Birhanu Eshete

Orcid: 0000-0002-2549-4030

According to our database1, Birhanu Eshete authored at least 34 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members.
Proc. Priv. Enhancing Technol., January, 2023

DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship.
Proceedings of the 32nd USENIX Security Symposium, 2023

Designing Secure Performance Metrics for Last Level Cache.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2023

2022
Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection.
CoRR, 2022

Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem.
CoRR, 2022

Adversarial Detection of Censorship Measurements.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

EG-Booster: Explanation-Guided Booster of ML Evasion Attacks.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Explanation-Guided Diagnosis of Machine Learning Evasion Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2021

PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting.
Proceedings of the IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, 2021

Morphence: Moving Target Defense Against Adversarial Examples.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Best-Effort Adversarial Approximation of Black-Box Malware Classifiers.
Proceedings of the Security and Privacy in Communication Networks, 2020

2019
HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications.
Proceedings of the 27th USENIX Security Symposium, 2018

ProPatrol: Attack Investigation via Extracted High-Level Tasks.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
Proceedings of the 26th USENIX Security Symposium, 2017

DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program.
CoRR, 2016

Chainsaw: Chained Automated Workflow-based Exploit Generation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
WebWinnow: leveraging exploit kit workflows to detect malicious urls.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Effective Analysis, Characterization, and Detection of Malicious Activities on the Web.
PhD thesis, 2013

Effective analysis, characterization, and detection of malicious web pages.
Proceedings of the 22nd International World Wide Web Conference, 2013

Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

SAMo: experimenting a social accountability web platform.
Proceedings of the Annual Symposium on Computing for Development, 2013

EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
BINSPECT: Holistic Analysis and Detection of Malicious Web Pages.
Proceedings of the Security and Privacy in Communication Networks, 2012

Social Accountability for Mozambique: An Experience Report from the Moamba District.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2012

2011
Malicious Website Detection: Effectiveness and Efficiency Issues.
Proceedings of the First SysSec Workshop 2011, 2011

Early Detection of Security Misconfiguration Vulnerabilities in Web Applications.
Proceedings of the Sixth International Conference on Availability, 2011

2010
ICT for Good: Opportunities, Challenges and the Way Forward.
Proceedings of the Fourth International Conference on Digital Society, 2010

Context Information Refinement for Pervasive Medical Systems.
Proceedings of the Fourth International Conference on Digital Society, 2010

Host-based anomaly detection for pervasive medical systems.
Proceedings of the CRiSIS 2010, 2010


  Loading...