Characterizing hypervisor vulnerabilities in cloud computing servers D Perez-Botero, J Szefer, RB Lee Proceedings of the 2013 international workshop on Security in cloud …, 2013 | 270 | 2013 |
Shining the floodlights on mobile web tracking-a privacy survey C Eubank, M Melara, D Perez-Botero, A Narayanan Proceedings of the IEEE Workshop on Web 2, 2013 | 36 | 2013 |
A brief tutorial on live virtual machine migration from a security perspective D Perez-Botero University of Princeton, USA, 8, 2011 | 29 | 2011 |
A framework for realizing security on demand in cloud computing P Jamkhedkar, J Szefer, D Perez-Botero, T Zhang, G Triolo, RB Lee 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 27 | 2013 |
Cyber defenses for physical attacks and insider threats in cloud computing J Szefer, P Jamkhedkar, D Perez-Botero, RB Lee Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 24 | 2014 |
VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures D Perez-Botero, Y Donoso Networking and Distributed Computing (ICNDC), 2011 Second International …, 2011 | 15 | 2011 |
Pwnetizer: Improving Availability in Cloud Computing Through Fast Cloning and I/O Randomization D Perez-Botero Master's Thesis, Princeton University, Princeton, NJ, 2013 | 2 | 2013 |
Live Migration of an Entire Software-Defined Network D Arora, D Perez-Botero | 1* | |
Characterizing the VM-Hypervisor Attack Surface D Perez-Botero, R Lee | 1 | |
2r sim-risk and reliability analysis software based on computationally optimized simulation methods D Perez-Botero Uniandes, 2010 | | 2010 |
COS 597D Project-Mobile vs Traditional Web Tracking (FourthPartyMobile) D Perez-Botero, M Melara, C Eubank | | |