Cybaware

A Cyber Awareness Framework for Attack Analysis, Prediction, and Visualization

Description

This research is to develop novel situation awareness theories and techniques to obtain an accurate view of the available cyber-assets and to automatically determine the assets required to carry out each mission task. Based on this information, we will automatically assess the damage of attacks, possible next moves, and the impact on the missions. We will also model the behavior of adversaries to predict the threat of future attacks to the success of a mission. Finally, we will present the status of the current missions and the impact of possible countermeasures to a security officer, using a semantically rich environment. Each of these technologies will be integrated into a coherent cyber-situation awareness framework.

Our technical approach is based on five main thrusts:

  1. Theoretically sound yet practical techniques to automatically analyze network event data will be used to get an up-to-date view of the available cyber-assets.
  2. Comprehensive analysis techniques will be developed to automatically extract dependency relationships (either manifest or hidden) between cyber-missions and cyber-assets.
  3. A cyber-situation awareness framework, which builds on previous alert correlation work, will associate ongoing attacks with the affected cyber-assets that are needed to successfully complete a mission and to get an accurate understanding of the impact of cyber-attacks.
  4. Models of adversary behavior will be developed to help predict the effects of future attacks that can be launched to prevent a cyber-mission from completing successfully.
  5. Novel cognitive science techniques will be leveraged to produce a semantically-rich, easy-to-grasp view of the cyber-mission status and to improve large-scale attack comprehension and response under duress.

In the News

Review and Site Visit Agendas

Publications

2015 (1 publication)

Meerkat: Detecting Website Defacements through Image-based Object Recognition K. Borgolte, C. Kruegel, G. Vigna Proceedings of the USENIX Security Symposium (USENIX Security 2015) BibTeX PDF (2.1 MB)

2014 (22 publications)

Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared? M. B. Line, A. Zand, G. Stringhini, R. Kemmerer Proceedings of the Smart Energy Grid Security Workshop (SEGS 2014) BibTeX PDF (207.7 KB)

The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements A. Zarras, A. Kapravelos, G. Stringhini, T. Holz, C. Kruegel, G. Vigna Proceedings of the ACM Internet Measurement Conference (ICM 2014) BibTeX PDF (353.8 KB)

Eyes of a Human, Eyes of a Program: Leveraging different views of the web for analysis and detection J. Corbetta, L. Invernizzi, C. Kruegel, G. Vigna Proceedings of the Research in Attacks, Intrusions and Defenses Symposium (RAID Symposium 2014) BibTeX PDF (334.2 KB)

Protecting Web Single Sign-on against Relying Party Impersonation Attacks through a Bi-directional Secure Channel with Authentication Y. Cao, Y. Shoshitaishvili, K. Borgolte, C. Kruegel, G. Vigna, Y. Chen Proceedings of the Research in Attacks, Intrusions and Defenses Symposium (RAID Symposium 2014) BibTeX PDF (264.8 KB)

BareCloud: Bare-metal Analysis-based Evasive Malware Detection D. Kirat, G. Vigna, C. Kruegel Proceedings of the USENIX Security Symposium (USENIX Security 2014) BibTeX PDF (387.5 KB)

Ten Years of iCTF: The Good, The Bad, and The Ugly G. Vigna, K. Borgolte, J. Corbetta, A. Doupé, Y. Fratantonio, L. Invernizzi, D. Kirat, Y. Shoshitaishvili Proceedings of the USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 2014) BibTeX PDF (148.0 KB)

Hulk: Eliciting Malicious Behavior in Browser Extensions A. Kapravelos, C. Grier, N. Chachra, C. Kruegel, G. Vigna, V. Paxson Proceedings of the USENIX Security Symposium (USENIX Security 2014) PDF (174.3 KB)

PExy: The other side of Exploit Kits G. De Maio, A. Kapravelos, Y. Shoshitaishvili, C. Kruegel, G. Vigna Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2014) BibTeX PDF (453.9 KB)

The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape G. Stringhini, O. Hohlfeld, C. Kruegel, G. Vigna Proceedings of the ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2014) BibTeX PDF (2.8 MB)

Real-time Pricing Leading to Optimal Operation under Distributed Decision Makings PDF (310.7 KB)

Finite-time Average Consensus in a Byzantine Environment Using Set-Valued Observers. D. Silvestri, P. A. Rosa, J. Hespanha Proceedings of the American Control Conference (ACC 2014) PDF (198.5 KB)

