Liron Schiff, Stefan Schmid:
Preacher: Network Policy Checker for Adversarial Environments. SRDS 2019: 32-41 - [c9]Kashyap Thimmaraju, Saad Hermak, Gábor Rétvári, Stefan Schmid:
MTS: Bringing Multi-Tenancy to Virtual Networking. USENIX ATC 2019: 521-536 - 2018
- [c8]Robert Krösche, Kashyap Thimmaraju, Liron Schiff, Stefan Schmid:
I DPID It My Way! A Covert Timing Channel in Software-Defined Networks. Networking 2018: 2017-225 - [c7]Kashyap Thimmaraju, Gábor Rétvári, Stefan Schmid:
Virtual Network Isolation: Are We There Yet? SecSoN@SIGCOMM 2018: 1-7 - [c6]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid:
Taking Control of SDN-based Cloud Systems via the Data Plane. SOSR 2018: 1:1-1:15 - 2017
- [c5]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid:
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser. CCSW 2017: 11-15 - [c4]Kashyap Thimmaraju, Liron Schiff, Stefan Schmid:
Outsmarting Network Security with SDN Teleportation. EuroS&P 2017: 563-578 - [c3]Bhargava Shastry, Markus Leutner, Tobias Fiebig, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Stefan Schmid, Jean-Pierre Seifert, Anja Feldmann:
Static Program Analysis as a Fuzzing Aid. RAID 2017: 26-47 - [i4]Kashyap Thimmaraju, Liron Schiff, Stefan Schmid:
Software-Defined Adversarial Trajectory Sampling. CoRR abs/1705.00370 (2017) - 2016
- [c2]Liron Schiff, Kashyap Thimmaraju, Stefan Schmid:
Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers. DSN Workshops 2016: 113-119 - [c1]Anja Feldmann, Philipp Heyder, Michael Kreutzer, Stefan Schmid, Jean-Pierre Seifert, Haya Schulmann, Kashyap Thimmaraju, Michael Waidner, Jens Sieberg:
NetCo: Reliable Routing With Unreliable Routers. DSN Workshops 2016: 128-135 - [i3]Liron Schiff, Kashyap Thimmaraju, Stefan Schmid:
Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers. CoRR abs/1609.02324 (2016) - [i2]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid:
Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR abs/1610.08717 (2016) - [i1]Kashyap Thimmaraju, Liron Schiff, Stefan Schmid:
Outsmarting Network Security with SDN Teleportation. CoRR abs/1611.05362 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint