Publications
A list of cybersecurity papers published by CIAC members is given below.
2024
Kerem Arikan, Abraham Farrell, Willimas Zhang Cen, Jack McMahon, Barry Williams, Yu David Liu, Nael Abu-Ghazaleh, Dmitry Ponomarev, TEE-SHirT: Scalable Leakage-Free Cache Hierarchies for TEEs, Network and Distributed Systems Security Symposium (NDSS), San Diego, February 2024.
Ethan Ferguson, Adam Wilson, and Hoda Naghibijouybari, WebGPU-SPY: Finding Fingerprints in the Sandbox Through GPU Cache Attacks, Accepted, AsiaCCS 2024.
2023
Ravi Theja Gollapudi, Gokturk Yuksek, David B Demicco, Matthew Cole, Gaurav N Kothari, Rohit H Kulkarni, Xin Zhang, Kanad Ghose, Aravind Prakash and Zerksis Umrigar, Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture, in the proceedings of the 44th IEEE Symposium on Security and Privacy (S&P'23), San Fransisco, USA, May 2023.
Pujan Paudel, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini, Lambretta: learning to rank for Twitter soft moderation, 2023 IEEE Symposium on Security and Privacy (SP), 311-326, 2023.
Sabbir Ahmed, Abdullah Al Arafat, Mamshad Nayeem Rizve, Rahim Hossain, Zhishan Guo, Adnan Siraj Rakin; Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2023, pp. 19180-19190
Sankha Baran Dutta, Hoda Naghibijouybari, Arjun Gupta, Nael Abu-Ghazaleh, Andres Marquez, and Kevin Barker, Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems, Proceedings of the International Symposium on Computer Architecture (ISCA), 2023.
Ugur Kursuncu, Kai-Cheng Yang, Francesco Pierri, Matthew R Deverna, Yelena Mejova, Jeremy Blackburn, CySoc 2023: 4th International Workshop on Cyber Social Threats,Proceedings of the ACM Web Conference, 2023.
G. Yan, H. Wang, X. Yuan and J. Li, "DeFL: Defending Against Model Poisoning Attacks in Federated Learning via Critical Learning Periods Awareness". Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI), Washington, DC, February 2023.
Qian Qu and Yu Chen, Digital Twins in the AIoMT, Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things, 2023.
H. Sun and Yu Chen, An Overview of AIoMT Applications, Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things, 2023.
J. Parker, D. Nagothu, Y. Chen, Decentralized Vehicular Identification and Tracking on Lightweight IoT Edge Nodes, IEEE National Aerospace and Electronics Conference, 198-203, 2023.
N. Poredi, Y. Chen, X. Li, and E. Blasch, Enhance Public Safety Surveillance in Smart Cities by Fusing Optical and Thermal Cameras, 26th International Conference on Information Fusion (FUSION), 1-7, 2023
Q. Qu, R. Xu, H. Sun, Y. Chen, S. Sarkar, I. Ray, A Digital Healthcare Service Architecture for Seniors Safety Monitoring in Metaverse, IEEE International Conference on Metaverse Computing, Networking and Applications.
D. Nagothu and Y. Chen, “Authenticating Video Feeds in Smart Edge Surveillance System using Electrical Frequency Estimation,” SPIE Spotlight Series, ISBN 978-1-80356-342-8, August 30, 2023.
X. Xu, Y. Chen, and E. Blasch, “Lightweight Blockchain for the Internet of Things: Rationales and a Case Study,” SPIE Spotlight Series, ISBN 978-1-80356-342-8, August 30, 2023.
S. Wei, H. Huang, R. Xu, Y. Chen, E. Blasch, and G. Chen, “ROBOT: Resilience Oriented Blockchain Operational Transactor for Urban Air Mobility Networks,” the 23rd Integrated Communications, Navigation, and Surveillance Conference (ICNS 2023), Herndon, VA, USA, April 18-20, 2023.
J. Parker, D. Nagothu, and Y. Chen, “Improving the Performance of Object Detection on IoT Devices through Device-Specific Pre-Processing,” the SPIE Defense + Commercial Sensing, Orlando, Florida, April 30 – May 4, 2023.
N. Poredi, D. Nagothu, and Y. Chen, “AUSOME: Authenticating Social Media Images using Electrical Network Frequency Fingerprints,” the SPIE Defense + Commercial Sensing, Orlando, Florida, April 30 – May 4, 2023.
D. Nagothu, R. Xu, and Y. Chen, “DEMA: Decentralized Electrical Network Frequency Map for Social Media Authentication,” the SPIE Defense + Commercial Sensing, Orlando, Florida, April 30 – May 4, 2023.
Joon-young Gwak, Priti Wakodikar, Meng Wang, Guanhua Yan, Xiaokui Shu, Scott Stoller, and Ping Yang, Debugging Malware Classification Models Based on Audit Logs with Explainable AI, The 2023 ICDM Workshop on Causal and Explainable Artificial Intelligence, 2023.
Scott Craver, Nicholas Rosbrook, Applying a Zero-Knowledge Watermarking Protocol to Secure Elections, ACM Workshop on Information Hiding and Multimedia Security, 115-120, 2023.
E Kaziakhmedov, E Dworetzky, J Fridrich, Observing Bag Gain in JPEG Batch Steganography, IEEE Workshop on Information Security and Forensics, 2023
Mauro Barni, Patrizio Campisi, Edward J Delp, Gwenaël Doërr, Jessica Fridrich, Nasir Memon, Fernando Pérez-González, Anderson Rocha, Luisa Verdoliva, Min Wu, Information Forensics and Security: A quarter-century-long journey, IEEE Signal Processing Magazine 40 (5), 67-79, 2023
E. Kaziakhmedov, Y. Yousfi, and E. Dworetzky, J. Fridrich, Cost Polarization by Dequantizing for JPEG Steganography, with Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2023, San Francisco, CA, January 16–20, 2023.
E. Dworetzky, E. Kaziakhmedov, and J. Fridrich, On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests, 11th ACM Workshop on Information Hiding and Multimedia Security, Chicago, IL, June 28-30, 2023.
E. Kaziakhmedov, E. Dworetzky, and J. Fridrich, Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice, with E. Dworetzky and E. Kaziakhmedov, ACM Workshop on Information Hiding and Multimedia Security, Chicago, IL, June 28-30, 2023.
E. Kaziakhmedov, E. Dworetzky, and J. Fridrich, Limits of Data Driven Steganography Detectors, ACM Workshop on Information Hiding and Multimedia Security, Chicago, IL, June 28-30, 2023.
E. Dworetzky and J. Fridrich, Explaining the Bag Gain in Batch Steganography, IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3031-3043, 2023.
Zhan Shu and Guanhua Yan, EAGLE: Evasion Attacks Guided by Local Explanations against Android Malware Classification, IEEE Transactions on Dependable and Secure Computing (TDSC'23). Accepted, 2023
Joon-young Gwak, Priti Wakodikar, Meng Wang, Guanhua Yan, Xiaokui Shu, Scott Stoller, and Ping Yang,Debugging Malware Classification Models Based on Audit Logs with Explainable AI, The 2023 ICDM WOrkshop on Causal and Explainable Artificial Intelligence, 2023.
Ravi Theja Gollapudi, Gokturk Yuksek, David B Demicco, Matthew Cole, Gaurav N Kothari, Rohit H Kulkarni, Xin Zhang, Kanad Ghose, Aravind Prakash and Zerksis Umrigar, Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture, to appear in the proceedings of the 44th IEEE Symposium on Security and Privacy, San Fransisco, USA, May 2023.
R Xu, D Nagothu, and Y Chen, ECOM: Epoch Randomness-Based Consensus Committee Configuration for IoT Blockchains, Principles and Practice of Blockchains, 135-154, 2023.
Edgar Kaziakhmedov, Yassine Yousfi, Eli Dworetzky, Jessica Fridrich, Cost Polarization by Dequantizing for JPEG Steganography, Proceedings of IS&T Electronic Imaging, 2023.
2022
Daniel Townley, Kerem Arikan, Yu David Liu, Dmitry Ponomarev, Oguz Ergin, Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks, USENIX Security Symposium, Boston, MA, August 2022.
Mohammad Hammas Saeed, Shiza Ali, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, and Gianluca Stringhini. Trollmagnifier: Detecting state-sponsored troll accounts on reddit. In IEEE Security & Privacy (S&P), 2022.
Eli Dworetzky and Jessica Fridrich, Explaining the Bag Gain in Batch Steganography, IEEE Transaction on Information Forensics and Security, 2022.
Hoda Naghibijouybari, Esmaeil Mohammadian Koruyeh, Nael Abu-Ghazaleh, Microarchitectural Attacks in Heterogeneous Systems: A Survey, ACM Computing Surveys, 2022
Saeid Mofrad, Ishtiaq Ahmed, Fengwei Zhang, Shiyong Lu, Ping Yang, and Heming Cui, Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments, Accepted, IEEE Transactions on Dependable and Secure Computing, 2022.
David Demicco, Matthew Cole, Shengdun Wang and Aravind Prakash, A Security Analysis of Labeling-Based Control-Flow Integrity Schemes, in the proceedings of the Workshop on Data Fabric for Hybrid Clouds, collocated with IEEE HiPC, December 2022.
Matthew Cole and Aravind Prakash, SIMPLEX: Repurposing Intel Memory Protection Extensions for Secure Storage, Proceedings of the 27th Nordic Conference on Secure IT Systems, December 2022.
S. A. Craver and G. Bal, A video auditing system for display-based voting machines, Electronic Imaging, 34, pp. 1-4, 2022
Jingyao Zhang, Hoda Naghibijouybari, Elaheh Sadredini, Sealer: In-SRAM AES for High-Performance and Low-Overhead Memory Encryption, Proceedings of the ACM/IEEE International Symposium on Low Power Electronics and Design, pp. 1-6, 2022.
Zhixin Wen, Harsh Sanjay Pacherkar, and Guanhua Yan, VET5G: A Virtual End-to-End Testbed for 5G Network Security Experimentation, Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET'22), Virtual, August 2022.
Zhan Shu and Guanhua Yan, IoTInfer: Automated Blackbox Fuzz Testing of IoT Network Protocols Guided by Finite State Machine Inference, IEEE Internet of Things Journal, 2022.
J. Dinal Herath, Priti Prabhakar Wakodikar, Ping Yang, and Guanhua Yan, CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs, the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2022
Y. Yousfi, E. Dworetzky, and J. Fridrich, Detector-Informed Batch Steganography and Pooled Steganalysis, 10th IH&MMSec. Workshop, June 27-28, 2022.
D. Nagothu, D. Dimock, A. Kulesza, H. Yang, and Y. Chen, A distributed crawler for IoVT-based public safety surveillance exploring the spatio-temporal correlation, Sensors and Systems for Space Applications XV 12121, 18-28, 2022.
R. Xu, Y. Chen, G. Chen, and E. Blasch, SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network, Future Internet 14 (12), 2022
R. Xu, S. Wei, Y. Chen, G. Chen, and K. Pham, LightMAN: A Lightweight Microchained Fabric for Assurance-and Resilience-Oriented Urban Air Mobility Networks, Drones 6 (12), 2022.
D. Nagothu, R. Xu, Y. Chen, E. Blasch, and A. Aved, DeFakePro: Decentralized Deepfake Attacks Detection Using ENF Authentication, IT Professional 24 (5), 46-52, 2022.
N. Poredi, D. Nagothu, Y. Chen, X. Li, A. Aved, E. Ardiles-Cruz, and E. Blasch, Robustness of Electrical Network Frequency Signals as a Fingerprint for Digital Media Authentication, IEEE 24th International Workshop on Multimedia Signal Processing, 2022
D. Nagothu, N. Poredi, and Y. Chen, Evolution of Attacks on Intelligent Surveillance Systems and Effective Detection Techniques, Intelligent Video Surveillance – New Perspectives, 2022
R. Xu and Y. Chen, Fairledger: a Fair Proof-of-Sequential-Work based Lightweight Distributed Ledger for IoT Networks, IEEE International Conference on Blockchain (Blockchain), 348-355, 2022.
R. Xu, Y. Chen, X. Li. and E. Blasch, A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems, 2022 International Conference on Computer Communications and Networks (ICCCN), 2022.
