Eyasu G. Chekole
Home
News
Projects
Publications
Services
Awards
Teaching
Supervision
Contact
Eyasu Getahun Chekole
Latest
MFAA: Historical Hash Based Multi-Factor Authentication and Authorization in IIoT
Excavating Vulnerabilities Lurking in Multi-Factor Authentication Protocols: A Systematic Security Analysis
VulnGen: Vulnerable Virtual Machine Generator
EARIC: Exploiting ADC Registers in IoT and Control Systems
IRC-SET 2023: Proceedings of the 9th IRC Conference on Science, Engineering and Technology
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies
IRC-SET 2022: Proceedings of the 8th IRC Conference on Science, Engineering and Technology
DARUD: Detecting and Arresting Rogue USB Devices in the V2X Ecosystem
Enhance Enterprise Security through Implementing ISO/IEC27001 Standard
Threat Modeling and Security Analysis of Containers: A Survey
IRC-SET 2021: Proceedings of the 7th IRC Conference on Science, Engineering and Technology
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems
CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems
ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS
Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS
Enforcing Full-Stack Memory Safety in Cyber-Physical Systems
Enforcing Memory Safety in Cyber-Physical Systems
Attribute Based Access Control for APIs in Spring Security
Selective Release of Smart Metering Data in Multi-domain Smart Grids
Cite
×