If you made any changes in Pure, your changes will be visible here soon.

Research Output 2010 2019

  • 365 Citations
  • 11 h-Index
  • 32 Conference contribution
  • 2 Paper
  • 1 Chapter
  • 1 Article
2019

ICORe: Continuous and proactive extrospection on multi-core IoT devices

Zhang, P., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Jan 1 2019, p. 851-860. 10 p.

Research output: Contribution to conferencePaper

Monitoring
Visibility
Data storage equipment
Degradation
Internet of things

Understanding and detecting private interactions in underground forums

Sun, Z., Rubio-Medrano, C. E., Zhao, Z., Bao, T., Doupe, A. & Ahn, G-J., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 303-314 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Learning systems
Detectors
2018

AIM-SDN: Aacking information mismanagement in SDN-datastores

Dixit, V. H., Doupe, A., Shoshitaishvili, Y., Zhao, Z. & Ahn, G-J., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 664-676 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network management
Critical infrastructures
Controllers
Cloud computing
Information management

CacheLight: Defeating the cachekit attack

Gutierrez, M., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Inspection
Hardware
Malware
Hardware security

Challenges, opportunities and a framework for web environment forensics

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 1 2018, Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, 2018. Peterson, G. & Shenoi, S. (eds.). Springer New York LLC, p. 11-33 23 p. (IFIP Advances in Information and Communication Technology; vol. 532).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Digital forensics
1 Citation (Scopus)

Challenges and preparedness of SDN-based firewalls

Dixit, V. H., Kyung, S., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost effectiveness
Scalability
Controllers
Industry
2 Citations (Scopus)

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

Oest, A., Safei, Y., Doupe, A., Ahn, G-J., Wardman, B. & Warner, G., Jun 8 2018, Proceedings of the 2018 APWG Symposium on Electronic Crime Research, eCrime 2018. IEEE Computer Society, Vol. 2018-May. p. 1-12 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Websites
Paint
Servers
Phishing
1 Citation (Scopus)

Measuring E-mail header injections on the world wide web

Chandramouli, S. P., Bajan, P. M., Kruegel, C., Vigna, G., Zhao, Z., Doupe, A. & Ahn, G-J., Apr 9 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. Association for Computing Machinery, Vol. Part F137816. p. 1647-1656 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
World Wide Web
Websites
Ruby

Secore: Continuous extrospection with high visibility on multi-core ARM platforms

Zhang, P., Ngabonziza, B., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 161-163 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visibility
Program processors
Monitoring
Internet of things
Coprocessor
2017
11 Citations (Scopus)

A game theoretic approach to strategy generation for moving target defense in web applications

Sengupta, S., Vadlamudi, S. G., Kambhampati, S., Doupe, A., Zhao, Z., Taguinod, M. & Ahn, G-J., Jan 1 2017, 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), Vol. 1. p. 178-186 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Uncertainty
40 Citations (Scopus)

Deep android malware detection

McLaughlin, N., Del Rincon, J. M., Kang, B. J., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 301-308 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Pipelines
Malware
Neural networks
Graphics processing unit
6 Citations (Scopus)

HoneyProxy: Design and implementation of next-generation honeynet via SDN

Kyung, S., Han, W., Tiwari, N., Dixit, V. H., Srinivas, L., Zhao, Z., Doupe, A. & Ahn, G-J., Dec 19 2017, 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data acquisition
Controllers
Multicasting
Network architecture
Telecommunication traffic
2 Citations (Scopus)

Mutated policies: Towards proactive attribute-based defenses for access control

Rubio-Medrano, C. E., Lamp, J., Doupe, A., Zhao, Z. & Ahn, G-J., Oct 30 2017, MTD 2017 - Proceedings of the 2017 Workshop on Moving Target Defense, co-located with CCS 2017. Association for Computing Machinery, Inc, Vol. 2017-January. p. 39-49 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Industry

Panel: Trustworthy data science

Doupe, A., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 217 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation

Tu, H., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 4 2017, Proceedings of the 2016 ITU Kaleidoscope Academic Conference: ICTs for a Sustainable World, ITU WT 2016. Institute of Electrical and Electronics Engineers Inc., 7805728

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Industry
6 Citations (Scopus)

Towards automated threat intelligence fusion

Modi, A., Sun, Z., Panwar, A., Khairnar, T., Zhao, Z., Doupe, A., Ahn, G-J. & Black, P., Jan 6 2017, Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 408-416 9 p. 7809731

Research output: Chapter in Book/Report/Conference proceedingConference contribution

intelligence
Fusion reactions
threat
event
workflow
2016
25 Citations (Scopus)

Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin

Liao, K., Zhao, Z., Doupe, A. & Ahn, G-J., Jun 8 2016, Proceedings of the 2016 APWG Symposium on Electronic Crime Research, eCrime 2016. IEEE Computer Society, Vol. 2016-June. p. 1-13 13 p. 7487938

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fog
Ecosystems
Topology
Cybercrime
Payment
5 Citations (Scopus)

Checking intent-based communication in android with intent space analysis

Jing, Y., Ahn, G-J., Doupe, A. & Yi, J. H., May 30 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 735-746 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Access control
Experiments
1 Citation (Scopus)

dbling: Identifying extensions installed on encrypted web thin clients

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Aug 7 2016, In : Digital Investigation. 18, p. S55-S65

Research output: Contribution to journalArticle

Application programs
Digital storage
Dermatoglyphics
digital media
Equipment and Supplies

DBling: Identifying extensions installed on encrypted web thin clients

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 1 2016, p. S55-S65.