L Haghnegahdar, Y Chen, and Y Wang, Enhancing dynamic energy network management using a multiagent cloud-fog structure, Renewable and Sustainable Energy Reviews 162, 2022
E Blasch, N Sullivan, G Chen, Y Chen, D Shen, W Yu, HM Chen, Data fusion information group (DFIG) model meets AI+ ML, Signal Processing, Sensor/Information Fusion, and Target Recognition XXXI, 2022.
R Xu and Y Chen, μDFL: A Secure Microchained Decentralized Federated Learning Fabric atop IoT Networks, IEEE Transactions on Network and Service Management, 2022.
H Sun and Y Chen, Real-Time Elderly Monitoring for Senior Safety by Lightweight Human Action Recognition, the 16th IEEE International Symposium on Medical Information and Communication Technology, 2022.
D Nagothu, R Xu, Y Chen, E Blasch, and A Aved, Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach, Future Internet 14 (5), 125, 2022.
A Fitwi, Y Chen, and S Zhu, Lightweight frame scrambling mechanisms for end-to-end privacy in edge smart surveillance, IET Smart Cities 4 (1), 17-35, 2022
N Chen and Y Chen, Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service, Future Internet 14 (2), 54, 2022
Y Sun, S Zhu, and Y Chen, ZoomP 3: Privacy-Preserving Publishing of Online Video Conference Recordings, Proceedings on Privacy Enhancing Technologies 3, 630-649, 2022
Sujoy Sikdar, Sikai Ruan, Qishen Han, Paween Pitimanaaree, Jeremy Blackthorne, Bulent Yener, and Lirong Xia, Anti-Malware Sandbox Games, Accepted, Proceedings of the 21st International Conference on Autonomous Agents and MultiAgent Systems, 2022 (AAMAS-22).
2021
SB Dutta, H. Naghibijouybari, N. Abu-Ghazaleh, A. Marquez, and K. Barker, Leaky Buddies: Cross-Component Covert Channels on Integrated CPU-GPU Systems, ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA), 2021.
Hoda Naghibijouybari, A. Neupane, Z Qian, and N. Abu-Ghazaleh, Beyond the CPU: Side-Channel Attacks on GPUs, IEEE Design & Test, 38 (3), 15-21, 2021.
Zezhang Yang, Jian Li, and Ping Yang, FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning, Accepted, EAI Endorsed Transactions on Security and Safety, 2021.
Alem Haddush Fitwi, Yu Chen, Sencun Zhu, Enforcing Privacy Preservation on Edge Cameras using Lightweight Video Frame Scrambling, IEEE Transactions on Services Computing, 2021.
Md Shohidul Islam, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Dmitry Ponomarev, Lei Yu, Efficient Hardware Malware Detectors that are Resilient to Adversarial Evasion, IEEE Transactions on Computers, 2021.
Chen Ling, Utkucan Balci, Jeremy Blackburn, Gianluca Stringhini, A First Look at Zoombombing, IEEE Symposium on Security and Privacy, 1452-1467, 2021.
David Demicco, Rukayat Erinfolami and Aravind Prakash, Program Hardening via ABI Debiasing, to appear in the proceedings of the 37th Annual Computer Security Applications Conference (ACSAC'21), December 2021.
Sarp Ozdemir, Rutvik Saptarshi, Aravind Prakash and Dmitry Ponomarev, Track Conventions, Not Attack Signatures: Fortifying X86 ABI and System Call Interfaces to Mitigate Code Reuse Attacks, To appear in the International Symposium on Secure and Private Execution Environment Design, 2021 (SEED'21), September, 2021.
Md Shohidul Islam, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Dmitry Ponomarev, Lei Yu, Efficient Hardware Malware Detectors that are Resilient to Adversarial Evasion, IEEE Transactions on Computers, 2021.
Jerome Dinal Herath, Ping Yang, and Guanhua Yan, Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs, accepted, The 11th ACM Conference on Data and Application Security and Privacy, 2021.
T. Itzhaki, Y. Yousfi, and J. Fridrich, Data Augmentation for JPEG Steganalysis, IEEE International Workshop on Information Forensics and Security, 2021.
Y. Yousfi, J. Butora, and J. Fridrich, CNN Steganalyzers Leverage Local Embedding Artifacts, IEEE International Workshop on Information Forensics and Security, 2021.
Y. Yousfi, T. Itzhaki, and J. Fridrich, Data Augmentation for JPEG Steganalysis, 13th IEEE Workshop on Information Security and Forensics, 2021.
E. Dworetzky and J. Fridrich, JPEG Compatibility Attack Revisited, IEEE Transactions on Information Forensics and Security, 2021.
Jan Butora and Jessica Fridrich, Extending the Reverse JPEG Compatibility Attack to Double Compressed Images, with J. Butora, IEEE ICASSP, 2021, Toronto.
Jan Butora, Yassine Yousf, Clément Fuji Tsang, and Jessica Fridrich, Improving EfficientNet for JPEG Steganalysis, 9th IH&MMSec. Workshop, Brussels, Belgium, June 22-25, 2021.
Jan Butora, Yassine Yousf, and Jessica Fridrich, How to Pretrain for Steganalysis, 9th IH&MMSec. Workshop, Brussels, Belgium, June 22-25, 2021.
Jan Butora and Jessica Fridrich, Revisiting Perturbed Quantization, 9th IH&MMSec. Workshop, Brussels, Belgium, June 22-25, 2021
Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved, Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint Consensus, Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems, 2021.
K. Almalki, M. Mohzary, B. Choi, S. Song, and Y. Chen, “Crowd Safety Sensing (CroSS) for the Post Pandemic Era,” the 2021 IEEE Globecom: Workshop on Sustainable Environmental Sensing Systems (SESSy), Madrid, Spain, Dec. 7 – 11, 2021.
K. Almalki, B. Choi, Y. Chen, and S. Song, “Characterizing Scattered Occlusions for Effective Dense- Mode Crowd Counting,” the 1st Occluded Video Instance Segmentation (OVIS) Workshop, in conjunction with ICCV 2021, Virtual, Oct. 11 – 17, 2021.
M. Khan and Y. Chen, “A Randomized Switched-Mode Voltage Regulation System for IoT Edge Device to Defend Against Power Analysis based Side Channel Attack,” the 10th International Symposium on Security & Privacy on Internet of Things (SPIoT 2021), New York, October 01-03, 2021.
Deeraj Nagothu, Ronghua Xu, Yu Chen, Eric Blasch, and Alexander Aved, “DeFake: Decentralized ENF-Consensus-based DeepFake Detection in Video Conferencing,” the Special Session on “Deepfake Video Generation and Detection” at the IEEE 23rd International Workshop on Multimedia Signal Processing (IEEE MMSP 2021), Tampere, Finland, on October 06-08, 2021.
K. Almalki, M. Mohzary, B. Choi, S. Song, and Y. Chen, “MOSAIC: Modelling Safety Index in Crowd by Detecting Face Masks against COVID-19 and Beyond,” the 2021 IEEE International Smart Cities Conference (IEEE ISC2 2021), Virtual, Sept. 7 – 10, 2021.
Qian Qu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved, Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT), Future Internet, 2021.
R. Xu and Y. Chen, “Fed-DDM: a Federated Ledgers based Framework for Hierarchical Decentralized Data Marketplaces,” the 4th International Workshop on Blockchain Enabled Sustainable Smart Cities (BLESS), in conjunction with 30th International Conference on Computer Communications and Networks (ICCCN 2021), Athens, Greece, July 19 – 22, 2021.
A. Fitwi and Y. Chen, “Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain,” the 4th International Workshop on Blockchain Enabled Sustainable Smart Cities (BLESS), in conjunction with 30th International Conference on Computer Communications and Networks (ICCCN 2021), Athens, Greece, July 19 – 22, 2021.
Ronghua Xu, Deeraj Nagothu, and Yu Chen, “EconLedger: A Proof-of-ENF Consensus based Lightweight Distributed Ledger for IoVT Networks,” MDPI Future Internet, Special Issue on Blockchain: Applications, Challenges, and Solutions, 13(10), 248, 2021
Ronghua Xu, Yu Chen, and E Blasch, Microchain: a Light Hierarchical Consensus Protocol for IoT System, Blockchain Applications in IoT: Principles and Practices, 2021.
W Quan, Deeraj Nagothu, N Poredi, and Yu Chen, CriPI: an efficient critical pixels identification algorithm for fast one-pixel attacks, Sensors and Systems for Space Applications, 2021.
Ronghua Xu, Deeraj Nagothu, and Yu Chen, Decentralized video input authentication as an edge service for smart cities, IEEE Consumer Electronics Magazine, 2021.
Deeraj Nagothu, Yu Chen, A Aved, and E Blasch, Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge, the EAI Endorsed Transactions on Security and Safety, 2021.
A Fitwi, Yu Chen, Sencun Zhu, E Blasch, and G Chen, Privacy-preserving surveillance as an edge service based on lightweight video protection schemes using face de-identification and window masking, Electronics 10 (3), 236, 2021.
2020
S HaijAmin Shirazi, Hoda Naghibijouybari, and Nael Abu-Ghazaleh, Securing Machine Learning Architecures and SYstems, Proceedings of Great Lakes Symposium on VLSI, 2020.
Sumantra Sarkar, Anthony Vance, Balasubramaniam Ramesh, Menelaos Demestihas, and Daniel Thomas Wu, The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context, Information Systems Research, 2020.
Théo Taburet, Patrick Bas, Wadih Sawaya, and Jessica Fridrich, Natural Steganography in JPEG Domain with a Linear Development Pipeline, IEEE Transactions on Information Forensics and Security, pp. 173-186, 2020.
Rukayat Erinfolami and Aravind Prakash, Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries, To appear, the 27th ACM Conference on Computer and Communications Security, (CCS), Orlando, FL, November 2020.
Kaiming Fang and Guanhua Yan, IoTReplay: Troubleshooting COTS IoT Devices with Record and Replay, Proceedings of The Fifth ACM/IEEE Symposium on Edge Computing (SEC'20), San Jose, CA, USA, November 2020.
Khaled Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh, and Dmitry Ponomarev, "EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers", IEEE Transactions on Dependable and Secure Computing (TDSC), 2020.
Ronghua Xu, Seyed Yahya Nikouei, Deeraj Nagothu, Alem Fitwi, Yu Chen, BlendSPS: A BLockchain-ENabled Decentralized Smart Public Safety System, Smart Cities Journal, 3(3), 928-951,2020
Seyed Yahya Nikouei, Yu Chen, Alex Aved, Erik Blasch, I-ViSE: Interactive Video Surveillance as an Edge Service using Unsupervised Feature Queries, IEEE Internet of Things Journal, 1-10, 2020.
Shirin Haji Amin Shirazi, Hoda Naghibijouybari, and Nael Abu-Ghazaleh, Securing Machine Learning Architectures and Systems, Proceedings of the 30th Great Lakes Symposium on VLSI (GLSVLSI), 2020.
Aisha Hasan, Ryan Riley, and Dmitry Ponomarev, "Port or Shim: Stress-Testing Application Performance on Intel SGX", IEEE International Symposium on Workload Characterization (IISWC), October 2020.
Umur Ciftci, Ilke Demir, and Lijun Yin, FakeCatcher: Detection of Synthetic Portrait Videos Using Biological Signals, to appear in IEEE Transactions on Pattern Analysis and Machine Intelligence, July 2020.
Umur Ciftci, Ilke Demir, and Lijun Yin, How do the Hearts of Deep fakes Beat? Deep Fake Source Detection via Interpreting Residuals with Biological Signals, IEEE/IAPR International Joint Conference on Biometrics (IJCB), 2020
Kaiming Fang and Guanhua Yan, Paging Storm Attacks against 4G/LTE Networks from Regional Android Botnets: Rationale, Practicality, and Implications, To appear, 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC), July 2020.
Dinuni Fernando, Ping Yang, and Hui Lu, SDN-based Order-aware Live Migration of Virtual Machines, IEEE Infocom, July 2020.
Yassine Yousfi and Jessica Fridrich, An Intriguing Struggle of CNNs in JPEG Steganalysis and the OneHotConv Solution, IEEE Signal Processing Letter, 2020.
Jan Butora, Yassine Yousfi, and Jessica Fridrich, Turning Cost-Based Steganography into Model-Based, 8th workshop on Information Hiding and Multimedia Security, Denver, CO, June 20-22, 2020.
