Wenke Lee

Orcid: 0000-0003-2761-1277

Affiliations:
  • Georgia Institute of Technology, Atlanta GA, USA


According to our database1, Wenke Lee authored at least 218 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Awards

ACM Fellow

ACM Fellow 2017, "For contributions to systems and network security, intrusion and anomaly detection, and malware analysis".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats.
Autom., January, 2024

2023
Revisiting Non-separable Binary Classification and its Applications in Anomaly Detection.
CoRR, 2023

Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process.
CoRR, 2023

The Threat of Offensive AI to Organizations.
Comput. Secur., 2023

TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

PUMM: Preventing Use-After-Free Using Execution Unit Partitioning.
Proceedings of the 32nd USENIX Security Symposium, 2023

VulChecker: Graph-based Vulnerability Localization in Source Code.
Proceedings of the 32nd USENIX Security Symposium, 2023

µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture.
Proceedings of the 32nd USENIX Security Symposium, 2023

Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
The Creation and Detection of Deepfakes: A Survey.
ACM Comput. Surv., 2022

Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

DeView: Confining Progressive Web Applications by Debloating Web APIs.
Proceedings of the Annual Computer Security Applications Conference, 2022

DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Stopping Memory Disclosures via Diversification and Replicated Execution.
IEEE Trans. Dependable Secur. Comput., 2021

Modeling Large-Scale Manipulation in Open Stock Markets.
IEEE Secur. Priv., 2021

The Threat of Offensive AI to Organizations.
CoRR, 2021

SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization.
Proceedings of the WWW '21: The Web Conference 2021, 2021

ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Abusing Hidden Properties to Attack the Node.js Ecosystem.
Proceedings of the 30th USENIX Security Symposium, 2021

Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
Proceedings of the 30th USENIX Security Symposium, 2021

DeepReflect: Discovering Malicious Functionality through Binary Reconstruction.
Proceedings of the 30th USENIX Security Symposium, 2021

One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Cryptographic Key Derivation from Biometric Inferences for Remote Authentication.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Identifying Behavior Dispatchers for Malware Analysis.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats.
IEEE Trans. Autom. Control., 2020

A Multi-Agent Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Advanced Persistent Threats.
CoRR, 2020

Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach.
CoRR, 2020

Measuring and Preventing Supply Chain Attacks on Package Managers.
CoRR, 2020

Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Slimium: Debloating the Chromium Browser with Feature Subsetting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Machine Learning and Security: The Good, The Bad, and The Ugly.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

On the Feasibility of Automating Stock Market Manipulation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
RAZOR: A Framework for Post-deployment Software Debloating.
Proceedings of the 28th USENIX Security Symposium, 2019

Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces.
Proceedings of the Information Security - 22nd International Conference, 2019

Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching.
Proceedings of the 2019 American Control Conference, 2019

2018
A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats.
CoRR, 2018

Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.
Proceedings of the 27th USENIX Security Symposium, 2018

Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Broken Fingers: On the Usage of the Fingerprint API in Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Multi-stage Dynamic Information Flow Tracking Game.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Enforcing Unique Code Target Property for Control-Flow Integrity.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Cloaker Catcher: A Client-based Cloaking Detection System.
CoRR, 2017

Bunshin: Compositing Security Mechanisms through Diversification (with Appendix).
CoRR, 2017

Efficient Protection of Path-Sensitive Control Security.
Proceedings of the 26th USENIX Security Symposium, 2017

Bunshin: Compositing Security Mechanisms through Diversification.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Identifying Open-Source License Violation and 1-day Security Risk at Large Scale.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Exploiting Insurance Telematics for Fun and Profit.
CoRR, 2016

TrackMeOrNot: Enabling Flexible Control on Web Tracking.
Proceedings of the 25th International Conference on World Wide Web, 2016

HDFI: Hardware-Assisted Data-Flow Isolation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Enforcing Kernel Security Invariants with Data Flow Integrity.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

RecProv: Towards Provenance-Aware User Space Record and Replay.
Proceedings of the Provenance and Annotation of Data and Processes, 2016

Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Understanding Malvertising Through Ad-Injecting Browser Extensions.
Proceedings of the 24th International Conference on World Wide Web, 2015

Type Casting Verification: Stopping an Emerging Attack Vector.
Proceedings of the 24th USENIX Security Symposium, 2015

Exploiting and Protecting Dynamic Code Generation.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Preventing Use-after-free with Dangling Pointers Nullification.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

UCognito: Private Browsing without Tears.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Building a Scalable System for Stealthy P2P-Botnet Detection.
IEEE Trans. Inf. Forensics Secur., 2014

