Publications

Please select the following research groups or faculty:


Network Security Laboratory

Recent Publications

  • Debra L. Cook, Moti Yung, and Angelos D. Keromytis.
    ''Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers''
    To appear in the Proceedings of the 13th Australasian Conference on Information Security and Privacy (ACISP). July 2008, Wollongong, Australia.

  • Angelos Stavrou, Michael E. Locasto, and Angelos D. Keromytis. ''Pushback for Overlay Networks: Protecting against Malicious Insiders.''
    To appear in the Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS). June 2008, New York, NY.

  • Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, and Angelos D. Keromytis.
    ''Casting out Demons: Sanitizing Training Data for Anomaly Sensors.''
    In Proceedings of the IEEE Symposium on Security and Privacy, pp. 81 - 95. May 2008, Oakland, CA.

  • Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabrian Monrose, and Michael K. Reiter.
    ''Taming the Devil: Techniques for Evaluating Anonymized Network Data.''
    In Proceedings of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS), pp. 125 - 135. February 2008, San Diego, CA.

  • Adam J. Aviv, Michael E. Locasto, Shaya Potter, and Angelos D. Keromytis.
    ''SSARES: Secure Searchable Automated Remote Email Storage.''
    In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC), pp. 129 - 138. December 2007, Miami Beach, FL.

  • More...

Intrusion Detection Systems Group

Recent Publications

  • Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis
    ''Casting out Demons: Sanitizing Training Data for Anomaly Sensors.''
    To appear in the Proceedings of the IEEE Symposium on Security and Privacy. May 2008, Oakland, CA.

  • Gabriela F. Cretu, Angelos Stavrou, Salvatore J. Stolfo, Angelos D. Keromytis
    ''Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems.''
    In the Proceedings of the Third Workshop on Hot Topics in System Dependability, June 2007, Edinburgh, UK

  • Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, and Angelos D. Keromytis.
    ''From STEM to SEAD: Speculative Execution for Automated Defense.''
    In the Proceedings of the USENIX Annual Technical Conference. June 2007, Santa Clara, CA.

  • Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos Keromytis.
    ''A Study of Malcode-Bearing Documents.''
    In the Proceedings of 4th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, July 2007, Lucerne, Switzerland.

  • Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis and Salvatore J. Stolfo.
    ''On the Infeasibility of Modeling Polymorphic Shellcode.''
    In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS). October 2007, Alexandria, Virginia, USA.

Steven Bellovin

Recent Publications

  • Maritza L. Johnson, Chaitanya Atreya, Adam J. Aviv, Steven M. Bellovin, and Gail E, Kaiser.
    ''RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies.''
    Usenix UPSEC '08: Usability, Psychology, and Security, 2008.

  • Steven M. Bellovin.
    ''Virtual Machines, Virtual Security.''
    Communications of the ACM, Vol. 49, No. 10, October 2006, Inside Risks.

  • Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neumann, and Jennifer Rexford.
    ''Risking Communications Security: Potential Hazards of the Protect America Act.''
    IEEE Security and Privacy, Vol. 6, No. 1, January/February 2008, pp. 24-33, to appear.

  • Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas Anagnostakis, and Jonathan M. Smith.
    ''Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications.''
    International Journal of Network Security, Vol.4 pp.69-80, Jan. 2007.

  • Ka-Ping Yee, David Wagner, Marti Hearst and Steven M. Bellovin.
    ''Prerendered User Interfaces for Higher-Assurance Electronic Voting.''
    Usenix/ACCURATE Electronic Voting Technology Workshop, August 2006.

  • More...

Cryptography Laboratory

Recent Publications

  • Jon Feldman, Tal Malkin, Cliff Stein, Rocco Servedio, Martin Wainwright.
    ''LP Decoding Corrects a Constant Fraction of Error (an expanded version).''
    To appear in Proc. IEEE International Symposium on Information Theory (ISIT'04).

  • Tal Malkin, Satoshi Obana, Moti Yung.
    ''The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.''
    In Proceedings of the 22th Annual IACR Eurocrypt conference (EUROCRYPT '04).

  • Amos Beimel, Tal Malkin.
    ''A Quantitative Approach to Reductions in Secure Computation.''
    In Proceedings of the First Theory of Cryptography Conference (TCC '04).

  • Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin. ''Algorithmic Tamper-Proof Security.''
    In Proceedings of the First Theory of Cryptography Conference (TCC '04).

  • Eric Cronin, Sugih Jamin, Tal Malkin, Patrick McDaniel.
    ''On the Design and Use of Forward Secure Signatures.''
    Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03).

  • More...

Network Computing Laboratory

Recent Publications

  • Albert M. Lai, Justin B. Starren, David R. Kaufman, Eneida A. Mendonça, Walter Palmas, Jason Nieh, and Steven Shea.
    ''The Remote Patient Education in a Telemedicine Environment Architecture (REPETE).''
    Telemedicine and e-Health, to appear.

  • Shaya Potter, Jason Nieh, and Matthew Selsky.
    ''Secure Isolation of Untrusted Legacy Applications.''
    Proceedings of the Twenty-first Large Installation System Administration Conference (LISA 2007), Dallas, TX, November 11-16, 2007, pp. 117-130.

  • Albert M. Lai, Jason Nieh, and Justin B. Starren.
    ''REPETE2: A Next Generation Home Telemedicine Architecture.''
    Abstract in Proceedings of the American Medical Informatics Association (AMIA) 2007. Annual Symposium, Chicago, IL, November 10-14, 2007, p. 1020.

  • Oren Laadan, Ricardo Baratto, Dan Phung, Shaya Potter, and Jason Nieh.
    ''DejaView: A Personal Virtual Computer Recorder.''
    Proceedings of the Twenty-first ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, WA, October 14-17, 2007, pp. 279-292.

  • Oren Laadan and Jason Nieh.
    ''Transparent Checkpoint-Restart of Multiple Processes on Commodity Operating Systems.''
    Proceedings of the 2007 USENIX Annual Technical Conference, Santa Clara, CA, June 17-22, 2007, pp. 323-336.

  • More...

Distributed Network Analysis Research Group

Recent Publications

  • Richard T.B. Ma, Dah-ming Chiu, John C.S. Lui, Vishal Misra and Dan Rubenstein.
    ''Interconnecting Eyeballs to Content: A Shapley Value Perspective on ISP Peering and Settlement.'' ACM NetEcon, Seattle, WA, August, 2008.

  • Eli Brosh, Salman A. Baset, Dan Rubenstein and Henning Schulzrinne.
    ''The Delay-Friendliness of TCP.''
    SIGMETRICS'08, Annapolis,Maryland, USA, June, 2008.

  • Alix L.H. Chow, Leana Golubchik and Vishal Misra.
    ''Improving BitTorrent: A Simple Approach.''
    Proceedings of IPTPS, 2008.

  • Joshua Reich, Vishal Misra and Dan Rubenstein.
    ''Roomba MADNeT: a Mobile Ad-hoc Delay Tolerant Network Testbed.''
    MC2R: Mobile Computing and Communications Review, ACM Sigmobile, 2008.

  • Joshua Reich, Vishal Misra and Dan Rubenstein.
    ''The Time Correlated Update Problem.''
    Performance Evaluation Review, ACM Sigmetrics, Smirni, Evgenia, ACM Special Interest Group on Measurement and Evaluation, Volume 35, Number 2, pp. 33-35, September, 2007.

  • More...

Internet Real-Time Laboratory

Recent Publications

  • Se Gi Hong, Volker Hilt, Henning Schulzrinne.
    ''Evaluation of Control Message Overhead of DHT-based P2P System.'' Bell Labs Technical Journal, November 1, 2008.

  • Eli Brosh, Salman Abdul Baset, Dan Rubenstein, Henning Schulzrinne.
    ''The Delay Friendliness of TCP.''
    ACM SIGMETRICS, June 1, 2008

  • Sangho Shin, Henning Schulzrinne.
    ''Call Admission Control in IEEE 802.11 Wireless Networks using QP-CAT.''
    IEEE Infocom, April 1, 2008.

  • Omer Boyaci, Henning Schulzrinne.
    ''Application and Desktop Sharing.''
    ACM CoNEXT 2007, student workshop, December 1, 2007.

  • Suman Srinivasan, Henning Schulzrinne.
    ''BonSwing: A GUI Framework for Ad-Hoc Applications Using Service Discovery.''
    ACM CoNEXT 2007, student workshop, December 1, 2007.

  • More...