09/19/14 |
New York Times Technology Blog coverage of XRay project:
"XRay: A New Tool for Tracking the Use of Personal Data on the Web,"
Steve Lohr, August 2014.
|
09/03/14 |
Our paper "Model Aggregation for Distributed Content Anomaly Detection" is to appear in the 7th ACM Workshop on Artificial Intelligence and Security (AISec). |
07/24/14 |
Our paper "Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems" is to appear in the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). |
05/27/14 |
Our paper "Unsupervised Anomaly-based Malware Detection using Hardware Features" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). |
05/27/14 |
Our paper "Synthetic Data Generation and Defense in Depth Measurement of Web Applications" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). |
05/15/14 |
Our paper "XRay: Increasing the Web's Transparency with Differential Correlation" is to appear in the 23rd USENIX Security Symposium. |
10/03/13 |
Our paper "SAuth: Protecting User Accounts from Password Database Leaks" is to appear in the 20th ACM Conference on Computer and Communications Security (CCS). |
10/03/13 |
Our paper "Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads" is to appear in the 24th ACM Symposium on Operating Systems Principles (SOSP). |
10/03/13 |
Our paper "Determinism Is Not Enough: Making Parallel Programs Reliable with
Stable Multithreading" is to appear in the Communications of the ACM. |
10/01/13 |
Our paper "vTube: Efficient Streaming of Virtual Appliances Over Last-Mile Networks" is to appear in the ACM Symposium on Cloud Computing (SOCC). |
09/01/13 |
Our paper "CellFlood: Attacking Tor Onion Routers on the Cheap" is to appear in the 18th European Symposium on Research in Computer Security (ESORICS). |
08/03/13 |
Our paper "Effective Dynamic Detection of Alias Analysis Errors" is to appear in the 9th joint meeting of the European Software
Engineering Conference and the ACM SIGSOFT International Symposium on
Foundations of Software Engineering (ESEC-FSE). |
07/19/13 |
Our paper "Cloud resiliency and security via diversified replica execution and monitoring" is to appear in the 6th International Symposium on Resilient Control Systems (ISRCS). |
05/23/13 |
Our paper "CloudFence: Data Flow Tracking as a Cloud Service" is to appear in the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). |
04/19/13 |
Our paper "MOTAG: Moving Target Defense Against Internet Denial of Service Attacks" is to appear in the 22nd International Conference on Computer Communications and Networks (ICCCN). |
04/10/13 |
Our paper "Cloudopsy: an Autopsy of Data Flows in the Cloud" is to appear in the Human Computer Interaction International 2013 (HCI). |
04/10/13 |
Our paper "On the Feasibility of Online Malware Detection with Performance Counters" is to appear in the 40th International Symposium on Computer Architecture (ISCA). |
10/22/12 |
Our paper "Sound and Precise Analysis of Parallel Programs through Schedule
Specialization" is to appear in the 33rd ACM SIGPLAN Conference on Programming Language
Design and Implementation (PLDI). |
10/22/12 |
Our paper "Concurrency Attacks" is to appear in the 4th USENIX Workshop on Hot Topics in
Parallelism (HOTPAR). |
10/22/12 |
Our paper "CleanOS: Limiting Mobile Data Exposure with Idle Eviction" is to appear in the 10th USENIX Symposium on Operating
Systems Design and Implementation (OSDI). |
08/17/12 |
Our paper "Self-healing Multitier Architectures Using Cascading Rescue
Points" is to appear in the 2012 Annual Computer Security
Applications Conference (ACSAC). |
08/13/12 |
Our paper "Exploiting Split Browsers for Efficiently Protecting User
Data" is to appear in the CCSW 2012: The ACM Cloud Computing Security
Workshop. |
07/10/12 |
Our paper "Adaptive Defenses for Commodity Software through Virtual
Application Partitioning" is to appear in the 19th ACM Conference on Computer and
Communications Security (CCS). |
04/01/12 |
Our paper "Lost in Translation: Improving Decoy Documents via Automated
Translation" is to appear in the Workshop on Research for Insider Threat (WRIT). |
03/21/12 |
Our paper "Fog Computing: Mitigating Insider Data Theft Attacks in the
Cloud" is to appear in the Workshop on Research for Insider Threat (WRIT). |
03/13/12 |
Our paper "Position Paper: The MEERKATS Cloud Security Architecture" is to appear in the International Workshop on Security and Privacy in Cloud
Computing (ICDCS-SPCC). |
03/01/12 |
Our paper "Towards a Universal Data Provenance Framework using Dynamic
Instrumentation" is to appear in the International Information
Security and Privacy Conference (SEC). |
10/24/11 |
The MEERKATS website is online! |