On the Feasibility of Large-Scale Infections of iOS Devices.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

From Zygote to Morula: Fortifying Weakened ASLR on Android.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Exposing Inconsistent Web Search Results with Bobble.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Diagnosis and Emergency Patch Generation for Integer Overflow Exploits.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A11y Attacks: Exploiting Accessibility in Operating Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Take This Personally: Pollution Attacks on Personalized Services.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Jekyll on iOS: When Benign Apps Become Evil.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Connected Colors: Unveiling the Structure of Criminal Networks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Intention and Origination: An Inside Look at Large-Scale Bot Queries.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Beheading hydras: performing effective botnet takedowns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Tappan Zee (north) bridge: mining memory accesses for introspection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Detecting and Tracking the Rise of DGA-Based Malware.
login Usenix Mag., 2012

An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services
CoRR, 2012

Practical end-to-end web content integrity.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Impeding Automated Malware Analysis with Environment-sensitive Malware.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

CHEX: statically vetting Android apps for component hijacking vulnerabilities.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads.
Proceedings of the 20th International Conference on World Wide Web, 2011

Detecting Malware Domains at the Upper DNS Hierarchy.
Proceedings of the 20th USENIX Security Symposium, 2011

Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Proceedings of the Network and Distributed System Security Symposium, 2011

PEASOUP: preventing exploits against software of uncertain provenance (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

Detecting stealthy P2P botnets using statistical traffic fingerprints.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

A combinatorial approach to network covert communications with applications in Web Leaks.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Boosting the scalability of botnet detection using adaptive traffic sampling.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

SURF: detecting and measuring search poisoning.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Understanding the prevalence and use of alternative plans in malware with network games.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Exposing invisible timing-based traffic watermarks with BACKLIT.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Building a Dynamic Reputation System for DNS.
Proceedings of the 19th USENIX Security Symposium, 2010

On the Incoherencies in Web Browser Access Control Policies.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

A Centralized Monitoring Infrastructure for Improving DNS Security.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

On the Secrecy of Spread-Spectrum Flow Watermarks.
Proceedings of the Computer Security, 2010

Evaluating Bluetooth as a Medium for Botnet Command and Control.
Proceedings of the Detection of Intrusions and Malware, 2010

Control of low-rate denial-of-service attacks on web servers and TCP flows.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

BLADE: an attack-agnostic approach for preventing drive-by malware infections.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Dynamic Trust Management.
Computer, 2009

McPAD: A multiple classifier system for accurate payload-based anomaly detection.
Comput. Networks, 2009

xBook: Redesigning Privacy Control in Social Networking Platforms.
Proceedings of the 18th USENIX Security Symposium, 2009

Automatic Reverse Engineering of Malware Emulators.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

BLADE: Slashing the Invisible Channel of Drive-by Download Malware.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

K-Tracer: A System for Extracting Kernel Malware Behavior.
Proceedings of the Network and Distributed System Security Symposium, 2009

Recursive DNS Architectures and Vulnerability Implications.
Proceedings of the Network and Distributed System Security Symposium, 2009

WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Secure in-VM monitoring using hardware virtualization.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Mapping kernel objects to enable systematic integrity checking.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Active Botnet Probing to Identify Obscure Command and Control Channels.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Classification of packed executables for accurate computer virus detection.
Pattern Recognit. Lett., 2008

Taming Virtualization.
IEEE Secur. Priv., 2008

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
Proceedings of the 17th USENIX Security Symposium, 2008

Lares: An Architecture for Secure Active Monitoring Using Virtualization.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Impeding Malware Analysis Using Conditional Code Obfuscation.
Proceedings of the Network and Distributed System Security Symposium, 2008

BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
Proceedings of the Network and Distributed System Security Symposium, 2008

Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority.
Proceedings of the Network and Distributed System Security Symposium, 2008

Eureka: A Framework for Enabling Static Malware Analysis.
Proceedings of the Computer Security, 2008

Evaluating email's feasibility for botnet command and control.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Ether: malware analysis via hardware virtualization extensions.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
A layered approach to simplified access control in virtualized systems.
ACM SIGOPS Oper. Syst. Rev., 2007

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Intrusion-Resilient Key Exchange in the Bounded Retrieval Model.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

An assessment of VoIP covert channel threats.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Misleading and defeating importance-scanning malware propagation.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Understanding Precision in Host Based Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Secure and Flexible Monitoring of Virtual Machines.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

A Taxonomy of Botnet Structures.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
q-Gram Matching Using Tree Models.
IEEE Trans. Knowl. Data Eng., 2006