Research output: Contribution to conferencePaper

Open Access
Application programs
Digital storage
Cryptography
Crime
Law enforcement
15 Citations (Scopus)

HoneyMix: Toward SDN-based intelligent honeynet

Han, W., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 11 2016, SDN-NFV Security 2016 - Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
12 Citations (Scopus)

Moving target defense for Web applications using Bayesian Stackelberg games

Vadlamud, S. G., Sengupta, S., Taguinod, M., Zhao, Z., Doupe, A., Ahn, G-J. & Kambhampati, S., 2016, AAMAS 2016 - Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1377-1378 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Launching
Ecosystems
Masks
Switches

Position paper: Towards a moving target defense approach for attribute-based access control

Rubio-Medrano, C. E., Lamp, J., Taguinod, M., Doupe, A., Zhao, Z. & Ahn, G-J., Mar 11 2016, ABAC 2016 - Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 68-71 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forging
Access control
Health
2 Citations (Scopus)

Ransomware and cryptocurrency Partners in crime

Ahn, G-J., Doupe, A., Zhao, Z. & Liao, K., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 105-126 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

offense
17 Citations (Scopus)

SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam

Tu, H., Doupe, A., Zhao, Z. & Ahn, G-J., Aug 16 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 320-338 19 p. 7546510

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Telephone
Electronic mail
Ecosystems
Costs
6 Citations (Scopus)

State-Aware network access management for software-defined networks

Han, W., Hu, H., Zhao, Z., Doupe, A., Ahn, G-J., Wang, K. C. & Deng, J., Jun 6 2016, SACMAT 2016 - Proceedings of the 21st ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Vol. 06-08-June-2016. p. 1-11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Access control
Throughput
Degradation
Controllers
11 Citations (Scopus)

Target Fragmentation in Android Apps

Mutchler, P., Safaei, Y., Doupe, A. & Mitchell, J., Aug 1 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016. Institute of Electrical and Electronics Engineers Inc., p. 204-213 10 p. 7527771

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Android (operating system)
Ecosystems
2015
5 Citations (Scopus)

Federated access management for collaborative network environments: Framework and case study

Rubio-Medrano, C. E., Zhao, Z., Doupe, A. & Ahn, G-J., Jun 1 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. Association for Computing Machinery, Vol. 2015-June. p. 125-134 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network performance
Access control
Bandwidth
Communication
16 Citations (Scopus)

Toward a Moving Target Defense for Web Applications

Taguinod, M., Doupe, A., Zhao, Z. & Ahn, G-J., Oct 19 2015, Proceedings - 2015 IEEE 16th International Conference on Information Reuse and Integration, IRI 2015. Institute of Electrical and Electronics Engineers Inc., p. 510-517 8 p. 7301020

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web application
Launching
Ecosystems
Industry
Vulnerability
2014
4 Citations (Scopus)

Do you feel lucky? A large-scale analysis of risk-rewards trade-offs in cyber security

Shoshitaishvili, Y., Invernizzi, L., Doupe, A. & Vigna, G., 2014, Proceedings of the ACM Symposium on Applied Computing. Association for Computing Machinery, p. 1649-1656 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spamming
Students
Crime
Electronic mail
Security of data
2013
26 Citations (Scopus)

DeDacota: Toward preventing server-side XSS via automatic code and data separation

Doupe, A., Cui, W., Jakubowski, M. H., Peinado, M., Kruegel, C. & Vigna, G., 2013, Proceedings of the ACM Conference on Computer and Communications Security. p. 1205-1216 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Websites
Semantics
Internet
Defects
6 Citations (Scopus)

EARs in the wild: Large-scale analysis of Execution After Redirect Vulnerabilities

Payet, P., Doupe, A., Kruegel, C. & Vigna, G., 2013, Proceedings of the ACM Symposium on Applied Computing. p. 1792-1799 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
HTTP
Static analysis
Websites
Semantics
1 Citation (Scopus)

Writing groups in computer science research labs

Doupe, A. & Kayfetz, J. L., 2013, Proceedings - Frontiers in Education Conference, FIE. p. 1359-1365 7 p. 6685054

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
Students
graduate
Group
2011
25 Citations (Scopus)

Fear the EAR: Discovering and mitigating execution after redirect vulnerabilities

Doupe, A., Boe, B., Kruegel, C. & Vigna, G., 2011, Proceedings of the ACM Conference on Computer and Communications Security. p. 251-261 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defects
Ruby
Static analysis
Access control
Rails
24 Citations (Scopus)

Hit 'em where it hurts: A live security exercise on Cyber Situational Awareness

Doupe, A., Egele, M., Caillat, B., Stringhini, G., Yakin, G., Zand, A., Cavedon, L. & Vigna, G., 2011, ACM International Conference Proceeding Series. p. 51-61 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Students
Toxicity
2010
92 Citations (Scopus)

Why Johnny can't pentest: An analysis of black-box web vulnerability scanners

Doupe, A., Cova, M. & Vigna, G., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6201 LNCS. p. 111-131 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6201 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scanner
Black Box
Vulnerability
Web Application
Evaluation