Jan Butora and Jessica Fridrich, Steganography and its Detection in JPEG Images Obtained with the “Trunc” Quantizer, IEEE ICASSP, Barcelona, Spain, May 4–8, 2020
Seungmin Rho, Yu Chen, Wireless multimedia surveillance networks, Multimedia Tools and Applications, 79(23-24), 2020
Alem Fitwi, Meng Yuan, Seyed Yahya Nikouei, Yu Chen, Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge. EAI Endorsed Transactions on Security and Safety 7(23), 2020
Alem Fitwi, Yu Chen, Privacy-Preserving Selective Video Surveillance. IEEE International Conference on Computer Communications and Networks, 1-10, 2020
Ronghua Xu, Yu Chen, Erik Blasch, Decentralized Access Control for IoT Based on Blockchain and Smart Contract, Modeling and Design of Secure Internet of Things, 2020.
Meng Yuan, Seyed Yahya Nikouei, Alem Fitwi, Yu Chen, Yunxi Dong, Minor Privacy Protection Through Real-time Video Processing at the Edge, IEEE International Conference on Computer Communications and Networks, 1-6.
Qian Qu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen, An Experimental Study on Microservices based Edge Computing Platforms. INFOCOM Workshops 2020: 836-841.
Ronghua Xu, Zhe Zhai, Yu Chen, J. Koji Lum, BIT: A Blockchain Integrated Time Banking System for Community Exchange Economy. IEEE International Smart City Conference, 2020.
Yuanyi Sun, Shiqing Chen, Sencun Zhu, and Yu Chen, iRyP: a purely edge-based visual privacy-respecting system for mobile cameras. 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 195-206.
Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved, Genshe Chen, Dan Shen, Hybrid blockchain-enabled secure microservices fabric for decentralized multi-domain avionics systems, Sensors and Systems for Space Applications XIII, volume 11422, 2020.
Joseph St Cyr, Joshua Vanderpool, Yu Chen, Xiaohua Li, HODET: Hybrid Object DEtection and Tracking using mmWave Radar and Visual Sensors, Sensors and Systems for Space Applications XIII, volume 11422, 2020
Yunus Kucuk and Guanhua Yan, Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples, Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY'20), New Orleans, LA, USA, March 2020.
Mehdi Boroumand and Jessica Fridrich, Synchronizing Embedding Changes in Side-Informed Steganography, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2020, San Francisco, CA, January 26–30, 2020.
Yassine Yousfi and Jessica Fridrich, JPEG Steganalysis Detectors Scalable With Respect to Compression Quality, with Y. Yousfi, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2020, San Francisco, CA, January 26–30, 2020.
Jan Butora and Jessica Fridrich, Minimum Perturbation Cost Modulation for Side-Informed Steganography, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2020, San Francisco, CA, January 26–30, 2020.
2019
Chatterjee, S., X. Gao, S. Sarkar and C. Uzmanoglu, Reacting to the Scope of a Data Breach: The Differential Role of Fear and Anger, Journal of Business Research 101: 183-193, 2019.
Rukayat Erinfolami, Anh Quach and Aravind Prakash, On Design Inference from Binaries Compiled using Modern C++ Defenses, Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID'19), September 2019.
Saeid Mofrad, lshtiaq Ahmed, Shiyong Lu, Ping Yang, Heming Cui, Fengwei Zhang, SecDATAVIEW: A Secure Big Data Workflow Management System for Heterogeneous Computing Environments, Accepted, Annual Computer Security Applications Conference (ACSAC'19), 2019
Rukayat Erinfolami and Aravind Prakash, DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries, Proceedings of the 14th ACM ASIA Conference on Computer and Communications Security (AsiaCCS'19), Auckland, NZ, July 2019.
Khaled Khasawneh, Esmaeil Koruyekh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev and Nael Abu-Ghazaleh, "SafeSpec: Banishing the Spectre of a Meltdown with Leakage-free Speculation", Design Automation Conference (DAC'19), Las Vegas, June 2019.
Daniel Townley, Khaled Khasawneh, Dmitry Ponomarev, Nael Abu-Ghazaleh, Lei Yu, LATCH: A Locality-Aware Taint Checker, International Symposium on Microarchitecture (MICRO), pp. 969-982, 2019. (Acceptance rate: 23%)
Dinuni K Fernando, Jonathan Terner, Kartik Gopalan, Ping Yang, , Live Migration Ate My VM: Recovering a Virtual Machine after Failure of Live Migration, The 38th IEEE International Conference on Computer Communication (INFOCOM'19), 2019
Dinuni Fernando, Siddharth Kulshrestha, J. Dinal Herath, Nitin Mahadik, Yanzhe Ma, Changxin Bai, Ping Yang, Guanhua Yan, and Shiyong Lu, SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance, Accepted, IEEE International Conference on Collaboration and Internet, 2019.
J. Dinal Herath, Changxin Bai, Guanhua Yan, Ping Yang, and Shiyong Lu, RAMP: Real-Time Anomaly Detection in Scientific Workflows, Accepted, IEEE International Conference on Big Data, 2019.
Xiaonan Zhang, Pei Huang, Linke Guo, and Mo Sha, Incentivizing Relay Participation for Securing IoT Communication, The 38th IEEE International Conference on Computer Communication (IEEE INFOCOM' 19), Paris, France, Apr. 29-May. 2, 2019.
Wenqiang Jin, Mingyan Xiao, Ming Li, and Linke Guo, ''If You Do Not Care About It, Sell It: Trading Location Privacy in Mobile Crowd Sensing", The 38th IEEE International Conference on Computer Communication (IEEE INFOCOM' 19), Paris, France, Apr. 29-May. 2, 2019.
Atsuko Shimizu, Daniel Townley, Mohit Joshi, Dmitry Ponomarev, "EA-PLRU: Enclave-Aware Cache Replacement", Workshop on Hardware and Architecture Support for Security and Privacy (HASP), in conjunction with ISCA 2019.
Nael Abu-Ghazaleh, Dmitry Ponomarev, Dmitry Evtyushkin, "How the Spectre and Meltdown Hacks Really Worked", IEEE Spectrum, February 2019.
Tianlin Li, Kartik Gopalan, Ping Yang, ContainerVisor: Customized Control of Container Resources, IEEE International Conference on Cloud Engineering (IC2E), 2019
Seyed Yahya Nikouei, Yu Chen, Sejun Song, Baek-Young Choi, Timothy R Faughnan, Toward Intelligent Surveillance as an Edge Network Service (iSENSE) using Lightweight Detection and Tracking Algorithms, IEEE Transactions on Services Computing, 2019.
MO Sayin, Emrah Akyol, Tamer Basar, Hierarchical multistage Gaussian signaling games in noncooperative communication and control systems, Automatica 107, 9-20, 2019
Xiaobin Gao, Emrah Akyol, Tamer Basar, Communication scheduling and remote estimation with adversarial intervention, IEEE/CAA Journal of Automatica Sinica 6 (1), 32-44, 2019
Patrick Bas, Theo Taburet, and Jessica Fridrich, “A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain”, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019, San Francisco, CA, January 13–17, 2019.
Jan Butora and Jessica Fridrich, “Detection of Diversified Stego Sources with CNNs,” Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019, San Francisco, CA, January 13–17 2019
Mehdi Boroumand, Jessica Fridrich, and Remi Cogranne, “Are we there yet?”, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019, San Francisco, CA, 2019.
Yassine Yousfi, Jan Butora, Jessica Fridrich, and Quentin Giboulot, Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019.
Mo Chen, Mehdi Boroumand, and Jessica Fridrich, Reference channels for steganalysis of images with convolutional neural networks, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019.
Théo Taburet, Patrick Bas, Jessica Fridrich, and Wadih Sawaya, Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Jan Butora and Jessica Fridrich, Effect of jpeg quality on steganographic security, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019.
Deeraj Nagothu, Jacob Schwell, Yu Chen, Erik Blasch, and Sencun Zhu, A study on smart online frame forging attacks against video surveillance system, Sensors and Systems for Space Applications, 2019
Seyed Yahya Nikouei, Ronghua Xu, Yu Chen, Alex Aved, and Erik Blasch, Decentralized smart surveillance through microservices platform, Sensors and Systems for Space Applications, 2019
Alem Fitwi, Yu Chen, and Ning Zhou, An agent-administrator-based security mechanism for distributed sensors and drones for smart grid monitoring, Signal Processing, Sensor/Information Fusion, and Target Recognition, 2019.
Zekun Yang, Yu Chen, Ning Zhou, Aleksey Polunchenko, and Yilu Liu, Data-driven online distributed disturbance location for large-scale power grids, IET Smart Grid, 2019.
Xuheng Lin, Ronghua Xu, David K. Hwang, and Yu Chen, Enhance Generalized Exchange Economy Using Blockchain: a Time Banking Case Study, the IEEE Blockchain Technical Briefs, 2019.
Seungmin Rho and Yu Chen, Social Internet of Things: Applications, architectures and protocols, Future Generation Computer Systems 92, 959-960, 2019
Ronghua Xu, Sherry Chen, Lixin Yang, Yu Chen, and Genshe Chen, Decentralized autonomous imaging data processing using blockchain, SPIE Multimodal Biomedical Imaging, 2019
Ronghua Xu, Yu Chen, Erik Blasch, and Genshe Chen, Exploration of blockchain-enabled decentralized capability-based access control strategy for space situation awareness, Optical Engineering 58 (4), 2019
Seyed Yahya Nikouei, Ronghua Xu, and Yu Chen, Smart Surveillance Video Stream Processing at the Edge for Real-Time Human Objects Tracking, Fog and Edge Computing: Principles and Paradigms, 2019
Deeraj Nagothu, Yu Chen, Erik Blasch, Alexander Aved, Sencun Zhu, Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals, Sensors 19 (11), 2019.
Seyed Yahya Nikouei, Yu Chen, Sejun Song, and Timothy R Faughnan, Kerman: A hybrid lightweight tracking algorithm to enable smart surveillance as an edge service, IEEE Consumer Communications & Networking Conference, 2019
2018
Anh Quach, Lok Kwong Yan and Aravind Prakash, Debloating Software through Piece-Wise Compilation and Loading, Proceedings of the 27th Annual Usenix Security Symposium (Security'18), Baltimore, Maryland, August 2018.
Mehdi Boroumand and Jessica Fridrich, “Applications of Explicit Non-Linear Feature Maps in Steganalysis,” IEEE Transactions on Information Forensics and Security, 13(4), pp. 823–833, 2018.
Kaiming Fang and Guanhua Yan, Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning, Proceedings of the European Symposium on Research in Computer Security (ESORICS'18), Barcelona, Spain, September 2018.
Khaled Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh, Dmitry Ponomarev, "EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers", IEEE Transactions on Dependable and Secure Computing (TDSC), 2018.
Dmitry Evtyushkin, Ryan Riley, Nael Abu-Ghazaleh, Dmitry Ponomarev, "BranchScope: A New Side-Channel Attack on Directional Branch Predictor", 23rd ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'18), Williamsburg, VA, March 2018.
Jian Liu, Yingying Chen, Yan Wang, Xu Chen, Jerry Cheng, Jie Yang, "Monitoring Vital Signs and Postures During Sleep Using WiFi Signals," IEEE Internet of Things Journal (IEEE IoT), 2018.
Chen Wang, Xiaonan Guo, Yingying Chen, Yan Wang, and Bo Liu, "Personal PIN leakage from wearable devices," IEEE Transactions on Mobile Computing (IEEE TMC), 17, no. 3 (2018): 646-660.
Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen, H. Vincent Poor, Authenticating Users through Fine-grained Channel Information, IEEE Transactions on Mobile Computing (IEEE TMC), 17, no. 2 (2018): 251-264.
Chen Wang, Jian Liu, Yingying Chen, Hongbo Liu, Yan Wang, "Towards In-baggage Suspicious Object Detection Using Commodity WiFi," in Proceedings of IEEE International Communications and Network Security, (IEEE CNS 2018), Beijing, China, May/June 2018.
Tianming Zhao, Jian Liu, Yan Wang, Hongbo Liu, Yingying Chen, "PPG-based Finger-level Gesture Recognition Leveraging Wearables," in Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM 2018), Honolulu, HI, USA, April 2018.
Ali Alper Yayla and Y. Lei (2018). Information security policies and value conflict in multinational companies. Information and Computer Security, 26(2), 230-245.
