Vinod Yegneswaran

Orcid: 0000-0003-0718-6605

According to our database1, Vinod Yegneswaran authored at least 98 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective.
Comput. Networks, 2024

GFWeb: Measuring the Great Firewall's Web Censorship at Scale.
Proceedings of the 33rd USENIX Security Symposium, 2024

5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

6G-XSec: Explainable Edge Security for Emerging OpenRAN Architectures.
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, 2024

2023
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning.
IEEE Trans. Software Eng., April, 2023

Secure Inter-Container Communications Using XDP/eBPF.
IEEE/ACM Trans. Netw., April, 2023

Extended data plane architecture for in-network security services in software-defined networks.
Comput. Secur., 2023

DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship.
Proceedings of the 32nd USENIX Security Symposium, 2023

Thwarting Smartphone SMS Attacks at the Radio Interface Layer.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

PROSPER: Extracting Protocol Specifications Using Large Language Models.
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023

LANTERN: Layered Adaptive Network Telemetry Collection for Programmable Dataplanes.
Proceedings of the 6th on European P4 Workshop, 2023

SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
A Framework for Policy Inconsistency Detection in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2022

Adversarial Detection of Censorship Measurements.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

PACED: Provenance-based Automated Container Escape Detection.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022

A case for remote attestation in programmable dataplanes.
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022

A fine-grained telemetry stream for security services in 5G open radio access networks.
Proceedings of the 1st International Workshop on Emerging Topics in Wireless, 2022

QFaaS: accelerating and securing serverless cloud networks with QUIC.
Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, 2022

2021
BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception.
IEEE Trans. Inf. Forensics Secur., 2021

GapFinder: Finding Inconsistency of Security Information From Unstructured Text.
IEEE Trans. Inf. Forensics Secur., 2021

TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
IEEE Trans. Inf. Forensics Secur., 2021

Scalable Microservice Forensics and Stability Assessment Using Variational Autoencoders.
CoRR, 2021

CLARION: Sound and Clear Provenance Tracking for Microservice Deployments.
Proceedings of the 30th USENIX Security Symposium, 2021

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Accelerate and secure serverless networks with QUIC.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

2020
Automated Permission Model Generation for Securing SDN Control-Plane.
IEEE Trans. Inf. Forensics Secur., 2020

On the Privacy and Integrity Risks of Contact-Tracing Applications.
CoRR, 2020

A comprehensive security assessment framework for software-defined networks.
Comput. Secur., 2020

An Intent-Based Automation Framework for Securing Dynamic Consumer IoT Infrastructures.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

BASTION: A Security Enforcement Network Stack for Container Networks.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Operator-Defined Reconfigurable Network OS for Software-Defined Networks.
IEEE/ACM Trans. Netw., 2019

VISCR: Intuitive & Conflict-free Automation for Securing the Dynamic Consumer IoT Infrastructures.
CoRR, 2019

Data Masking with Privacy Guarantees.
CoRR, 2019

Mining Data Provenance to Detect Advanced Persistent Threats.
Proceedings of the 11th International Workshop on Theory and Practice of Provenance, 2019

DPX: Data-Plane eXtensions for SDN Security Service Instantiation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Trace-based Behaviour Analysis of Network Servers.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Coordinated dataflow protection for ultra-high bandwidth science networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Trusted Neural Networks for Safety-Constrained Autonomous Control.
CoRR, 2018

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Time Series Deinterleaving of DNS Traffic.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

AEGIS: An Automated Permission Generation and Verification System for SDNs.
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018

Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs.
Proceedings of the Security and Privacy in Communication Networks, 2018

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Barista: An Event-centric NOS Composition Framework for Software-Defined Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks.
IEEE/ACM Trans. Netw., 2017

DELTA: A Security Assessment Framework for Software-Defined Networks.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Securing Ultra-High-Bandwidth Science DMZ Networks with Coordinated Situational Awareness.
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, 2017

Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Bridging the architectural gap between NOS design principles in software-defined networks.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

A Security-Mode for Carrier-Grade SDN Controllers.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

ATOL: A Framework for Automated Analysis and Categorization of the Darkweb Ecosystem.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Reexamining DNS From a Global Recursive Resolver Perspective.
IEEE/ACM Trans. Netw., 2016

HogMap: Using SDNs to Incentivize Collaborative Security Monitoring.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

2015
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2015

Securing the Software Defined Network Control Layer.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography.
Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014

JumpBox - A Seamless Browser Proxy for Tor Pluggable Transports.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications.
Proceedings of the Computer Security - ESORICS 2014, 2014

Rosemary: A Robust, Secure, and High-performance Network Operating System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
An empirical reexamination of global DNS behavior.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

FRESCO: Modular Composable Security Services for Software-Defined Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Model checking invariant security properties in OpenFlow.
Proceedings of IEEE International Conference on Communications, 2013

AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Bootstrapping Communications into an Anti-Censorship System.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

A security enforcement kernel for OpenFlow networks.
Proceedings of the first workshop on Hot topics in software defined networks, 2012

PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Detecting money-stealing apps in alternative Android markets.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

StegoTorus: a camouflage proxy for the Tor anonymity system.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

2011
Honeynet games: a game theoretic approach to defending network monitors.
J. Comb. Optim., 2011

A comparative assessment of malware classification using binary texture analysis and dynamic analysis.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

Poster: a path-cutting approach to blocking XSS worms in social web networks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Employing Honeynets For Network Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

An Analysis of the iKee.B iPhone Botnet.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

BLADE: an attack-agnostic approach for preventing drive-by malware infections.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Using Failure Information Analysis to Detect Enterprise Zombies.
Proceedings of the Security and Privacy in Communication Networks, 2009

BLADE: Slashing the Invisible Channel of Drive-by Download Malware.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

ALICE@home: Distributed Framework for Detecting Malicious Sites.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

An Attacker-Defender Game for Honeynets.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

Active Botnet Probing to Identify Obscure Command and Control Channels.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Eureka: A Framework for Enabling Static Malware Analysis.
Proceedings of the Computer Security, 2008

2007
An Inside Look at Botnets.
Proceedings of the Malware Detection, 2007

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

2006
Composite Subset Measures.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006

Toward a Query Language for Network Attack Data.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

Improving NIDS Performance Through Hardware-based Connection Filtering.
Proceedings of IEEE International Conference on Communications, 2006

Recent Advances in Network Intrusion Detection System Tuning.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
An Architecture for Generating Semantic Aware Signatures.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

2004
On the Design and Use of Internet Sinks for Network Abuse Monitoring.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Global Intrusion Detection in the DOMINO Overlay System.
Proceedings of the Network and Distributed System Security Symposium, 2004

A framework for malicious workload generation.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

Characteristics of internet background radiation.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2003
Internet intrusions: global characteristics and prevalence.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003


  Loading...