Cyber-TA Project Web Site
   Cyber-TA 
  Web Portal
Software Releases
Private Project Page
Downloads
Publications
Links   
 
 




















































  Recent Publications Funded Under Cyber-TA
 
2008

  • [soon] Jian Zhang, Phillip Porras, and Johannes Ullrich, "Highly Predictive Blacklisting," in Proceedings of the USENIX Security Conferences, July 2008.
  • [soon] Chris Peikert and Brent Waters, "Lossy Trapdoor Functions and their Applications," in Proceedings of the 40th ACM Symposium on Theory of Computing (STOC 2008) May 2008.
  • [soon] Jian Zhang, Phillip Porras, and Johannes Ullrich, "Gaussian Process Learning for Cyber-Attack Early Warning," in Proceedings of the SIAM Conference on Data Mining, April 2008.
  • [soon] Jonathan Katz and Amit Sahai and Brent Waters, "Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products," in Proceedings of Eurocrypt, April 2008.
  • [soon] Juan Caballero and Theocharis Kampouris and Dawn Song and Jia Wang, "Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?," in Proceedings of the 15th Annual Network and Distributed System Security Symposium, February 2008.
  • [soon] Shobha Venkataraman, Avrim Blum and Dawn Song, "Limits of Learning-based Signature Generation with Adversaries," in 15th Annual Network and Distributed System Security Symposium, February 2008.
  • [soon] Guofei Gu, Junjie Zhang, and Wenke Lee, "BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic," in Proceedings of the 15th Annual Network and Distributed System Security Symposium, February 2008.
  • [soon] Heng Yin and Zhenkai Liang and Dawn Song, "HookFinder: Identifying and Understanding Malware Hooking Behaviors," in Proceedings of 15th Annual Network and Distributed System Security Symposium, February 2008.
  • [soon] Monirul Sharif, Andrea Lanzi, Jonathon Giffin, and Wenke Lee, "Impeding Malware Analysis using Conditional Code Obfuscation, in Proceedings of the 15th Annual Network and Distributed System Security Symposium, February 2008.
  • [soon] John Bethencourt, Dawn Song and Brent Waters, "Analysis-Resistant Malware, in Proceedings of the 15th Annual Network & Distributed System Security Conference, February 2008.
2007

