Diego Perez-Botero
Diego Perez-Botero
Verified email at - Homepage
Cited by
Cited by
Characterizing hypervisor vulnerabilities in cloud computing servers
D Perez-Botero, J Szefer, RB Lee
Proceedings of the 2013 international workshop on Security in cloud …, 2013
Shining the floodlights on mobile web tracking-a privacy survey
C Eubank, M Melara, D Perez-Botero, A Narayanan
Proceedings of the IEEE Workshop on Web 2, 2013
A brief tutorial on live virtual machine migration from a security perspective
D Perez-Botero
University of Princeton, USA, 8, 2011
A framework for realizing security on demand in cloud computing
P Jamkhedkar, J Szefer, D Perez-Botero, T Zhang, G Triolo, RB Lee
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
Cyber defenses for physical attacks and insider threats in cloud computing
J Szefer, P Jamkhedkar, D Perez-Botero, RB Lee
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures
D Perez-Botero, Y Donoso
Networking and Distributed Computing (ICNDC), 2011 Second International …, 2011
Pwnetizer: Improving Availability in Cloud Computing Through Fast Cloning and I/O Randomization
D Perez-Botero
Master's Thesis, Princeton University, Princeton, NJ, 2013
Live Migration of an Entire Software-Defined Network
D Arora, D Perez-Botero
Characterizing the VM-Hypervisor Attack Surface
D Perez-Botero, R Lee
2r sim-risk and reliability analysis software based on computationally optimized simulation methods
D Perez-Botero
Uniandes, 2010
COS 597D Project-Mobile vs Traditional Web Tracking (FourthPartyMobile)
D Perez-Botero, M Melara, C Eubank
The system can't perform the operation now. Try again later.
Articles 1–11