2024
Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing.
IEEE Trans. Inf. Forensics Secur., 2024
Hyperion: Hardware-Based High-Performance and Secure System for Container Networks.
IEEE Trans. Cloud Comput., 2024
Improbable Bigrams Expose Vulnerabilities of Incomplete Tokens in Byte-Level Tokenizers.
CoRR, 2024
When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs.
CoRR, 2024
Claim-Guided Textual Backdoor Attack for Practical Applications.
CoRR, 2024
Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm.
CoRR, 2024
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding.
CoRR, 2024
Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective.
Comput. Networks, 2024
BotFence: A Framework for Network-Enriched Botnet Detection and Response With SmartNICs.
IEEE Access, 2024
gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted Channels.
IEEE Access, 2024
CENSor: Detecting Illicit Bitcoin Operation via GCN-Based Hyperedge Classification.
IEEE Access, 2024
Uncovering Threats in Container Systems: A Study on Misconfigured Container Components in the Wild.
IEEE Access, 2024
Prefetch for Fun and Profit: A Revisit of Prefetch Attacks on Apple M1.
Proceedings of the 33rd USENIX Security Symposium, 2024
PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Ignore Me But Don't Replace Me: Utilizing Non-Linguistic Elements for Pretraining on the Cybersecurity Domain.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
HardWhale: A Hardware-Isolated Network Security Enforcement System for Cloud Environments.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
AVX-TSCHA: Leaking information through AVX extensions in commercial processors.
Comput. Secur., November, 2023
Secure Inter-Container Communications Using XDP/eBPF.
IEEE/ACM Trans. Netw., April, 2023
Extended data plane architecture for in-network security services in software-defined networks.
Comput. Secur., 2023
Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Partitioning Ethereum without Eclipsing It.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Evolving Bots: The New Generation of Comment Bots and their Underlying Scam Campaigns in YouTube.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
AVX Timing Side-Channel Attacks against Address Space Layout Randomization.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
HELIOS: Hardware-assisted High-performance Security Extension for Cloud Networking.
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023
Cryonics: Trustworthy Function-as-a-Service using Snapshot-based Enclaves.
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023
DarkBERT: A Language Model for the Dark Side of the Internet.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
<i>Verikube</i>: Automatic and Efficient Verification for Container Network Policies.
IEICE Trans. Inf. Syst., December, 2022
A Framework for Policy Inconsistency Detection in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2022
Reconfigurable regular expression matching architecture for real-time pattern update and payload inspection.
J. Netw. Comput. Appl., 2022
Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method.
IEICE Trans. Inf. Syst., 2022
A Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports.
IEICE Trans. Inf. Syst., 2022
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text.
Comput. Secur., 2022
FuzzDocs: An Automated Security Evaluation Framework for IoT.
IEEE Access, 2022
A Comprehensive Analysis of Today's Malware and Its Distribution Network: Common Adversary Strategies and Implications.
IEEE Access, 2022
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Shedding New Light on the Language of the Dark Web.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022
MECaNIC: SmartNIC to Assist URLLC Processing in Multi-Access Edge Computing Platforms.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022
Meta-Path-based Fake News Detection Leveraging Multi-level Social Context Information.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic.
Proceedings of the Annual Computer Security Applications Conference, 2022
Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception.
IEEE Trans. Inf. Forensics Secur., 2021
GapFinder: Finding Inconsistency of Security Information From Unstructured Text.
IEEE Trans. Inf. Forensics Secur., 2021
Understanding Block and Transaction Logs of Permissionless Blockchain Networks.
Secur. Commun. Networks, 2021
Mobius: Packet Re-processing Hardware Architecture for Rich Policy Handling on a Network Processor.
J. Netw. Syst. Manag., 2021
Hetero-SCAN: Towards Social Context Aware Fake News Detection via Heterogeneous Graph Neural Network.
CoRR, 2021
Formullar: An FPGA-based network testing tool for flexible and precise measurement of ultra-low latency networking systems.
Comput. Networks, 2021
Behind Block Explorers: Public Blockchain Measurement and Security Implication.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Dynamic Control for On-Demand Interference-Managed WLAN Infrastructures.
IEEE/ACM Trans. Netw., 2020
Automated Permission Model Generation for Securing SDN Control-Plane.
IEEE Trans. Inf. Forensics Secur., 2020
A comprehensive security assessment framework for software-defined networks.