Online Optimal Switching of Single Phase DC/AC Inverters using Partial Information K. G. Vamvoudakis, J. Hespanha Proceedings of the American Control Conference (ACC 2014) PDF (426.9 KB)

Trust and Consequences: A Visual Perspective J. O'Donovan, L. R. Marusich, J. Schaffer, C. Gonzalez, T. Hollerer Proceedings of the HCI International (HCI Internationa 2014) PDF (3.5 MB)

The Tricks of the Trade: What Makes Spam Campaigns Successful? J. Iedemska, G. Stringhini, R. Kemmerer, C. Kruegel, G. Vigna Proceedings of the International Workshop on Cyber Crime (IWCC 2014) BibTeX PDF (265.9 KB)

Rippler: Delay Injection for Service Dependency Detection A. Zand, G. Vigna, R. Kemmerer, C. Kruegel Proceedings of the International Conference on Computer Communications (INFOCOM 2014) BibTeX PDF (449.0 KB)

Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services N. Nikiforakis, F. Maggi, G. Stringhini, W. Joosen , C. Kruegel, F. Piessens, G. Vigna, S. Zanero Proceedings of the International World Wide Web Conference (WWW 2014) BibTeX PDF (406.6 KB)

Relevant Change Detection: A Framework for the Precise Extraction of Modified and Novel Web-based Content as a Filtering Technique for Analysis Engines K. Borgolte, C. Kruegel, G. Vigna Proceedings of the International World Wide Web Conference Developer's Track (WWWdev 2014) BibTeX PDF (200.5 KB)

Do You Feel Lucky? A Large-Scale Analysis of Risk-Rewards Trade-Offs in Cyber Security Y. Shoshitaishvili, L. Invernizzi, A. Doupé, G. Vigna Proceedings of the ACM Symposium on Applied Computing (SAC 2014) BibTeX PDF (593.4 KB)

Extracting Probable Command and Control Signatures for Detecting Botnets A. Zand, G. Vigna, X. Yan, C. Kruegel Proceedings of the ACM Symposium on Applied Computing (SAC 2014) BibTeX PDF (154.6 KB)

Decision-making in Abstract Trust Games: A User Interface Perspective J. Schaffer, J. O'Donovan, C. Gonzalez, T. Hollerer Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2014) PDF (589.1 KB)

Nazca: Detecting Malware Distribution in Large-Scale Networks L. Invernizzi, S. Miskovic, R. Torres, S. Saha, S. Lee, M. Mellia, C. Kruegel, G. Vigna Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS 2014) BibTeX PDF (5.1 MB)

Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications S. Poeplau, Y. Fratantonio, A. Bianchi, C. Kruegel, G. Vigna Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS 2014) BibTeX PDF (478.5 KB)

2013 (23 publications)

Message In A Bottle: Sailing Past Censorship L. Invernizzi, C. Kruegel, G. Vigna Proceedings of the Annual Computer Security Applications Conference (ACSAC 2013) BibTeX PDF (2.1 MB)

SigMal: A Static Signal Processing Based Malware Triage D. Kirat, L. Nataraj, G. Vigna, B. Manjunath Proceedings of the Annual Computer Security Applications Conference (ACSAC 2013) BibTeX PDF (1.5 MB)

Gossip Average Consensus in a Byzantine Environment Using Stochastic Set-Valued Observers D. Silvestri, P. A. Rosa, R. Cunha, J. Hespanha Proceedings of the IEEE Conference on Decision and Control (ICDC 2013) PDF (218.0 KB)

Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages G. Stringhini, C. Kruegel, G. Vigna Proceedings of the ACM Conference on Computer and Communications Security (CCS 2013) BibTeX PDF (325.3 KB)

deDacota: Toward Preventing Server-Side XSS via Automatic Code and Data Separation A. Doupé, W. Cui, M. H. Jakubowski, M. Peinado, C. Kruegel, G. Vigna Proceedings of the ACM Conference on Computer and Communications Security (CCS 2013) BibTeX PDF (266.6 KB)

Detecting Stealthy, Distributed SSH Brute-Forcing M. Javed, V. Paxson Proceedings of the ACM Conference on Computer and Communications Security (CCS 2013) PDF (3.3 MB)

Delta: Automatic Identification of Unknown Web-based Infection Campaigns K. Borgolte, C. Kruegel, G. Vigna Proceedings of the ACM Conference on Computer and Communications Security (CCS 2013) BibTeX PDF (584.5 KB)