Zhan Shu and Guanhua Yan, Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats, Proceedings of The 5th ACM Workshop on Moving Target Defense, Toronto, Canada, October 2018.
Yunus Kucuk, Nikhil Patil, Zhan Shu, and Guanhua Yan, BigBing: Privacy-Preserving Cloud-Based Malware Classification Service, Proceedings of The 2nd IEEE Symposium on Privacy-Aware Computing (PAC'18), Washington DC, USA, September 2018.
Tianchong Gao, Feng Li, Yu Chen, XuKai Zou, Local differential privately anonymizing online social networks under hrg-based model, IEEE Transactions on Computational Social Systems 5 (4), 2018
Khaled Khasawneh, Nael Abu-Ghazaleh, Dmitry Ponomarev, Lei Yu, "Adversarial Evasion-Resilient Hardware Malware Detectors", International Conference on Computer-Aided Design, 2018
Xiaonan Zhang, Pei Huang, Qi Jia, and Linke Guo, ``CREAM: Unauthorized Secondary User Detection in Fading Environments'', Proc. of 15th International Conference on Mobile Ad-hoc and Sensor Systems, Chengdu, China, October 2018.
Wenqiang Jin, Ming Li, Linke Guo, and Lei Yang, ``DPDA: A Differentially Private Double Auction Scheme for Mobile Crowd Sensing'', IEEE Conference on Communications and Network Security, Beijing, China, May 29-Jun. 1, 2018.
Xiaonan Zhang, Qi Jia, and Linke Guo, ``Secure and Optimized Unauthorized Secondary User Detection in Dynamic Spectrum Access''. IEEE Conference on Communications and Network Security, Las Vegas, NV, Oct. 9-11, 2017..
Ali Eker, Barry Williams, Nitesh Mishra, Dushyant Thakur, Kenneth Chiu, Dmitry Ponomarev, Nael Abu-Ghazaleh, "Performance Implications of Global Virtual Time Algorithms on a Knights Landing Processor", 22nd IEEE/ACM International Symposium on Distribiuted Simulation and Real-Time Applications (DS-RT), Madrid, Spain, October 2018.
M. Goljan, Jan Fridrich, and M. Kirchner, “Image Manipulation Detection Using Sensor Linear Pattern” Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, 2018.
Tomas Denemark, P. Bas, and Jessica Fridrich, “Natural Steganography in JPEG Compressed Images”, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, 2018.
Mo Chen, Mehdi Boroumand, and Jessica Fridrich, “Deep Learning Regressors for Quantitative Steganalysis”, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, 2018.
Mehdi Boroumand and Jessica Fridrich, “Deep Learning for Detecting Processing History of Images”, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, 2018.
C. Fuji-Tsang and Jessica Fridrich, “Steganalyzing Images of Arbitrary Size with CNNs”, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, 2018.
Xiaobin Gac, Emrah Akyol, Tamer Başar, On Communication Scheduling and Remote Estimation in the Presence of an Adversary as a Nonzero-sum Game, IEEE Conference on Decision and Control (CDC), 2710-2715, 2018
Yanbing Mao, S. Bolouki, Emrah Akyol, On the evolution of public opinion in the presence of confirmation bias, IEEE Conference on Decision and Control (CDC), 5352-5357, 2018
Yanbing Mao, S Bouloki, and Emrah Akyol, Spread of information with confirmation bias in cyber-social networks, IEEE Transactions on Network Science and Engineering, 2018
Yanbing Mao and Emrah Akyol, Detectability of Cooperative Zero-Dynamics Attack, 56th Annual Allerton Conference on Communication, Control, and Computing, 2018
Xiaobin Gao, Emrah Akyol, and Tamar Basar, Optimal communication scheduling and remote estimation over an additive noise channel, Automatica 88, 57-69, 2018
Yanbing Mao and Emrah Akyol, Synchronization of Coupled Harmonic Oscillators by Time-Dependent Topology Switching, IFAC-PapersOnLine 51 (23), 402-407, 2018.
Ronghua Xu, Xuheng Lin, Qi Dong, Yu Chen, Constructing trustworthy and safe communities on a blockchain-enabled social credits system, Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2018
Seyed Yahya Nikouei, Yu Chen, Sejun Song, Ronghua Xu, Baek-Young Choi, Timothy Faughnan, Smart surveillance as an edge network service: From harr-cascade, svm to a lightweight cnn, ieee 4th international conference on collaboration and internet computing, 2018.
Deeraj Nagothu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen, A microservice-enabled architecture for smart surveillance using blockchain technology, IEEE International Smart Cities Conference (ISC2), 1-4, 2018
Seyed Yahya Nikouei, Ronghua Xu, Deeraj Nagothu, Yu Chen, Alexander Aved, Erik Blasch, Real-time index authentication for event-oriented surveillance video query using blockchain, 2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018
Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng, Explore Recurrent Neural Network for PUE Attack Detection in Practical CRN Models, IEEE International Smart Cities Conference (ISC2), 1-9, 2018.
Seyed Yahya Nikouei, Yu Chen, Timothy R. Faughnan, Smart Surveillance as an Edge Service for Real-Time Human Detection and Tracking, IEEE/ACM Symposium on Edge Computing (SEC), 336-337, 2018.
Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen. Blendcac: A smart contract enabled decentralized capability-based access control mechanism for the iot, Computers 7 (3), 39, 2018
Qi Dong, Yu Chen, Xiaohua Li, Kai Zeng, Roger Zimmermann, An adaptive primary user emulation attack detection mechanism for cognitive radio networks, International conference on security and privacy in communication systems, 2018
R. Xu, S. Nikouei, Y. Chen, S. Song, A. Polunchenko, C. Deng, and T. Faughnan, “Real-Time Human Object Tracking for Smart Surveillance at The Edge,” the IEEE International Conference on Communications, Selected Areas in Communications Symposium Smart Cities Track (ICC SmartCities 2018), Kansas City, MO, USA, May 20-24, 2018.
Z. Yang, N. Chen, Y. Chen, and N. Zhou, “A Novel PMU Fog based Early Anomaly Detection for an Ef?cient Wide Area PMU Network,” the 2nd IEEE International Conference on Fog and Edge Computing (ICFEC 2018), Washington DC, USA, May 1-4, 2018.
R. Xu, Y. Chen, E. Blasch, and G. Chen, “A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs),” the SPIE Defense & Commercial Sensing 2018 (DCS), Conference on Sensors and Systems for Space Applications, Orlando, FL, USA, April 15-19, 2018.
J. Lu, N. Chen, X. Xiang, D. Shen, G. Chen, E. Blasch, K. Pham, and Y. Chen, “Artificial Intelligence based Directional Mesh Network Design for Spectrum Efficiency,” the 39th IEEE Aerospace Conference, Big Sky, Montana, USA, March 3-10, 2018.
2017
Anh Quach, Matthew Cole and Aravind Prakash, Supplementing Modern Software Defenses with Stack-Pointer Sanity, Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC'17), Orlando, Florida, December 2017.
Guanhua Yan, Improving efficiency of link clustering on multi-core machines, Proceedings of the International Conference on Distributed Computing Systems (ICDCS'17), Atlanta, Georgia, USA, June 2017.
Anh Quach, Rukayat Erinfolami, David Demicco and Aravind Prakash, A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments, CCS workshop on Forming an Ecosystem Around Software Transformation, 2017 (FEAST'17), Dallas, Texas,
Guanhua Yan, Junchen Lu, Zhan Shu, and Yunus Kucuk. , ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability, Proceedings of The 1st IEEE Symposium on Privacy-Aware Computing (PAC'17), Washington DC, USA, August 2017.
Khaled Khasawneh, Nael Abu-Ghazaleh, Dmitry Ponomarev, Lei Yu, "RHMD: Evasion-Resilient Hardware Malware Detectors", 50th International Symposium on Microarchitecture (MICRO), Boston, MA, October 2017.
Jesse Elwell, Dmitry Evtyushkin, Nael Abu-Ghazaleh, Dmitry Ponomarev, Ryan Riley, "Hardening Extended Memory Access Control Schemes with Self-Verified Address Spaces", International Conference on Computer-Aided Design (ICCAD), Irvine, CA, November 2017.
Jiajun Xin, Ming Li, Linke Guo, and Pan Li, ``Practical Privacy-Preserving Spectrum Query Schemes for Database-Driven CRNs with Multiple Service Providers''. IEEE Conference on Communications and Network Security, Las Vegas, NV, Oct. 9-11, 2017.
Barry Williams, Dmitry Ponomarev, Nael Abu-Ghazaleh, Philip Wilsey, "Performance Characterization of Parallel Discrete Event Simulation on Knights Landing Processor", ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS), Singapore, May 2017.
Mehmet Kayaalp, Khaled Khasawneh, Hodjat Asghari-Esfeden, Jesse Elwell, Nael Abu-Ghazaleh, Dmitry Ponomarev, Aamer Jaleel, "RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks", 54th Design Automation Conference (DAC), Austin, Texas, June 2017.
Luyang Liu, Hongyu Li, Jian Liu, Cagdas Karatas, Yan Wang, Marco Gruteser, Yingying Chen, Richard Martin, "BigRoad: Scaling Massive Road Data Acquisition for Dependable Self-Driving," in Proceedings of the 15th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2017), Niagara Falls, NY, USA, June 2017.
Jian Liu, Yingying Chen, Marco Gruteser, Yan Wang, "VibSense: Sensing Touches on Ubiquitous Surfaces through Vibration,", in Proceedings of the 14th IEEE International Conference on Sensing, Communication and Networking (SECON 2017), San Diego, CA, USA, June 2017.
Mehdi Boroumand and Jessica Fridrich, “Nonlinear Feature Normalization in Steganalysis,” 5 th ACM Information Hiding and Multimedia Security, Philadelphia, PA, 2017.
Q. Dong, Z. Yang, Yu Chen, X. Li, and K. Zeng, “Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs,” EAI Endorsed Transactions on Security and Safety, Vol. 4, Issue 2, December 2017.
Mo Chen, V. Sedighi, M. Boroumand and J. Fridrich, “JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images,” 5th ACM IH&MMSec., Philadelphia, PA, 2017.
Tomas Denemark and J. Fridrich, “Steganography with Multiple JPEG Images of the Same Scene,” IEEE Transactions on Information Forensics and Security, 12(10), pp. 2308–2319, 2017.
Tianlin Li, Amish Mehta, Ping Yang, Security Analysis of Email Systems, 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017.
Remi Cogranne, Vahid Sedighi, and Jessica Fridrich, “Practical Strategies for Content-Adaptive Batch Steganography and Pooled Steganalysis,” IEEE ICASSP, New Orleans, 2017.
Tomas Denemark and Jessica Fridrich, “Steganography with Two JPEGs of the Same Scene”, IEEE ICASSP, New Orleans, 2017.
Vahid Sedighi and Jessica Fridrich, “Histogram Layer, Moving Convolutional Neural Networks Towards Feature Based Steganalysis,” Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2017, San Francisco, CA, 2017.
Tomas Denemark and Jessica Fridrich, “Model Based Side-Informed Steganography,” Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2017, San Francisco, CA, 2017.
Mehdi Boroumand and Jessica Fridrich, “Scalable Processing History Detector for JPEG Images,” Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2017, San Francisco, CA, January 29–February 2, 2017.
Z. Yang, M. Ghorbaniparvar, N. Zhou, and Yu Chen, “Enhancing Sustained Oscillation Detection by Data Pre-Processing Using SSA,” the 49th North American Power Symposium (NAPS 2017), Morgantown, WV, USA, Sept. 17-19, 2017.
Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng, “Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis,” the 7th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2017), Warsaw, Poland, August 28-30, 2017.
Tianchong Gao, Feng Li, Yu Chen, XuKai Zou, “Preserving Local Differential Privacy in Online Social Networks,” the 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2017), Guilin, China, June 19-21, 2017.
Ning Chen, Zekun Yang, Yu Chen, Aleksey Polunchenko, Online anomalous vehicle detection at the edge using multidimensional SSA, IEEE Conference on Computer Communications Workshops, 2017.
Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng, Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs., ICST Trans. Security Safety 4 (12), 2017.
2016
Dmitry Evtyushkin, Dmitry Ponomarev, "Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations", 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, October 2016.
Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh, "Jump over ASLR: Attacking Branch Predictors to Bypass ASLR", 49th International Symposium on Microarchitecture (MICRO), Taipei, October 2016.
Dmitry Evtyushkin, Jesse elwell, Meltem Ozsoy, Dmitry Ponomarev, Nael Abu-Ghazaleh and Ryan Riley, "Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications", IEEE Transactions on Dependable and Secure Computing (TDSC), 2016.
Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh, "Understanding and Mitigating Covert Channels through Branch Predictors", ACM Transactions on Architecture and Code Optimization (ACM TACO), 2016.
Mehmet Kayaalp, Nael Abu-Ghazaleh, Dmitry Ponomarev, Aamer Jaleel, "A High-Resolution Side-Channel Attack on Last Level Cache", 53rd Design Automation Conference (DAC), Austin, TX, June 2016.
Meltem Ozsoy, Khaled Khasawneh, Caleb Donovick, Iakov Gorelik, Nael Abu-Ghazaleh, Dmitry Ponomarev, "Hardware-based Malware Detection Using Low-Level Architectural Features", IEEE Transactions on Computers (TC), 2016.
Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, and Heng Yin, Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis, Proceedings of the 19th Symposium on Research in Attacks, Intrusions and Defenses (RAID'16), September 2016.
Qian Feng, Aravind Prakash, Minghua Wang, Curtis Carmony and Heng Yin, ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis, Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS'16), Xi'an, China, May 2016.
Guanhua Yan, Yunus Kucuk, Max Slocum, and David C. Last, A Bayesian cognitive approach to quantifying software exploitability based on reachability testing, Proceedings of the 19th Information Security Conference (ISC'16), Hawaii, USA, September 2016.
Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan, The Rise of Social Botnets: Attacks and Countermeasures, IEEE Transactions on Dependable and Secure Computing (TDSC'16), April 2016.
Tomas Denemark, Mehdi Boroumand, and Jessica Fridrich, “Steganalysis Features for Content-Adaptive JPEG Steganography,”IEEE Transactions on Information Forensics and Security, 11(8), pp. 1736–1746, 2016.
Qi Jia, Linke Guo, Zhanpeng Jin, and Yuguang Fang, `` Privacy-preserving Data Classification and Similarity Evaluation for Distributed Systems'', The 36th International Conference on Distributed Computing Systems (IEEE ICDCS'16), Nara, Japan, Jun. 27-Jun. 30, 2016.
Gaoqiang Zhuo, Qi Jia, Linke Guo, Ming Li, and Pan Li, ``Privacy-preserving Verifiable Data Aggregation and Analysis for Cloud-assisted Mobile Crowdsourcing'', The 35th IEEE International Conference on Computer Communication (IEEE INFOCOM' 16), San Francisco, California, April 10-15, 2016.
Yan Wang, Yingying Chen, Jie Yang, Luyang Liu, Marco Gruteser, Richard P. Martin, Hongbo Liu, "Determining Driver Phone Use by Exploiting Smartphone Integrated Sensors," IEEE Transactions on Mobile Computing (IEEE TMC), Volume 15, Issue 8, Pages 1965-1981, 2016.
Dinuni Fernando, Hardik Bagdi, Yaohui Hu, Ping Yang, Kartik Gopalan, Charles Kamhoua, and Kevin Kwiat, Quick Eviction of Virtual Machines Through Proactive Live Snapshots, 9th IEEE/ACM International Conference on Utility and Cloud Computing, 2016.
Alireza Farrokh Baroughi, Scott Craver, and Daniel Douglas, "Attacks on Speaker Identification Systems Constrained to Speech-to-Text Decoding", Media Watermarking, Security, and Forensics, 1-7, 2016.
Jun Yu, Enping Li, and Scott Craver, "Ambiguity Attack on the Integrity of a Genuine Picture by Producing Another Picture Immune to Generic Digital Forensic Test", Media Watermarking, Security, and Forensics, 1-3, 2016.
Mehdi Boroumand and Jessica Fridrich, “Boosting Steganalysis with Explicit Feature Maps,” 4th ACM Information Hiding and Multimedia Security, Vigo, Spain, 2016.
Vahdi Sedighi, Remi Cogranne, and J. Fridrich, “Content-Adaptive Steganography by Minimizing Statistical Detectability,” IEEE Transactions on Information Forensics and Security, 11(2), pp. 221–234, 2016.
Vahdi Sedighi and Jessica Fridrich, “Effect of Saturated Pixels on Security of Steganographic Schemes for Digital Images,” Proc. ICIP’ 16, Phoenix, Arizona, 2016.
Vahdi Sedighi, Jessica Fridrich, and Remi Cogranne, “Toss that BOSSbase, Alice!” Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2016, San Francisco, CA, 2016.
Chen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, Bo Liu, "Friend or Foe? Your Wearable Devices Reveal Your Personal PIN," in Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2016), Xi'an, China, May 2016.
Cagdas Karatas, Luyang Liu, Hongyu Li, Jian Liu, Yan Wang, Sheng Tan, Jie Yang, Yingying Chen, Marco Gruteser, Richard Martin, "Leveraging Wearables for Steering and Driver Tracking," in Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM 2016), San Francisco, USA, April 2016.
Kyle J. Temkin, Douglas H. Summerville, An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans, CISRC, 2016
Paul T. Watrobski, Douglas H. Summerville, De-encapsulation of network packets for network protocol reverse engineering, MILCOM, 557-562, 2016.
Tomas Denemark, Jessica Fridrich, and Pedro Comesana, “Improving Selection-Channel-Aware Steganalysis Features,” Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2016, San Francisco, CA, 2016.
Miroslav Goljan, Mo Chen, Pedro Comesaña, Jessica Fridrich, “Effect of Compression on Sensor-Fingerprint Based Camera Identification,” Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2016, San Francisco, CA, 2016.
Pei Huang, Borui Li, Linke Guo, Zhanpeng Jin, and Yu Chen, “A Robust and Reusable ECG-based Authentication and Data Encryption Scheme for eHealth System,” the IEEE GlobeCom, 2016.
Thomas Gaska, Yu Chen, and Douglas Summerville, “Leveraging Driverless Car Investment in Next Generation Avionics IMA,” the 35th IEEE Digital Avionics Systems Conference (DASC 2016), Sacramento, CA, USA, Sept. 25-29, 2016.
Ning Chen, Yu Chen, Yang You, HaibingLing, Pengpeng Liang, and Roger Zimmermann, "Dynamic Urban Surveillance Video Stream Processing using Fog Computing,” the 2nd IEEE International Conference on Multimedia Big Data (BigMM 2016), Taipei, Taiwan, April 20-22, 2016.
Yu Chen, Erik Blasch, Ning Chen, Anna Deng, Haibin Ling, and Genshe Chen, “Real-Time WAMI Streaming Target Tracking in Fog”, the 2016 SPIE Defense, Security, and Sensing (DSS), Baltimore, Maryland, USA, April 17 – 21, 2016.
Bingwei Liu, Yiran Lin, and Yu Chen, “A Quantitative Workload Analysis of Google Cluster Traces,” the 1st IEEE Workshop on Big Data Sciences, technologies, and Applications, in conjunction with IEEE INFOCOM, San Francisco, CA, USA, April 11, 2016.
2015
Remi Cogranne and J. Fridrich, “Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory,” IEEE Transactions on Information Forensics and Security, 10 (2), pp. 2627–2642, 2015.
Aravind Prakash and Heng Yin, Defeating ROP Through Denial of Stack Pivot, Proceedings of Annual Computer Security Applications Conference (ACSAC'15), Los Angeles, CA, December 2015.
Tianlin Li, Yaohui Hu, Ping Yang, and Kartik Gopalan, Privacy-preserving Virtual Machines, the 31th Annual Computer Security Applications Conference (ACSAC), 2015.
Guanhua Yan, Be sensitive to your errors: Chaining Neyman-Pearson criteria for automated malware classification, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS'15), Singapore, April 2015.
Jesse Elwell, Ryan Riley, Nael Abu-Ghazaleh, Dmitry Ponomarev, Iliano Cervesato, "Rethinking Memory Permissions for Protection Against Cross-Layer Attacks", ACM Transactions on Architecture and Code Optimization (ACM TACO), Volume 12, Issue 4, Article No.56, December 2015.
Khaled Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh and Dmitry Ponomarev, "Ensemble Learning for Low-level Hardware-Supported Malware Detection", 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, November 2015, pp.3-25.
Dmitry Evtyushkin, Dmitry Ponomarev and Nael Abu-Ghazaleh, "Covert Channels through Branch Predictors: A Feasibility Study", 4th Workshop on Hardware and Architecture Support for Security and Privary (HASP), held in conjunction with ISCA, Portland, OR, June 2015.
Jingjing Wang, Nael Abu-Ghazaleh and Dmitry Ponomarev, "Controlled Contention: Balancing Contention and Reservation in Multicore Application Scheduling", International Parallel and Distributed Processing Symposium (IPDPS), Hyderabad, India, May 2015, pp.946-955.
Meltem Ozsoy, Caleb Donovick, Iakov Gorelik, Nael Abu-Ghazaleh and Dmitry Ponomarev, "Malware-Aware Processors: A Framework for Efficient Online Malware Detection", 21st International Symposium on High-Performance Computer Architecture (HPCA), Bay Area, CA, February 2015, pp.651-661.
Mehmet Kayaalp, Timothy Schmitt, Junaid Nomani, Dmitry Ponomarev, Nael Abu-Ghazaleh , "Signature-Based Protection from Code Reuse Attacks", IEEE Transactions on Computers, Volume 64, Issue 2, pp.533-546, 2015.
Jingjing Wang, Nael Abu-Ghazaleh and Dmitry Ponomarev, "AIR: Application-level Interference Resilience for PDES on Multi-core Systems", ACM Transactions on Modeling and Computer Simulation (ACM TOMACS), Volume 25, Issue 3, May 2015.
Jian Liu, Yan Wang, Gorkem Kar, Yingying Chen, Jie Yang, Marco Gruteser, "Snooping Keystrokes with mm-level Audio Ranging on a Single Phone," in Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2015), Paris, France, September 2015.
Jian Liu, Yan Wang, Yingying Chen, Jie Yang, Xu Chen, Jerry Cheng, "Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi," in Proceedings of the 16th ACM Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2015), Hangzhou, China, June 2015.
Gaoqiang Zhuo, Qi Jia, Linke Guo, Ming Li, and Yuguang Fang, ''Privacy-preserving Verifiable Proximity Test for Location-based Services'', The IEEE Global Communications Conference, San Diego, California, December 6-10, 2015.
Kaihe Xu, Hao Yue, Linke Guo, Yuanxiong Guo, and Yuguang Fang, ''Privacy-preserving Machine Learning Algorithms for Big Data Systems'', The 35th International Conference on Distributed Computing Systems (ICDCS'15), Columbus, Ohio, Jun. 29-Jul. 2, 2015.
Linke Guo, Yuguang Fang, Ming Li, Pan Li, ''Verifiable Privacy-preserving Monitoring for Cloud-assisted mHealth Systems'', The 34th IEEE International Conference on Computer Communication (IEEE INFOCOM' 15), Hong Kong, China, Apr. 26-May. 1, 2015.
Ming Li, Pan Li, Linke Guo, Xiaoxia Huang, ''PPER: Privacy-Preserving Economic-Robust Spectrum Auction in Wireless Networks'', The 34th IEEE International Conference on Computer Communication (IEEE INFOCOM' 15), Hong Kong, China, Apr. 26-May. 1, 2015.
Jiawei Yuan, Shucheng Yu, Linke Guo, ''SEISA: Secure and Efficient Encrypted Image Search With Access Control", The 34th IEEE International Conference on Computer Communication (IEEE INFOCOM' 15), Hong Kong, China, Apr. 26-May. 1, 2015.
Ping Yang, Mikhail Gofman, Scott Stoller, and Zijiang Yang, Policy Analysis for Administrative Role Based Access Control without Separate Administration , Journal of Computer Security, 23(1), pages 1--29, 2015.
Enping Li, Scott Craver, Jun Yu, "Capacity Limits of Pseudorandom Channels in Deception Problems", IEEE Trans. Information Forensics and Security 10(9): 1824-1834, 2015.
Alireza Farrokh Baroughi, Scott Craver, and Mohammed Faizan Mohsin, "A Negative Number Vulnerability for Histogram-based Face Recognition Systems", ACM Information Hiding and Multimedia Security, 155-160, 2015.