  • [soon] Chongkyung Kil, Emre Can Sezer, Peng Ning, and Xiaolang Zhang, "Automated Security Debugging Using Program Structural Constraints," in Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC'07), December 2007.
  • [soon] Juan Caballero and Heng Yin and Zhenkai Liang and Dawn Song, "Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis," in Proceedings of the 14th ACM Conference on Computer and Communication Security, October 2007.
  • [soon] Heng Yin and Dawn Song and Manuel Egele and Christopher Kruegel and Engin Kirda, "Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis," in Proceedings of ACM Conference on Computer and Communication Security, October 2007.
  • [soon] Alex Halderman and Brent Waters, "Harvesting Verifiable Challenges from Oblivious Online Sources," in Proceedings of 14th ACM Conference on Computer and Communications Security, October 2007.
  • [soon] Rafail Ostrovsky, Amit Sahai, and Brent Waters, "Attribute-Based Encryption with Non-Monotonic Access Structures," in the Proceedings of 14th ACM Conference on Computer and Communications Security, October 2007.
  • [PDF] J. Feigenbaum, A. Johnson, and P. Syverson, "A Probabilistic Analysis of Onion Routing in a Black-box Model," in Proceedings of the 6th ACM Workshop on Privacy in the Electronic Society, Alexandria VA, October, 2007.
  • [soon] E.C. Sezer, P. Ning, C. Kil and J. Xu, "MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities," to appear in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), Boston, October/November, 2007.
  • [PDF] J. Brickell, D. Porter, V. Shmatikov, E. Witchel. "Privacy-preserving remote diagnostics", to appear in Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, VA, October 2007.
  • [PDF] F. Saint-Jean, A. Johnson, D. Boneh, and J. Feigenbaum, "Private Web Search," to appear in Proceedings of the 6th ACM Workshop on Privacy in the Electronic Society, Alexandria VA, October, 2007.
  • [PDF] G. Gu, Z. Chen, P. Porras, W. Lee, "Misleading and Defeating Importance-Scanning Malware Propagation," in Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks (SecureComm 2007), Mice, France, September 2007.
  • [PDF] D. Brumley, J. Caballero, Z. Liang, J. Newsome, D. Song, "Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation," in Proceedings of the 16th USENIX Security Symposium (Security'07), Boston, MA, August 2007.
  • [PDF] G. Gu, P. Porras, V. Yegneswaran, M. Fong, W. Lee., "BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation," in Proceedings of the 16th USENIX Security Symposium (Security'07), Boston, MA, August 2007.
  • [PDF] V. Shmatikov, M-H. Wang. "Security Against Probe-Response Attacks in Collaborative Intrusion Detection," to appear in Proceedings of ACM SIGCOMM 2007 Workshop on Large-Scale Attack Defense (LSAD), Kyoto, Japan, August 2007.
  • [PDF] E. Wong, P. Balasubramanian, L. Alvisi, M. Gouda, V. Shmatikov. "Truth in Advertising: Lightweight Verification of Route Integrity," in Proceedings of 26th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), Portland, OR, August 2007.
  • [PDF] P. Gupta, V. Shmatikov. "Security Analysis of Voice-over-IP Protocols," in Proceedings of 20th IEEE Computer Security Foundations Symposium (CSF), Venice, Italy, July 2007.
  • [PDF] J. Jian, P. Porras, J. Ullrich, "A New Service for Increasing the Effectiveness of Network Address Blacklists," in Proceedings of the USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'07), San Jose, CA, June 2007.
  • [PDF] V. Yegneswaran, C. Alfed, P. Barford, and J.Y. Cai, "Camouflaging Honeynets," in Proceedings of the 2007 IEEE Global Internet Symposium, Anchorage, AK, May 2007.
  • [PDF] J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," in Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, CA, May 2007.
  • [PDF] E. Shi, J. Bethencourt, H. Chan, D. Song, and Adrian Perrig, "Multi-Dimensional Range Query Over Encrypted Data," in Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, CA, May 2007.
  • [PDF] S. Jarecki and V. Shmatikov, "Efficient two-party secure computation on committed inputs," in Proceedings of Advances in Cryptology - EUROCRYPT 2007, Barcelona, Spain, May 2007.
  • [PDF] X. Boyen and B. Waters, "Full-Domain Subgroup Hiding and Constant-Size Group Signatures," in Proceedings of 10th Workshop in Practice and Theory of Public Key Cryptography (PKC 2007), Beijing, China, April 2007.
  • [PDF] A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, and Y. Zhang, "dFence: Transparent network-based denial of service mitigation" in Proceedings of 4th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, MA, April 2007.
  • [PDF] H. Shacham and B. Waters, " Efficient Ring Signatures without Random Oracles," in Proceedings of 10th Workshop in Practice and Theory of Public Key Cryptography (PKC 2007), Beijing, China, April 2007.
  • [PDF] P. Wang, P. Ning, D.S. Reeves, "A K-anonymous Communication Protocol for Overlay Networks," in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (AsiaCCS'07), Singapore, March 2007.
  • [PDF] Q. Zhang, D.S. Reeves, P. Ning, and S.P. Iyer, "Analyzing Network Traffic to Detect Self-Decrypting Exploit Code," in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (AsiaCCS'07), Singapore, March 2007.
  • [PDF] R. Sharykin and P. Porras, "Applying formal evaluation to worm defense design," in Proceedings of the 26th International Performance Computing and Communications Conference (Workshop on Malware), New Orleans, LA, March 2007.
  • [PDF] J. Feigenbaum, A. Johnson, and P. Syverson, "A Model of Onion Routing with Provable Anonymity," in Proceedings of the 11th International Conference on Financial Cryptography and Data Security, Tabago,February 2007.
  • [PDF] D. Boneh and B. Waters, "Conjunctive, Subset, and Range Queries on Encrypted Data," in Proceedings of the Fourth Theory of Cryptography Conference (TCC 2007), Amsterdam, The Netherlands, February 2007.
2006
  • [PDF] P. Porras, "Privacy-enabled global threat monitoring," IEEE Security and Privacy Magazine, Vol. 4, Issue 6, IEEE Press, November 2006.