Follow the Green: Growth and Dynamics in Twitter Follower Markets G. Stringhini, G. Wang, M. Egele, C. Kruegel, G. Vigna, H. Zheng, B. Y. Zhao Proceedings of the ACM Internet Measurement Conference (ICM 2013) BibTeX PDF (1.0 MB)

Practical Attacks Against The I2P Network C. Egger, J. Schlumberger, C. Kruegel, G. Vigna Proceedings of the Research in Attacks, Intrusions and Defenses Symposium (RAID Symposium 2013) PDF (215.7 KB)

TweetProbe: A Real-Time Microblog Stream Visualization Framework B. Kang, G. Legrady, T. Hollerer Proceedings of the IEEE VisWeek (IEEE VisWeek 2013) PDF (3.6 MB)

No Attack Necessary: The Surprising Dynamics of SSL Trust Relationships B. Amann, R. Sommer, M. Valentin, S. Hall Proceedings of the Annual Computer Security Applications Conference (ACSAC 2013) PDF (679.4 KB)

Practical Comprehensive Bounds on Surreptitious Communication Over DNS V. Paxson, M. Christoderescu, M. Javed, N. Weaver Proceedings of the USENIX Security Symposium (USENIX Security 2013) PDF (1.1 MB)

A Model-based Evaluation of Trust and Situation Awareness in the Diner’s Dilemma Game J. O'Donovan, R. E. Jones, L. R. Marusich, Y. Teng, C. Gonzalez, T. Hollerer Proceedings of the Behavior Representation in Modeling & Simulation Conference (BRIMS 2013) PDF (889.9 KB)

Here’s My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web D. Ahkawe, B. Amann, M. Valentin, R. Sommer Proceedings of the International World Wide Web Conference (WWW 2013) PDF (461.9 KB)

Randomized Sampling for Large Zero-SumGames S. D. Bopardikar, A. Borri, J. Hespanha, M. Prandini, M. D. DiBenedetto Automatica, 2013 PDF (276.8 KB)

Learning Consensus in Adversarial Environments K. G. Vamvoudakis, L. R. Garcia Carrillo, J. Hespanha Proceedings of the SPIE Unmanned Systems Technology XV Conference (SPIE USTXV 2013) PDF (349.7 KB)

Interactive Interfaces for Complex Network Analysis: An Information Credibility Perspective J. Schaffer, B. Kang, T. Hollerer, H. Liu, C. Pan, S. Giyu, J. O'Donovan Proceedings of the International Workshop on Information Quality and Quality of Service for Pervasive Computing (IQ2S 2013) PDF (494.4 KB)

Formulating Cyber-Security as Convex Optimization Problems (Book Chapter) K. G. Vamvoudakis, J. Hespanha, R. Kemmerer, G. Vigna PDF (281.5 KB)

LinkedVis: Exploring Social and Semantic Career Recommendations S. Bostandjiev, J. O'Donovan, T. Hollerer Proceedings of the ACM International Conference on Intelligent User Interfaces (IUI 2013) PDF (3.4 MB)

Formulating Cyber-Security as Convex Optimization Problems K. G. Vamvoudakis, J. Hespanha, R. Kemmerer, G. Vigna Proceedings of the Workshop on Control of Cyber-Physical Systems (WCCPS 2013) PDF (281.5 KB)

COMPA: Detecting Compromised Accounts on Social Networks M. Egele, G. Stringhini, C. Kruegel, G. Vigna Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS 2013) BibTeX PDF (272.9 KB)

Trust and Situation Awareness in a 3-Player Diner's Dilemma Game Y. Teng, R. E. Jones, L. R. Marusich, J. O'Donovan, C. Gonzalez, T. Hollerer Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2013) PDF (1.2 MB)

Cyber-attack Forecast Modeling and Complexity Reduction Using a Game-theoretic Framework PDF (363.3 KB)

2012 (22 publications)

Adversarial Detection as a Zero-Sum Game K. G. Vamvoudakis, J. Hespanha, B. Sinopoli, Y. Mo Proceedings of the IEEE Conference on Decision and Control (ICDC 2012) PDF (209.1 KB)

Policy Improvement for Repeated Zero-Sum Games with Asymmetric Information M. Jones, J. S. Shamma Proceedings of the IEEE Conference on Decision and Control (ICDC 2012) PDF (97.7 KB)

DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, C. Kruegel Proceedings of the Annual Computer Security Applications Conference (ACSAC 2012) PDF (678.1 KB)

BotFinder: Finding Bots in Network Traffic Without Deep Packet Inspection F. Tegeler, X. Fu, G. Vigna, C. Kruegel Proceedings of the ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT 2012) PDF (328.7 KB)

You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. Van Acker, W. Joosen , C. Kruegel, F. Piessens, G. Vigna Proceedings of the ACM Conference on Computer and Communications Security (CCS 2012) BibTeX PDF (737.7 KB)

A Fundamental Limitation to the Reduction of Markov Chains via Aggregation G. Kotsalis, J. S. Shamma Proceedings of the Allerton Conference on Communication, Control, and Computing (Allerton 2012) PDF (251.2 KB)

PeerPress: Utilizing Enemies’ P2P Strength against Them Z. Xu, L. Chen, G. Gu, C. Kruegel Proceedings of the ACM Conference on Computer and Communications Security (CCS 2012) PDF (517.4 KB)

A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence B. Amann, R. Sommer, A. Sharma, S. Hall Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2012) PDF (937.0 KB)

TasteWeights: A Visual Interactive Hybrid Recommender System S. Bostandjiev, J. O'Donovan, T. Hollerer Proceedings of the ACM International Conference on Recommender Systems (RecSys 2012) PDF (2.9 MB)

TopicLens: An Interactive Recommender System Based on Topical and Social Connections L. Devendorf, J. O'Donovan, T. Hollerer Proceedings of the ACM International Conference on Recommender Systems (RecSys 2012) PDF (6.9 MB)

Credibility in Context: An Analysis of Feature Distributions in Twitter J. O'Donovan, B. Kang, G. Myer, T. Hollerer Proceedings of the IEEE International Conference on Social Computing (SocialCom 2012) PDF (1.4 MB)

Poultry Markets: On the Underground Economy of Twitter Followers G. Stringhini, M. Egele, C. Kruegel, G. Vigna Proceedings of the Workshop on Online Social Networks (WOSN 2012) BibTeX PDF (767.5 KB)

B@BEL: Leveraging Email Delivery for Spam Mitigation G. Stringhini, M. Egele, A. Zarras, T. Holz, C. Kruegel, G. Vigna Proceedings of the USENIX Security Symposium (USENIX Security 2012) BibTeX PDF (983.3 KB)

Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner A. Doupé, L. Cavedon, C. Kruegel, G. Vigna Proceedings of the USENIX Security Symposium (USENIX Security 2012) BibTeX PDF (230.8 KB)

A Mission-Centric Visualization Tool for Cybersecurity Situation Awareness (2012-07) N. Stockman, K. G. Vamvoudakis, L. Devendorf, T. Hollerer, R. Kemmerer, J. Hespanha PDF (761.1 KB)

Where are Malicious Networks Located? PDF (127.9 KB)

A Mission-Centric Visualization Tool for Cybersecurity Situation Awareness PDF (1.1 MB)

Robust Detection in the Presence of Integrity Attacks Y. Mo, J. Hespanha, B. Sinopoli Proceedings of the American Control Conference (ACC 2012) PDF (155.4 KB)

Augmented Textual Data Viewing in 3D Visualizations Using Tablets C. Roberts, B. Alper, J. Kuchera-Morin, T. Hollerer Proceedings of the IEEE Symposium on 3D User Interfaces (3DUI 2012) PDF (148.8 KB)

Interaction Methods for Large Scale Graph Visualization Systems -- Using Manipulation to Aid Discovery PDF (14.1 MB)

Modeling Topic Specific Credibility on Twitter B. Kang, J. O'Donovan, T. Hollerer Proceedings of the ACM International Conference on Intelligent User Interfaces (IUI 2012) PDF (1.7 MB)

TopicNets: Visual Analysis of Large Text Corpora with Topic Modeling B. Gretarsson, J. O'Donovan, S. Bostandjiev, T. Hollerer, A. Asuncion, D. Newman, P. Smyth ACM Transactions on Intelligent Systems and Technology, 2012 PDF (1.7 MB)

2011 (22 publications)

A Counterexample to Aggregation Based Model Reduction of Hidden Markov Models G. Kotsalis, J. S. Shamma Proceedings of the IEEE Conference on Decision and Control (ICDC 2011) PDF (109.2 KB)