Elan Ashendorf and Scott Craver, "Design of a steganographic virtual operating system", Media Watermarking, Security, and Forensics, 2015
Alireza Farrokh Baroughi and Scott Craver, "The non-trusty clown attack on model-based speaker recognition systems", Media Watermarking, Security, and Forensics, 2015.
Yaohui Hu, Sanket Panhale, Tianlin Li, Emine Ugur Kaynar, Danny Chan, Umesh Deshpande, Ping Yang, and Kartik Gopalan, Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines, the 8th IEEE International Conference on Cloud Computing, applications track, 2015
Vahid Sedighi and Jessica Fridrich, “Effect of Imprecise Knowledge of the Selection Channel on Steganalysis,” 3 rd ACM Information Hiding and Multimedia Security, Portland, Oregon, 2015.
Tomas Denemark and J. Fridrich, “Improving Steganographic Security by Synchronizing the Selection Channel,” 3rd ACM Information Hiding and Multimedia Security, Portland, Oregon, 2015.
Vojtech Holub and Jessica Fridrich, “Low Complexity Features for JPEG Steganalysis Using Undecimated DCT,” IEEE IEEE Transactions on Information Forensics and Security, 10(2), February 2015, pp. 219–228.
Tomas Denemark and Jessica Fridrich, “Side-Informed Steganography with Additive Distortion,” Proc. IEEE WIFS, Rome, Italy, 2015.
Remdi Cogranne, Vahid Sedighi, T. Pevný, and Jessica Fridrich, “Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces?” Proc. IEEE WIFS, Rome, Italy, 2015.
Vahid Sedighi, Remi Cogranne, and Jessica Fridrich, “Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol. 9409, San Francisco, CA, 2015.
Vojtech Holub and Jessica Fridrich, “Phase-Aware Projection Model for Steganalysis of JPEG Images,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol. 9409, San Francisco, CA, 2015.
Miroslav Goljan and Jessica Fridrich, “CFA-Aware Features for Steganalysis of Color Images,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol. 9409, San Francisco, CA, 2015.
Douglas H. Summerville, Kenneth M. Zach, and Yu Chen, “Ultra-Lightweight Deep Packet Anomaly Detection for Internet of Things Devices,” the 34th IEEE International Performance Computing and Communications Conference (IPCCC), Nanjing, China, Dec. 14-16, 2015.
Zekun Yang, Ning Zhou, Aleksey Polunchenko, and Y. Chen, “Quick Online Detection of Start Time of Disturbance in Power Grid,” the IEEE GlobeCom 2015 – Selected Areas in Communications Symposium: Smart Grid Communications Track, San Diego, CA, USA, 2015.
Brandon Poland, Yu Chen, Jack Powell, “Performance Comparison Experiment of Optimized TCP via Emulation and Live Flight on SUAS”, the 34th IEEE Military Communication Conference (Milcom 2015), Tampa, FL, USA, 2015.
Ryan Wu, Anna Deng, Yu Chen, Erik Blasch, and Bingwei Liu, "Cloud Technology Applications for Area Surveillances", the 2015 National Aerospace & Electronics Conference (NAECON’15), Dayton, OH., USA, 2015.
2014
Dmitry Evtyushkin, Jesse Elwell, Meltem Ozsoy, Dmitry Ponomarev, Nael Abu-Ghazaleh and Ryan Riley, "Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution", 47th International Symposium on Microarchitecture (MICRO-47), Cambridge, UK, December 2014.
Kartikeyan Dayalan, Meltem Ozsoy, Dmitry Ponomarev, "Dynamic Associative Caches: Reducing Dynamic Energy of First Level Caches", 32nd IEEE International Conference on Computer Design (ICCD), Seoul, Korea, October 2014.
Yi Zhang, Jingjing Wang, Dmitry Ponomarev, Nael Abu-Ghazaleh, "Exploring Many-Core Architecture Design Space for Parallel Discrete Event Simulation", ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS), Denver, Colorado, May 2014.
Jesse Elwell, Ryan Riley, Nael Abu-Ghazaleh, Dmitry Ponomarev, "A Non-Inclusive Memory Permissions Architecture for Protection Against Cross-Layer Attacks", 20th International Symposium on High Performance Computer Architecture (HPCA), Orlando, Florida, February 2014.
Meltem Ozsoy, Dmitry Ponomarev, Nael Abu-Ghazaleh, Tameesh Suri , "SIFT: Low-Complexity Energy-Efficient Information Flow Tracking on SMT Processors", IEEE Transactions on Computers, Volume 63, Issue 2, February 2014, pp.484-496
Mehmet Kayaalp, Meltem Ozsoy, Nael Abu-Ghazaleh, Dmitry Ponomarev , "Efficiently Securing Systems from Code Reuse Attacks", IEEE Transactions on Computers, Volume 63, Issue 5, May 2014, pp.1144-1156
Jingjing Wang, Deepak Jagtap, Nael Abu-Ghazaleh, Dmitry Ponomarev , "Parallel Discrete Event Simulation for Multi-core Systems: Analysis and Optimization", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 25, Issue 6, June 2014, pp. 1574-1584.
Mikhail Gofman, Ruiqi Luo, Chad Wyszynski, Yaohui Hu, Ping Yang, and Kartik Gopalan, Privacy-preserving Virtual Machine Checkpointing Mechanism, Special Issue on Information Assurance and System Security in Cloud Computing, Journal of Cloud Computing, 3(3), pages 245 -- 266, 2014.
Ping Yang, Xing Xie, Indrakshi Ray, and Shiyong Lu, Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints, IEEE Transactions on Services Computing, 7(2), pages 237-251, April-June 2014.
Mikhail Gofman and Ping Yang, Efficient Policy Analysis for Evolving Administrative Role Based Access Control, International Journal of Software and Informatics, 8(1), pages 95 -- 131, 2014. [pdf]
Vojtech Holub and J. Fridrich, “Universal Distortion Design for Steganography in an Arbitrary Domain,” EURASIP Journal on Information Security, 2014.
Alireza Farrokh Baroughi and Scott Craver, "Additive attacks on speaker recognition", Media Watermarking, Security, and Forensics, 2014.
Ali Alper Yayla and Q. Hu, The Effect of Board of Directors' IT awareness on CIO compensation and Firm Performance, Performance. Decision Sciences Journal, 45(3), 401-436.
Aaron Carpenter and Y. Chen, “Hardware Security in the Dark”, Special Issue on Information and System Security, International Journal of Software and Informatics (IJSI), Vol. 8, No. 2, 2014.
Andrey Dolgikh, Zachary Birnbaum, Bingwei Liu, Yu Chen, Victor Skormin, " Cloud Security Auditing based on Behavioral Modeling", International Journal of Business Process Integration and Management, Vol. 7, No. 2, 2014.
Bingwei Liu, Erik Blasch, Yu Chen, Alex Aved, Dan Shen, and Genshe Chen, "Information Fusion in Cloud Computing Era: A Systems-Level Perspective", IEEE Aerospace and Electronic Systems (AES) Magazine, Vol. 29, No. 10, pp.16-24, October 2014.
Xiaoliang Wang, Qiong Gui, Bingwei Liu, Zhanpeng Jin, Yu Chen, “Enabling Smart Personalized Healthcare: a Hybrid Mobile-Cloud Approach for ECG Telemonitoring”, IEEE Journal of Biomedical and Health Informatics (JBHI), Vol. 18, No. 3, May 2014
Ryan Wu, Yu Chen, Erik Blasch, Bingwei Liu, Genshe Chen, Dan Shen, "A Container-Based Elastic Information Fusion Cloud Architecture for Real-Time Full-Motion Video (FMV) Target Tracking", the 2014 IEEE Applied Imagery Pattern Recognition (AIPR) workshop, Washington DC, USA, October 14-16, 2014.
Brendon Poland, Yu Chen, Michael Muccio, Daniel Hague, "Context Aware TCP for Intelligence, Surveillance and Reconnaissance Mission on Autonomous Platforms", the Military Communications Conference (MILCOM), Baltimore, MD, USA, October 6-8, 2014.
Bingwei Liu,Yu Chen, Dan Shen, Genshe Chen, Khanh Pham, Erik Blasch, and Bruce Rubin, "An Adaptive Process based Cloud Infrastructure for Space Situational Awareness Applications", the 2014 SPIE Defense, Security, and Sensing (DSS), Baltimore, Maryland, USA, May 5 – May 9, 2014.
Ari Hadiks, Yu Chen, Feng Li, and Bingwei Liu, “A Study of Stealthy Denial-of-Service Attacks in Wi-Fi Direct Device-to-Device Networks”, the 11th Annual IEEE Consumer Communication & Networking Conference, Work-in-Progress (CCNC 2014, WiP), Las Vegas, NV, USA, Jan. 10 - 13, 2014.
John Hubbard, Ken Weimer, and Y. Chen, "A Study of SSL Proxy Attacks on Android and iOS Mobile Applications", the 11th Annual IEEE Consumer Communication & Networking Conference (CCNC 2014), Las Vegas, NV, USA, Jan. 10 - 13, 2014 .
Tomas Denemark, Vahid Sedighi, Vojtech Holub, Remi Cogranne, and Jessica Fridrich, “Selection-Channel-Aware Rich Model for Steganalysis of Digital Images,” Proc. IEEE WIFS, 2014.
Miroslav Goljan, Remi Cogranne, and Jessica Fridrich, “Rich Model for Steganalysis of Color Images,” Proc. IEEE WIFS, 2014.
Remi Cogranne, Tomas Denemark, and Jessica Fridrich, “Optimal Detection of Steganography Using a Statistical Model of FLD Ensemble Classifiers,” Proc. IEEE WIFS, 2014.
Tomas Denemark and Jessica Fridrich and Vojtech Holub, “Further Study on the Security of S-UNIWARD,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, vol. 9028, San Francisco, CA, pp. 05 1–13, 2014.
Jan Kodovský, V. Sedighianaraki, and Jessica Fridrich, “Study of Cover Source Mismatch in Steganalysis and Ways to Mitigate its Impact,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, vol. 9028, San Francisco, CA, pp. 0J 1–12, 2014.
Miroslav Goljan and Jessica Fridrich, “Estimation of Lens Distortion Correction from Single Images,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, vol. 9028, San Francisco, CA, pp. 1–13, 2014.
Vojtech Holub and Jessica Fridrich, “Challenging the Doctrines of JPEG Steganography,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, vol. 9028, San Francisco, CA, pp. 02 1–8, 2014.
Tomas Denemark and Jessica Fridrich, “Detection of Content-Adaptive LSB Matching (Game Theory Approach),” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, vol. 9028, San Francisco, CA, February 2–6, pp. 04 1–12, 2014.
2013
V. Holub and J. Fridrich, “Random Projections of Residuals for Digital Image Steganalysis,” IEEE IEEE Transactions on Information Forensics and Security, 8(12), 2013, pp. 1996–2006.
J. Kodovský and J. Fridrich, “Effect of Image Downsampling on Steganographic Security,” IEEE IEEE Transactions on Information Forensics and Security, 9(5), pp. 752–762, 2014
Ping Yang, Mikhail Gofman, and Zijiang Yang,, Policy Analysis for Administrative Role Based Access Control without Separate Administration, the 27th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC13), pages 49--64, 2013.
Zijiang Yang, Shiyong Lu, Ping Yang, and Andrey Kashlev, Trustworthy and Dynamic Mobile Task Scheduling in Data-Intensive Scientific Workflow Environments,International Journal of Computers and Their Applications, 20(2), pages 65--77, June 2013.
Yaohui Hu, Tianlin Li, Ping Yang, and Kartik Gopalan, An Application-Level Approach for Privacy-preserving Virtual Machine Checkpointing, the 6th IEEE International Conference on Cloud Computing, research track, pages 59--66, 2013
Jingjing Wang, Nael Abu-Ghazaleh, Dmitry Ponomarev , "Interference-Resilient PDES on Multicore Systems: Towards Proportional Slowdown", ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS), Montreal, Canada, May 2013.
Jingjing Wang, Ketan Bahulkar, Dmitry Ponomarev, Nael Abu-Ghazaleh , "Can PDES Scale in Environments with Heterogeneous Delays?", ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS), Montreal, Canada, May 2013.