Comput. Secur., 2020
BASTION: A Security Enforcement Network Stack for Container Networks.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Efficient Network Administration for Smart Grid Data Center.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
2019
Operator-Defined Reconfigurable Network OS for Software-Defined Networks.
IEEE/ACM Trans. Netw., 2019
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies.
IEEE Trans. Dependable Secur. Comput., 2019
MC-SDN: Supporting Mixed-Criticality Real-Time Communication Using Software-Defined Networking.
IEEE Internet Things J., 2019
SODA: A software-defined security framework for IoT environments.
Comput. Networks, 2019
Astraea: Towards an effective and usable application permission system for SDN.
Comput. Networks, 2019
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services.
Proceedings of the World Wide Web Conference, 2019
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Network Virtualization System for Smart Grid Data Acquisition System.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
DPX: Data-Plane eXtensions for SDN Security Service Instantiation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Rethinking Network Policy Coordination: A Database Perspective.
Proceedings of the 3rd Asia-Pacific Workshop on Networking, 2019
2018
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster.
Secur. Commun. Networks, 2018
NOSArmor: Building a Secure Network Operating System.
Secur. Commun. Networks, 2018
Probius: Automated Approach for VNF and Service Chain Analysis in Software-Defined NFV.
Proceedings of the Symposium on SDN Research, 2018
HEX Switch: Hardware-assisted security extensions of OpenFlow.
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018
AEGIS: An Automated Permission Generation and Verification System for SDNs.
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018
MC-SDN: Supporting Mixed-Criticality Scheduling on Switched-Ethernet Using Software-Defined Networking.
Proceedings of the 2018 IEEE Real-Time Systems Symposium, 2018
Towards a Security-Enhanced Cloud Platform.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
RE-CHECKER: Towards Secure RESTful Service in Software-Defined Networking.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018
Barista: An Event-centric NOS Composition Framework for Software-Defined Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
INDAGO: A New Framework For Detecting Malicious SDN Applications.
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018
CloudRand: Building Heterogeneous and Moving-Target Network Interfaces.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Toward Semantic Assessment of Vulnerability Severity: A Text Mining Approach.
Proceedings of the CIKM 2018 Workshops co-located with 27th ACM International Conference on Information and Knowledge Management (CIKM 2018), 2018
Knowledge Seeking on The Shadow Brokers.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Fault Tolerance for Software-Defined Networking in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018
2017
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2017
DELTA: A Security Assessment Framework for Software-Defined Networks.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Mobility of Everything (MoE): An Integrated and Distributed Mobility Management.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
Bridging the architectural gap between NOS design principles in software-defined networks.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017
A Security-Mode for Carrier-Grade SDN Controllers.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Vulnerabilities of network OS and mitigation with state-based permission system.
Secur. Commun. Networks, 2016
Enhancing Network Security through Software Defined Networking (SDN).
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
QoSE: Quality of security a network security framework with distributed NFV.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
UNISAFE: A Union of Security Actions for Software Switches.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
HogMap: Using SDNs to Incentivize Collaborative Security Monitoring.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
The Smaller, the Shrewder: A Simple Malicious Application Can Kill an Entire SDN Environment.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
SHIELD: An Automated Framework for Static Analysis of SDN Applications.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
2015
A First Step Toward Network Security Virtualization: From Concept To Prototype.
IEEE Trans. Inf. Forensics Secur., 2015
Enabling security functions with SDN: A feasibility study.
Comput. Networks, 2015
POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection.
Proceedings of the Security and Privacy in Communication Networks, 2015
SPIRIT: A Framework for Profiling SDN.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
2014
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Rosemary: A Robust, Secure, and High-performance Network Operating System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection.
Comput. Networks, 2013
Attacking software-defined networks: a first feasibility study.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013
FRESCO: Modular Composable Security Services for Software-Defined Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Model checking invariant security properties in OpenFlow.
Proceedings of IEEE International Conference on Communications, 2013
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
A Large-Scale Empirical Study of Conficker.
IEEE Trans. Inf. Forensics Secur., 2012
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012
A security enforcement kernel for OpenFlow networks.
Proceedings of the first workshop on Hot topics in software defined networks, 2012
EFFORT: Efficient and effective bot malware detection.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?).
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
2011
Cross-Analysis of Botnet Victims: New Insights and Implications.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
2010
Conficker and beyond: a large-scale empirical study.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010