SyzGen++: Dependency Inference for Augmenting Kernel Driver Fuzzing.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
URET: Universal Robustness Evaluation Toolkit (for Evasion).
Proceedings of the 32nd USENIX Security Symposium, 2023
Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016
Scalable analytics to detect DNS misuse for establishing stealthy communication channels.
IBM J. Res. Dev., 2016
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
IBM J. Res. Dev., 2016
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.
EURASIP J. Inf. Secur., 2014
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Kaleido: Network Traffic Attribution using Multifaceted Footprinting.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014
Stream computing for large-scale, multi-channel cyber threat analytics.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Cloud security is not (just) virtualization security: a short paper.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
Texas A&M University Anarchistic Key Authorization (AKA).
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996
The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment.
Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA, USA, October 4-6, 1993, 1993
Secure RPC Authentication (SRA) for TELNET and FTP.
Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA, USA, October 4-6, 1993, 1993