Stereoscopic Highlighting: 2D Graph Visualization on Stereo Displays B. Alper, T. Hollerer, J. Kuchera-Morin, A. G. Forbes IEEE Transactions on Visualization and Computer Graphics, 2011 PDF (2.2 MB)

Nexat: A History-Based Approach to Predict Attacker Actions C. Cipriano, A. Zand, A. Houmansadr, C. Kruegel, G. Vigna Proceedings of the Annual Computer Security Applications Conference (ACSAC 2011) BibTeX PDF (225.5 KB)

Hit 'em Where it Hurts: A Live Security Exercise on Cyber Situational Awareness A. Doupé, M. Egele, B. Caillat, G. Stringhini, G. Yakin, A. Zand, L. Cavedon, G. Vigna Proceedings of the Annual Computer Security Applications Conference (ACSAC 2011) BibTeX PDF (1.9 MB)

Defending Against Malicious Software PDF (991.5 KB)

Understanding Fraudulent Activities in Online Ad Exchanges B. Stone-Gross, R. Stevens, A. Zarras, R. Kemmerer, C. Kruegel Proceedings of the Internet Measurement Conference (IMC 2011) BibTeX PDF (781.4 KB)

Dymo: Tracking Dynamic Code Identity B. Gilbert, R. Kemmerer, C. Kruegel, G. Vigna Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2011) BibTeX PDF (209.2 KB)

WiGipedia: A Tool for Improving Structured Data in Wikipedia S. Bostandjiev, J. O'Donovan, C. Hall, B. Gretarsson, T. Hollerer Proceedings of the International Conference on Semantic Computing (ICSC 2011) PDF (2.3 MB)

BotMagnifier: Locating Spambots on the Internet G. Stringhini, T. Holz, B. Stone-Gross, C. Kruegel, G. Vigna Proceedings of the USENIX Security Symposium (USENIX Security 2011) BibTeX PDF (286.6 KB)

Hide-and-Seek with Directional Sensing A. Borri, S. D. Bopardikar, J. Hespanha, M. D. DiBenedetto Proceedings of the World Congress of the International Federation of Automatic Control (IFAC 2011) PDF (168.5 KB)

Jackstraws: Picking Command and Control Connections from Bot Traffic G. Jacob, R. Hund, C. Kruegel, T. Holz Proceedings of the USENIX Security Symposium (USENIX Security 2011) PDF (313.7 KB)

Escape from Monkey Island: Evading High-Interaction Honeyclients A. Kapravelos, M. Cova, C. Kruegel, G. Vigna Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011) BibTeX PDF (224.9 KB)

MISHIMA: Multilateration of Internet hosts hidden using malicious fast-flux agents G. Banks, A. Fattori, R. Kemmerer, C. Kruegel, G. Vigna Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011) BibTeX PDF (124.1 KB)

An Assessment of Overt Malicious Activity Manifest in Residential Networks G. Maier, A. Feldmann, V. Paxson, R. Sommer, M. Valentin Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011) PDF (739.2 KB)

The Underground Economy of Fake Antivirus Software B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, G. Vigna Proceedings of the Workshop on Economics of Information Security (WEIS 2011) BibTeX PDF (799.3 KB)

Randomized Solutions to Partial Information Dynamic Zero-Sum Games S. D. Bopardikar, J. Hespanha Proceedings of the American Control Conference (ACC 2011) PDF (170.4 KB)

Peering Through the iFrame B. Stone-Gross, M. Cova, C. Kruegel, G. Vigna Proceedings of the International Conference on Computer Communications (INFOCOM 2011) BibTeX PDF (312.9 KB)

Prophiler: A Fast Filter for the Large-Scale Detection of Malicious Web Pages D. Canali, M. Cova, G. Vigna, C. Kruegel Proceedings of the International World Wide Web Conference (WWW 2011) BibTeX PDF (1.2 MB)

Towards Situational Awareness of Large-scale Botnet Probing Events Z. Li, A. Goyal, Y. Chen, V. Paxson IEEE Transactions on Information Forensics and Security, 2011, vol. 6, no.1 PDF (371.6 KB)

Exposure: Finding Malicious Domains Using Passive DNS Analysis L. Bilge, E. Kirda, C. Kruegel, M. Balduzzi Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS 2011) PDF (275.6 KB)