Polymorphic Blending Attacks.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

MisleadingWorm Signature Generators Using Deliberate Noise Injection.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Modeling Botnet Propagation Using Time Zones.
Proceedings of the Network and Distributed System Security Symposium, 2006

Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Towards the integration of diverse spam filtering techniques.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Proceedings of the Computer Security, 2006

Using Labeling to Prevent Cross-Service Attacks Against Smart Phones.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

Measuring intrusion detection capability: an information-theoretic approach.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Evading network anomaly detection systems: formal reasoning and practical techniques.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

DSO: Dependable Signing Overlay.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Hotspot-based traceback for mobile ad hoc networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

An Extensible Environment for Evaluating Secure MANET.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Environment-Sensitive Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Comparative Study between Analytical Models and Packet-Level Worm Simulations.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

Protecting Secret Data from Insider Attacks.
Proceedings of the Financial Cryptography and Data Security, 2005

Anomalous path detection with hardware support.
Proceedings of the 2005 International Conference on Compilers, 2005

2004
An Overview of Intrusion Detection Techniques.
Proceedings of the Practical Handbook of Internet Computing., 2004

Using artificial anomalies to detect unknown and known network intrusions.
Knowl. Inf. Syst., 2004

Formalizing Sensitivity in Static Analysis for Intrusion Detection.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Attack Analysis and Detection for Ad Hoc Routing Protocols.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

HoneyStat: Local Worm Detection Using Honeypots.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Simulating Internet Worms.
Proceedings of the 12th International Workshop on Modeling, 2004

Discovering Novel Attack Strategies from INFOSEC Alerts.
Proceedings of the Computer Security, 2004

On the statistical distribution of processing times in network intrusion detection.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

Attack Plan Recognition and Prediction Using Causal Networks.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

Worm Detection, Early Warning and Response Based on Local Victim Information.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Anomaly Detection Using Call Stack Information.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

A cooperative intrusion detection system for ad hoc networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Statistical Causality Analysis of INFOSEC Alert Data.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

2002
Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility.
SIGKDD Explor., 2002

Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management.
J. Netw. Syst. Manag., 2002

Toward Cost-Sensitive Modeling for Intrusion Detection and Response.
J. Comput. Secur., 2002

Performance Adaptation in Real-Time Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

Guarding the next Internet frontier: countering denial of information attacks.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

Integrating intrusion detection and network management.
Proceedings of the Management Solutions for the New Communications World, 2002

Optimization and control problems in Real-time Intrusion Detection.
Proceedings of the 41st IEEE Conference on Decision and Control, 2002

Using MIB II Variables for Network Intrusion Detection.
Proceedings of the Applications of Data Mining in Computer Security, 2002

Proactive Intrusion Detection.
Proceedings of the Applications of Data Mining in Computer Security, 2002

2001
Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project.
SIGMOD Rec., 2001

Mining System Audit Data: Opportunities and Challenges.
SIGMOD Rec., 2001

Information-Theoretic Measures for Anomaly Detection.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Heterogeneous networking: a new survivability paradigm.
Proceedings of the New Security Paradigms Workshop 2001, 2001

Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables - A Feasibility Study.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

2000
A framework for constructing features and models for intrusion detection systems.
ACM Trans. Inf. Syst. Secur., 2000

Adaptive Intrusion Detection: A Data Mining Approach.
Artif. Intell. Rev., 2000

A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

Intrusion detection in wireless ad-hoc networks.
Proceedings of the MOBICOM 2000, 2000

A Multiple Model Cost-Sensitive Approach for Intrusion Detection.
Proceedings of the Machine Learning: ECML 2000, 11th European Conference on Machine Learning, Barcelona, Catalonia, Spain, May 31, 2000

1999
Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System.
J. Syst. Integr., 1999

A Data Mining Framework for Building Intrusion Detection Models.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

Combining Knowledge Discovery and Knowledge Engineering to Build IDSs.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

Mining in a Data-Flow Environment: Experience in Network Intrusion Detection.
Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999

Automated Intrusion Detection Using NFR: Methods and Experiences.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999

1998
KDD Cup 1999 Data.
Dataset, December, 1998

Data Mining Approaches for Intrusion Detection.
Proceedings of the 7th USENIX Security Symposium, 1998

Mining Audit Data to Build Intrusion Detection Models.
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998

1997
JAM: Java Agents for Meta-Learning over Distributed Databases.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining (KDD-97), 1997

<i>Grappa: </i> A GRAPh PAckage in Java.
Proceedings of the Graph Drawing, 5th International Symposium, 1997


  Loading...