Mehmet Kayaalp, Junaid Nomani, Timothy Schmitt, Dmitry Ponomarev, Nael Abu-Ghazaleh , "SCRAP: Architecture for Signature-Based Protection From Code Reuse Attacks", 19th International Symposium on High Performance Computer Architecture (HPCA), Shenzhen, China, February 2013.
Andrew D. Ker, Patrick Bas, Rainer Böhme, Remi Cogranne, Scott Craver, Tomas Filler, Jessica Fridrich, Tomas Pevný, Moving Steganography and Steganalysis from the Laboratory into the Real World, ACM Information Hiding and Multimedia Security, Montpellier, France, 2013.
Vojtech Holub and Jessica Fridrich, “Digital Image Steganography Using Universal Distortion”, ACM Information Hiding and Multimedia Security, Montpellier, France, 2013.
Jessica Fridrich, “Effect of Cover Quantization on Steganographic Fisher Information,” IEEE Trans. on Info. Forensics and Security 8(2), pp. 361–373, February 2013.
R. I. Ledesma Goyzueta and Y. Chen, "A Deterministic Loss Model based Analysis of CUBIC," the International Conference on Computing, Networking and Communications, Communication QoS and System Modeling Symposium (ICNC’13 - CQSM), San Diego, CA, USA, January 28 - 31, 2013.
Jessica Fridrich and Jen Kodovský, “Multivariate Gaussian Model for Designing Additive Distortion for Steganography,” IEEE ICASSP, Vancouver, 2013.
Jen Kodovský and Jessica Fridrich, “Steganalysis in Resized Images,” IEEE ICASSP, Vancouver, May 26–31, 2013. 102. J. Fridrich, “On the Role of Side-Information in Steganography in Empirical Covers,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2013, vol. 8665, San Francisco, CA, pp. 1–11, 2013.
Miroslav Goljan and J. Fridrich, “Sensor Fingerprint Digest for Fast Camera Identification from Geometrically Distorted Images,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2013, vol. 8665, San Francisco, CA, pp. 0B 1–10, 2013.
Jen Kodovský and Jessica Fridrich, “Quantitative Steganalysis Using Rich Models,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2013, vol. 8665, San Francisco, CA, pp. 0O 1–11, 2013.
Vojtech Holub, Jessica Fridrich, and Tomas Denemark, “Random Projections of Residuals as an Alternative to Co-occurrences in Steganalysis,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2013, vol. 8665, San Francisco, CA, pp. 0L 1–11, 2013.
Bingwei Liu, Erik Blasch, Yu Chen, Dan Shen, and Ganshe Chen, "Scalable Sentiment Classification for Big Data Analysis Using Naive Bayes Classifier", Workshop on Scalable Machine Learning: Theory and Applications, in conjunction with the 2013 IEEE International Conference on Big Data (IEEE Big Data 2013), Santa Clara, CA, USA, October 6-9, 2013.
Qiong Gui, Bingwei Liu, Xiaoliang Wang, Zhanpeng Jin, and Yu Chen, "Finding Needles in a Haystack: Reducing False Alarm Rate Using Telemedicine Mobile Cloud", the First Workshop on Mobile Cloud Computing in Healthcare (WMCCH), 2013.
B. Liu, Y. Chen, D. Shen, G. Chen, E. Blasch, and Khanh Pham, "A Holistic Cloud-Enabled Robotics System for Real-Time Video Tracking Application," the International Workshop on Cloud Enhanced Information Fusion (CloudFusion 2013), 2013.
Zachary Birnbaum, Bingwei Liu, Andrey Dolgikh, Yu Chen, and Victor Skormin, " Cloud Security Auditing based on Behavioral Modeling", the IEEE 2013 First International Workshop on Cloud Security Auditing (CSAW), 2013.
Andrey Dolgikh, Zachary Birnbaum, Yu Chen, and Victor Skormin, "Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments", the 2013 International Workshop on Mobile Cloud Computing: Data, Management & Security (mCloud), 2013.
Bingwei Liu, Yu Chen, Dan Shen, Ganshe Chen, Khanh Pham, and Erik Blasch, "A Cloud-based Space Situational Awareness: Initial Design and Evaluation", the 2013 SPIE Defense, Security, and Sensing (DSS), Baltimore, Maryland, USA, April 29 – May 3, 2013.
Hao Chen, Yu Chen, Douglas H. Summerville, and Zhou Su, "An Optimized Design of Reconfigurable PSD Accelerator for Online Shrew DDoS Attacks Detection", the 32nd IEEE International Conference on Computer Communications (INFOCOM’ 2013), Turin, Italy, April 14 - 19, 2013.
Xiaoliang Wang, Qiong Gui, Bingwei Liu, Yu Chen, and Zhanpeng Jin, "Leveraging Mobile Cloud for Telemedicine: A Performance Study in Medical Monitoring", the 39th Annual Northeast Bioengineering Conference, Syracuse, NY, April 5 - 7, 2013.
2012
Mehmet Kayaalp, Junaid Nomani, Timothy Schmitt, Dmitry Ponomarev, Nael Abu-Ghazaleh, "SCRAP: Architecture for Signature-Based Protection From Code Reuse Attacks" the 19th International Symposium on High Performance Computer Architecture (HPCA), February 2012.
Mehmet Kayaalp, Meltem Ozsoy, Nael Abu-Ghazaleh, Dmitry Ponomarev, "Branch Regulation: Low Overhead Protection From Code Reuse Attacks", 39th International Symposium on Computer Architecture (ISCA),Portland, OR, June 2012.
Ali Alper Yayla and Q. Hu,The Impact of IT-Business Strategic Alignment on Firm Performance in a Developing Country Setting: Exploring Moderating Roles of Environmental Uncertainty and Strategic Orientation. European Journal of Information Systems, 21(4), 373-387, 2012
V. K. Gupta, Alper Yayla, A. Sikdar, and M-S Cha, Institutional Environment for Entrepreneurship: Evidence from the Developmental States of South Korea and United Arab Emirates. Journal of Developmental Entrepreneurship, 17(3), 1-21, 2012
Deepak Jagtap, Ketan Bahulkar, Dmitry Ponomarev and Nael Abu-Ghazaleh, "Characterizing and Understanding PDES Behavior on Tilera Architecture", 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS),Zhangjiajie, China, July 2012.
Ruiqi Luo, Ping Yang, Shiyong Lu, and Mikhail I. Gofman, Analysis of Scientific Workflow Provenance Access Control Policies, The 9th IEEE International Conference on Services Computing (SCC), application and experience track, pages 266--273, 2012.
Ketan Bahulkar, Jingjing Wang, Nael Abu-Ghazaleh and Dmitry Ponomarev, "Partitioning on Dynamic Behavior for Parallel Discrete Event Simulation", 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS),Zhangjiajie, China, July 2012.
Jingjing Wang, Dmitry Ponomarev and Nael Abu-Ghazaleh "Performance Analysis of a Multithreaded PDES Simulator on Multicore Clusters", 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS),Zhangjiajie, China, July 2012 (short paper).
Deepak Jagtap, Nael Abu-Ghazaleh and Dmitry Ponomarev, "Optimization of Parallel Discrete Event Simulator for Multi-core Systems", 26th International Parallel and Distributed Processing Symposium (IPDPS), Shanghai, China, May 2012.
M. Goljan and Jessica Fridrich, “Sensor-Fingerprint Based Identification of Images Corrected For Lens Distortion,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 23–26, pp. 0H 1–13, 2012.
Jan Kodovský and Jessica Fridrich, “Steganalysis of JPEG Images Using Rich Models,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 23–26, pp. 0A 1–13, 2012.
Brendan Kerrigan and Y. Chen, “A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts,” the 6th International Conference on Mathematical Methods, Models, and Architecture for Computer Network Security (MMM-ACNS-2012), October 17-20, 2012, St. Petersburg, Russia.
Jun Feng, Yu Chen, Douglas Summerville, and Zhou Su, "An Extension of RDP Code with Parallel Decoding Procedure", the 9th IEEE Consumer Communications and Networking Conference (CCNC 2012), Las Vegas, NV, USA, Jan. 14 - 17, 2012.
Andrey Dolgikh, Tomas Nykodym, Victor Skormin, and Zachary Birnbaum, "Using Behavioral Modeling And Customized Normalcy Profiles As Protection Against Targeted Cyber-Attacks", Proceedings MMM-ACNS October 17, 2012, St. Petersburg, Russia.
Victor Skormin, Tomas Nykodym, Andrey Dolgikh, James Antonakos, "Customized Normalcy Profiles for the Detection of Targeted Attacks", EvoStar'12, Computational Intelligence for Risk Management, Security and Defense Applications, Malaga, Spain, April 2012
Jessica Fridrich, “Effect of Cover Quantization on Steganographic Fisher Information,” Proc. IEEE WIFS, Tenerife, Spain, 2012.
Vojtech Holub and Jessica Fridrich, “Designing Steganographic Distortion Using Directional Filters,” Proc. IEEE WIFS, Tenerife, Spain, 2012.
Vojtech Holub and Jessica Fridrich, “Optimizing Pixel Predictors for Steganalysis,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012, vol. 8303, San Francisco, CA, pp. 09 1–13, 2012.
Miroslav Goljan, Mo Chen, Pedro Comesaña, Jessica FridrichGoljan and Jessica Fridrich, “Identifying Images Corrected for Lens Distortion Using Sensor Fingerprints,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012, vol. 8303, San Francisco, CA, pp. 0H 1–13, 2012.
Jan Kodovský and Jessica Fridrich, “Steganalysis of JPEG Images Using Rich Models,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012, vol. 8303, San Francisco, CA, January 23–26, pp. 0A 1–13, 2012.
2011
Mikhail I. Gofman, Ruiqi Luo, Ping Yang and Kartik Gopalan, "SPARC: A Security and Privacy Aware Virtual Machine Checkpointing Mechanism, Proceedings of the 10th annual ACM Workshop on Privacy in the Electronic Society (WPES), in conjunction with the ACM Conference on Computer and Communications Security (CCS), full paper, 2011.
Dmitry Evtyushkin, Peter Panfilov, Dmitry Ponomarev, "CacheVisor: A Toolset for Visualizing Shared Caches in Multicore and Multithreaded Processors", 11th International Conference on Parallel Computing Technologies (PaCT), Kazan, Russia, September 2011.
Jared Schmitz, Jason Loew, Jesse Elwell, Dmitry Ponomarev, Nael Abu-Ghazaleh, "TPM-SIM: A Framework for Performance Evaluation of Trusted Platform Modules", 48th Design Automation Conference (DAC'11), San Diego, June 2011.
Meltem Ozsoy, Dmitry Ponomarev, Nael Abu-Ghazaleh, Tameesh Suri, "SIFT: A Low-Overhead Dynamic Information Flow Tracking Architecture for SMT Processors", 8th ACM International Conference on Computing Frontiers (CF'11), Ischia, Italy, May 2011.
.Jan Kodovský and Jessica Fridrich, “Steganalysis of JPEG Images Using Rich Models,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 23–26, pp. 0A 1–13, 2012.
Jan Kodovský, Jessica Fridrich, and Vojtech Holub, “On Dangers of Overtraining Steganography to an Incomplete Cover Model,” Proc. ACM Multimedia & Security Workshop, Niagara Falls, New York, September 29–30, pp. 69–76, 2011.
Tomas Filler and Jessica Fridrich, “Design of adaptive steganographic schemes for digital images,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, vol. 7880, San Francisco, CA, January 23–26, pp. OF 1–14, 2011.
Miroslav Goljan, Mo Chen, Pedro Comesaña, Jessica FridrichGoljan and J. Fridrich,“Determining approximate age of digital images using sensor defects,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, vol. 7880, San Francisco, CA, January 23–26, pp. 06 1–11, 2011.
Jan Kodovský and Jessica Fridrich, “Steganalysis in high dimensions: fusing classifiers built on random subspaces,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, vol. 7880, San Francisco, CA, January 23–26, pp. OL 1–13, 2011.
Ali Alper Yayla and Q. Hu (2011). The Impact of Information Security Events on the Stock Value of Firms: The Effect of Contingency Factors. Journal of Information Technology, 26(1), 60-77.
V.K. Gupta, R. Huang, and Ali Alper Yayla, Social Capital, Collective Transformational Leadership, and Performance: A Resource-based View of Self-managed Teams. Journal of Managerial Issues, 23(1), 31-45, 2011.