WiGiPedia: Visual Editing of Semantic Data in Wikipedia S. Bostandjiev, J. O'Donovan, B. Gretarsson, C. Hall, T. Hollerer Proceedings of the Visual Interfaces to the Social and Semantic Web (VISSW 2011) PDF (1.8 MB)

Analysis of a Botnet Takeover B. Stone-Gross, M. Cova, B. Gilbert, R. Kemmerer, C. Kruegel, G. Vigna IEEE Security and Privacy Magazine, 2011, vol. 9, no.1 BibTeX PDF (1.3 MB)

2010 (11 publications)

Network Intrusion Detection: Dead or Alive? G. Vigna Proceedings of the Annual Computer Security Applications Conference (ACSAC 2010) BibTeX PDF (168.2 KB)

Randomized Sampling for Large Zero-Sum Games S. D. Bopardikar, A. Borri, J. Hespanha, M. Prandini, M. D. DiBenedetto Proceedings of the IEEE Conference on Decision and Control (ICDC 2010) PDF (121.3 KB)

behaviorism: a Framework for Dynamic Data Visualization A. G. Forbes, T. Hollerer, G. Legrady IEEE Transactions on Visualization and Computer Graphics, 2010, vol. 16, no.6 PDF (7.1 MB)

Static Analysis for Detecting Taint-Style Vulnerabilities in Web Applications N. Jovanovic, C. Kruegel, E. Kirda Journal of Computer Security, 2010 PDF (273.9 KB)

Toward Automated Detection of Logic Vulnerabilities in Web Applications V. Felmetsger, L. Cavedon, C. Kruegel, G. Vigna Proceedings of the USENIX Security Symposium (USENIX Security 2010) BibTeX PDF (246.9 KB)

SmallWorlds: Visualizing Social Recommendations B. Gretarsson, J. O'Donovan, S. Bostandjiev, C. Hall, T. Hollerer Computer Graphics Forum: The International Journal of the Eurographics Association, 2010, vol. 29, no.3 PDF (1.4 MB)

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection R. Sommer, V. Paxson Proceedings of the IEEE Symposium on Security and Privacy (SSP 2010) PDF (158.5 KB)

On the Potential of Proactive Domain Blacklisting M. Felegyhazi, C. Kreibich, V. Paxson Proceedings of the Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET 2010) PDF (166.9 KB)

Insights from the Inside: A View of Botnet Management from Infiltration C. Y. Cho, J. Caballero, C. Grier, V. Paxson, D. Song Proceedings of the Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET 2010) PDF (362.3 KB)

Botnet Judo: Fighting Spam with Itself A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. Voelker, V. Paxson, N. Weaver, S. Savage Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS 2010) PDF (1.7 MB)

A Reaction-Diffusion Model for Epidemic Routing in Sparely Connected MANETs D. Klein, J. Hespanha, U. Madhow Proceedings of the International Conference on Computer Communications (INFOCOM 2010) PDF (532.4 KB)

2009 (5 publications)

FIRE: FInding Rogue nEtworks B. Stone-Gross, A. Moser, C. Kruegel, E. Kirda, K. Almeroth Proceedings of the Annual Computer Security Applications Conference (ACSAC 2009) BibTeX PDF (198.6 KB)

Learning Approaches to the Witsenhausen Counterexample from a View of Potential Games N. Li, J. R. Marden, J. S. Shamma Proceedings of the IEEE Conference on Decision and Control (ICDC 2009) PDF (552.8 KB)

Your Botnet is My Botnet: Analysis of a Botnet Takeover B. Stone-Gross, M. Cova, B. Gilbert, L. Cavallaro, C. Kruegel, M. Szydlowski, G. Vigna, R. Kemmerer Proceedings of the ACM Conference on Computer and Communications Security (CCS 2009) BibTeX PDF (921.8 KB)

On Calibrating Enterprise Switch Measurements B. Nechaev, V. Paxson, M. Allman, A. Gurtov Proceedings of the ACM Internet Measurement Conference (ICM 2009) PDF (223.8 KB)

WiGis: A Framework for Scalable Web-based Interactive Graph Visualizations B. Gretarsson, S. Bostandjiev, J. O'Donovan, T. Hollerer Proceedings of the International Symposium on Graph Drawing (GraphDrawing 2009) PDF (2.1 MB)

This research is supported by the Army Research Office, under agreement W911NF-09-1-0553.

Research topics

People involved

Faculty

Organizations

Sponsors

  • ARO
Last update
July 13, 2015, 11:27 a.m.