Craig A. Shue

Affiliations:
  • Worcester Polytechnic Institute, Worcester, MA, USA
  • Oak Ridge National Laboratory, Oak Ridge, TN, USA
  • Indiana University, Bloomington, IN, USA


According to our database1, Craig A. Shue authored at least 51 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Toward a (Secure) Path of Least Resistance: An Examination of Usability Challenges in Secure Sandbox Systems.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Inspecting Traffic in Residential Networks with Opportunistically Outsourced Middleboxes.
Proceedings of the NOMS 2023, 2023

By Your Command: Extracting the User Actions that Create Network Flows in Android.
Proceedings of the 14th International Conference on Network of the Future, 2023

Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

2022
Visualizing Web Application Execution Logs to Improve Software Security Defect Localization.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Generating Stateful Policies for IoT Device Security with Cross-Device Sensors.
Proceedings of the 13th International Conference on Network of the Future, 2022

Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
Can the User Help? Leveraging User Actions for Network Profiling.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

Avoiding VPN Bottlenecks: Exploring Network-Level Client Identity Validation Options.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

2020
Community Cleanup: Incentivizing Network Hygiene via Distributed Attack Reporting.
Proceedings of the NOMS 2020, 2020

Can Host-Based SDNs Rival the Traffic Engineering Abilities of Switch-Based SDNs?
Proceedings of the 11th International Conference on Network of the Future, 2020

Beyond the VPN: Practical Client Identity in an Internet with Widespread IP Address Sharing.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

2019
Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2019

Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity.
Proceedings of the Security and Privacy in Communication Networks, 2019

Authenticating Endpoints and Vetting Connections in Residential Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Control-Flow Integrity for Real-Time Embedded Systems.
Proceedings of the 31st Euromicro Conference on Real-Time Systems, 2019

2017
The best bang for the byte: Characterizing the potential of DNS amplification attacks.
Comput. Networks, 2017

On the feasibility of cloud-based SDN controllers for residential networks.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

DeepContext: An OpenFlow-Compatible, Host-Based SDN for Enterprise Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2016
Contextual, flow-based access control with scalable host-based SDN techniques.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Whole home proxies: Bringing enterprise-grade security to residential networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Validating security protocols with cloud-based middleboxes.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Characterizing Optimal DNS Amplification Attacks and Effective Mitigation.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

The SDN Shuffle: Creating a Moving-Target Defense using Host-based Software-Defined Networking.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

Characterizing Network-Based Moving Target Defenses.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Message authentication codes for secure remote non-native client connections to ROS enabled robots.
Proceedings of the 2014 IEEE International Conference on Technologies for Practical Robot Applications, 2014

Designing user-specific plug-n-play into body area networks.
Proceedings of the 4th ACM MobiHoc workshop on Pervasive wireless healthcare, 2014

Understanding the security of interoperable medical devices using attack graphs.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Bandwidth aggregation in allied WiFi routers.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

2013
Resolvers Revealed: Characterizing DNS Resolvers and their Clients.
ACM Trans. Internet Techn., 2013

From an IP Address to a Street Address: Using Wireless Signals to Locate a Target.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

Reporting Insider Threats via Covert Channels.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

2012
Abnormally Malicious Autonomous Systems and Their Internet Connectivity.
IEEE/ACM Trans. Netw., 2012

On building inexpensive network capabilities.
Comput. Commun. Rev., 2012

Understanding new anonymity networks from a user's perspective.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Touring DNS Open Houses for Trends and Configurations.
IEEE/ACM Trans. Netw., 2011

Embracing the cloud for better cyber security.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Implementing a "moving target" system to protect servers.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

A system for intelligent substitution of named entities with applications to the automatic generation of honey tokens.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
An Internet without the Internet protocol.
Comput. Networks, 2010

Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Towards an empirical measure for assessing public attitudes regarding government cybercrime countermeasures.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Sensitive Data Requests: Do Sites Ask Correctly?
Proceedings of IEEE International Conference on Communications, 2009

A Unified Approach to Intra-domain Security.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Packet forwarding with source verification.
Comput. Networks, 2008

Exploitable Redirects on the Web: Identification, Prevalence, and Defense.
Proceedings of the 2nd USENIX Workshop on Offensive Technologies, 2008

Understanding implications of DNS zone provisioning.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

2007
The web is smaller than it seems.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

IPSec: Performance Analysis and Enhancements.
Proceedings of IEEE International Conference on Communications, 2007

2006
"Empty space" computes: the evolution of an unconventional supercomputer.
Proceedings of the Third Conference on Computing Frontiers, 2006


  Loading...