Andrey Dolgikh, Tomas Nykodym, Victor Skormin, James Antonakos, "Colored Petri Nets as the Enabling Technology in Intrusion Detection Systems,"Proceedings MILCOM'11, Baltimore MD, November 2011
Andrey Dolgikh, Tomas Nykodym, Victor Skormin, James Antonakos, "Computer Network Testbed at Binghamton University," Proceedings MILCOM'11, Baltimore MD, November 2011
Tomas Nykodym, Andrey Dolgikh, Victor Skormin, James Antonakos, "Automatic Functionality Detection in Behavior-Based IDS," Proceedings MILCOM'11, Baltimore MD, November 2011
Zhou Su, Pinyi Ren, and Y. Chen "Consistency Control to Manage Dynamic Contents over Vehicular Communication Networks", the IEEE GlobeCom 2011- Communications QoS. Reliability, and Modeling Symposium, Huston, Texas, USA, Dec. 5 - 9, 2011.
Mingda Xiang, Yu Chen, Wei-Shinn Ku, and hou. Su, "Mitigating DDoS Attacks using Protection Nodes in Mobile Ad hoc Networks", the IEEE GlobeCom 2011- Communication & System Security Symposium, Huston, Texas, USA, Dec. 5 - 9, 2011.
Steven Mazur, Erik Blasch, Yu Chen, and Victor Skormin, "Mitigating Cloud Computing Security using a Self-Monitoring Defense Scheme", the 2011 National Aerospace & Electronics Conference (NAECON’11), Dayton, OH., USA, July 20 - 22, 2011.
Jun Feng, Yu Chen, and Douglas Summerville, "A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds," the 2011 International Conference on Collaboration Technologies and Systems (CTS 2011), Philadelphia, PA., USA, May 23 - 27, 2011.
Yu Chen, Christopher M. Twigg, Omowunmi A. Sadik, and Shiqiong Tong, “A Self-Powered Adaptive Wireless Sensor Network for Wastewater Treatment Plants”, the 9th Annual IEEE Conference on Pervasive Computing and Communications (PerCom’2011), Seattle, USA, March 21 - 25, 2011.
Jun Feng, Yu Chen, Douglas Summerville, Wei-ShinnKu, and Zhou Su, “Enhancing Cloud Storage Security against Roll-back Attacks with a New Fair Multi-Party Non-Repudiation Protocol”, the 8th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’11), 2011.
Yu Chen, Chih-Jye Wang, Wei-Shinn Ku, and Zhou Su, “A Location Aware Virtual Infrastructure for VANETs”, the 8th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’11), Las Vegas, Nevada, USA, January 9 - 12, 2011.
Jen Kodovský, Jessica Fridrich, and Vojtech Holub, “On Dangers of Overtraining Steganography to an Incomplete Cover Model,” Proc. ACM Multimedia & Security Workshop, Niagara Falls, New York, September 29–30, pp. 69–76, 2011.
2010
Mikhail Gofman, Ruiqi Luo, and Ping Yang, "User-Role Reachability Analysis of Evolving Administrative Role Based Access Control", 15th European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science, 2010.
Jason Loew, Jesse Elwell, Dmitry Ponomarev, Patrick Madden, "A Co-Processor Approach for Accelerating Data-Structure Intensive Algorithms", IEEE International Conference on Computer Design (ICCD), Amsterdam, October 2010.
Ketan Bahulkar, Nicole Hofmann, Deepak Jagtap, Nael Abu-Ghazaleh, Dmitry Ponomarev, "Performance Evaluation of PDES on Multicore Clusters", 14th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications (DS-RT), Fairfax, VA, October 2010.
Leonid Domnitser, Nael Abu-Ghazaleh, Dmitry Ponomarev, "A Predictive Model For Cache-based Side Channels in Multicore and Multithreaded Microprocessors", Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Network Security", Saint-Petersburg, Russia, September 2010.
Jason Loew, Dmitry Ponomarev, Patrick Madden, "Customized Architectures for Faster Route Finding in GPS-Based Navigation Systems", IEEE Symposium on Application Specific Processors (SASP), June 2010.
Arnur Tokhtabayev, Victor Skormin and Andrey Dolgikh, “Dynamic, Resilient Detection of Complex Malicious Functionalities in the System Call Domain”, Proceedings MILCOM'10, October 2010, San Jose, CA.
Arnur Tokhtabayev, Victor Skormin and Andrey Dolgikh, “Expressive, Efficient and Obfuscation Resilient Behavior Based IDS," Proc. European Symposium on Research in Computer Security, ESORICS 2010, September 2010 Athens, Greece
Arnur Tokhtabayev, Victor Skormin, Andrey Dolgikh “Behavioral Obfuscation in Malware and its Mitigation via Signature Generalization”, Proceedings International Conference on Security and Management, SAM’10, Las Vegas, NV 2010
Tomas Filler and Jessica Fridrich, “Minimizing Additive Distortion Functions with Non-Binary Embedding Operation in Steganography,” Proc. IEEE WIFS’10, Seattle, WA, December 12–15, 2010.
Jan Kodovský and Jessica Fridrich, “Quantitative Steganalysis of LSB Embedding in JPEG Domain,” ACM Multimedia & Security Workshop, Rome, Italy, September 9–10, pp. 187–198, 2010.
Tomas Filler and Jessica Fridrich, “Steganography Using Gibbs Random Fields,” ACM Multimedia & Security Workshop, Rome, Italy, September 9–10, pp. 199–212, 2010.
Miroslav Goljan, J essicaFridrich, and Mo Chen,“Sensor Noise Camera Identification: Countering Counter-Forensics,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 0S 1–12, 2010.
Miroslav Goljan, Jessica Fridrich, and Tomas Filler, “Managing a Large Database of Camera Fingerprints,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 08 1–12, 2010.
Jan Kodovský, Tomas Pevný, and Jessica Fridrich, “Modern Steganalysis Can Detect YASS,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 02 1–11, 2010.
Tomas Filler, Jan Judas, and Jessica Fridrich, "Minimizing Embedding Impact in Steganography Using Trellis-Coded Quantization", Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 05 1–14, 2010.
Matthias Kirchner and Jessica Fridrich, “On Detection of Median Filtering in Images,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 10 1–12, 2010.
H. Chen and Yu Chen, “A Comparison Study of Collaborative Strategies for Distributed Defense against Internet Worms based on Small-World Modeling,” the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, Illinois, USA, Oct. 9 – 12, 2010.
Junfeng Feng, Yu Chen, Wei-Shinn Ku, and Pu Liu, "Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms", the 2nd International Workshop on Security in Cloud Computing (SCC 2010), San Diego, California, USA, Sept. 13, 2010.
Jun Feng, Yu Chen, Wei-Shinn Ku, and Zhou Su, “D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-of-order keystream Generation”, the 2010 IEEE International Conference on Communications - Communication and Information System Security Symposium (ICC'10 CISS), Cape Town, South Africa, May 23 - 27, 2010.
Jun Feng, Yu Chen, Douglas Summerville, "EEO: an Efficient MDS-like RAID-6 Code for Parallel Implementation", the 33rd IEEE Sarnoff Symposium, Princeton, NJ, USA, Apr. 12-14, 2010.
Paolo Gasti and Yu Chen, "Breaking and Fixing the Self-Encryption Scheme for Data Security in Mobile Devices", the 18th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2010), 2010.
Jun Feng, Yu Chen and Pu Liu, “Bridging the Missing Link of Cloud Data Storage Security in AWS”, the 7th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’10), Las Vegas, Nevada, USA, January 9 - 12, 2010.
Yu Chen Wei-Shinn Ku, Kazuya Sakai, and Christopher DeCruze, "A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages", the 7th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’10), Las Vegas, Nevada, USA, January 9 - 12, 2010.
2009
Mikhail Gofman, Ruiqi Luo, Ayla Solomon, Yingbin Zhang, Ping Yang and Scott D. Stoller, "RBAC-PAT: A Policy Analysis Tool for Role Based Access Control," 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Pages 46--49, Lecture Notes in Computer Science, © Springer-Verlag, 2009.
Mikhail Gofman, Ruiqi Luo, Jian He, Yingbin Zhang, and Ping Yang, "Incremental Information Flow Analysis of Role Based Access Control," International Conference on Security and Management, pages 397--403, CSREA press, 2009.
Tomas Filler and Jessica Fridrich, “Wet ZZW Construction,” Proc. IEEE WIFS’09, London, UK, December 6–9, 2009.
Jan Kodovský, and Jessica Fridrich, “Calibration Revisited,” Proc. ACM Multimedia and Security Workshop, Princeton, NJ, September 7–8, pp. 63–74, 2009.
Tomas Pevný, Patrick Bas, and Jessica Fridrich, “Steganalysis by Subtractive Pixel Adjacency Matrix,” Proc. ACM Multimedia and Security Workshop, Princeton, NJ, September 7–8, pp. 75–84, 2009.
Tomas Filler and Jessica Fridrich, “Complete Characterization of Perfectly Secure Stegosystems with Mutually Independent Embedding Operation,” Proc. IEEE ICASSP, April 19"24, 2009.
Miroslav Goljan, Tomas Filler, and Jessica Fridrich, “Camera Identification – Large Scale Test,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, vol. 7254, San Jose, CA, January 18–22, pp. 0I 1–12, 2009.
Tomas Pevný, Jessica Fridrich, and Andrew D. Ker, “From Blind to Quantitative Steganalysis,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, vol. 7254, San Jose, CA, January 18–22, pp. OC 1–14, 2009.
Tomas Filler, Jessica Fridrich, and Andrew D. Ker,“The Square Root Law of Steganographic Capacity for Markov Covers,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, vol. 7254, San Jose, CA, January 18–22, pp. 08 1–11, 2009.
H. Chen, D. Summerville, and Y. Chen, “Two-Stage Decomposition of SNORT Rules towards Efficient Hardware Implementation,” the 7th International Workshop on Design of Reliable Communication Networks (DRCN 2009), Washington, D.C., USA, October 25 – 28, 2009.
Z. Su, Z. Zhang, and Yu Chen, "Performance Evaluation of a Novel Caching Algorithm for Scalable Image Contents", the 2nd International Symposium on Intelligent Informatics (ISII 2009), Qinhuangdao, China, September 13 – 15, 2009.
I. M. Atakli, Y. Chen, Q. Wu, and S. Craver, “BLINK: Pixel-Domain Encryption for Secure Document Management”, the 11th ACM Workshop on Multimedia and Security (MMSEC 2009), Princeton, New Jersey, USA, September 7 - 8, 2009.
Yu Chen and Wei-Shinn Ku, “Self-Encryption Scheme for Data Security in Mobile Devices”, the 6th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’09), Las Vegas, Nevada, USA, January 10 - 13, 2009.
Scott Craver, Yu Chen, H. Chen, J. Yu, and I. M. Atakli, “BLINK: Securing Information to the Last Connection”, the 6th IEEE Consumer Communications and Networking Conference (CCNC’09), Las Vegas, Nevada, USA, January 10 - 13, 2009.
A. Tokhtabayev, V. Skormin, A. Dolgikh, “Detection of Specific Semantic Functionalities, Such as Self-Replication Mechanism, in Malware Using Colored Petri Nets” 2009 International Conference on Security and Management (SAM'09: July 13-16, USA)
Jason Loew and Dmitry Ponomarev, "A Two-tiered Modelling Framework for Undergraduate Computer Architecture Courses", Workshop on Computer Architecture Education, held in conjunction with MICRO-42.
Hui Zeng, Matt Yourst, Kanad Ghose and Dmitry Ponomarev, "MPTLsim: A Simulator for x86 Multicore Processors", 46th Design Automation Conference (DAC-2009), San Fransisco, July 2009.
Hui Zeng, Ju-Young Jung, Kanad Ghose and Dmitry Ponomarev, "Energy Efficient Renaming with Register Versioning", International Symposium on Low Power Electronics and Design (ISLPED-2009), San Fransisco, August 2009.
Hui Zeng, Kanad Ghose and Dmitry Ponomarev, "Register Versioning: A Low-Complexity Implementation of Register Renaming in Out-of-Order Microarchitectures", 38th International Conference on Parallel Processing (ICPP-2009), Vienna, September 2009.