If you made any changes in Pure, your changes will be visible here soon.

Research Output 1999 2019

2019

Effectively enforcing authorization constraints for emerging space-sensitive technologies

Rubio-Medrano, C. E., Jogani, S., Leitner, M., Zhao, Z. & Ahn, G-J., May 28 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 195-206 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Access control
Data privacy
Museums
Application programming interfaces (API)

Foreword

Kantarcioglu, M., Krishnan, R., Thuraisingham, B. & Ahn, G-J., Mar 13 2019, In : CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. p. III

Research output: Contribution to journalEditorial

ICORe: Continuous and proactive extrospection on multi-core IoT devices

Zhang, P., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Jan 1 2019, p. 851-860. 10 p.

Research output: Contribution to conferencePaper

Monitoring
Visibility
Data storage equipment
Degradation
Internet of things
Software defined networking

SDNSOC: Object oriented SDN framework

Chowdhary, A., Huang, D., Ahn, G-J., Kang, M., Kim, A. & Velazquez, A., Mar 19 2019, SDN-NFV 2019 - Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2019. Association for Computing Machinery, Inc, p. 7-12 6 p. 3309196. (SDN-NFV 2019 - Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Telecommunication traffic
Chemical analysis
Computer programming
Agglomeration

Special track on internet of things (IoT)

Ahn, G-J., Cho, S. J. & Zheng, J., Jan 1 2019, In : Proceedings of the ACM Symposium on Applied Computing. Part F147772, p. 822-823 2 p.

Research output: Contribution to journalEditorial

Internet of things

The danger of missing instructions: A systematic analysis of security requirements for MCPS

Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Feb 21 2019, Proceedings - 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018. Institute of Electrical and Electronics Engineers Inc., p. 94-99 6 p. (Proceedings - 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer Security
instruction
Delivery of Health Care
Quality of Health Care
Documentation

Understanding and detecting private interactions in underground forums

Sun, Z., Rubio-Medrano, C. E., Zhao, Z., Bao, T., Doupe, A. & Ahn, G-J., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 303-314 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Learning systems
Detectors
2018

AIM-SDN: Aacking information mismanagement in SDN-datastores

Dixit, V. H., Doupe, A., Shoshitaishvili, Y., Zhao, Z. & Ahn, G-J., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 664-676 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network management
Critical infrastructures
Controllers
Cloud computing
Information management

CacheLight: Defeating the cachekit attack

Gutierrez, M., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Inspection
Hardware
Malware
Hardware security

Challenges, opportunities and a framework for web environment forensics

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 1 2018, Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, 2018. Peterson, G. & Shenoi, S. (eds.). Springer New York LLC, p. 11-33 23 p. (IFIP Advances in Information and Communication Technology; vol. 532).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Digital forensics
1 Citation (Scopus)

Challenges and preparedness of SDN-based firewalls

Dixit, V. H., Kyung, S., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost effectiveness
Scalability
Controllers
Industry

Defining and detecting environment discrimination in android apps

Hong, Y., Hu, Y., Lai, C. M., Felix Wu, S., Neamtiu, I., McDaniel, P., Yu, P., Cam, H. & Ahn, G-J., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Springer Verlag, p. 510-529 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Android (operating system)
Malware
Application programming interfaces (API)
Dynamic analysis

DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications

Cho, H., Yi, J. H. & Ahn, G-J., Jan 1 2018, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Monitoring
Hooks
Application programming interfaces (API)
Flow control
Virtual machine

EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems

Coughlin, V., Rubio-Medrano, C., Zhao, Z. & Ahn, G-J., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587430

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographical regions
Network security
Inspection
Network protocols
Monitoring
2 Citations (Scopus)

Efficient Anonymous Message Submission

Zhao, X., Li, L., Xue, G. & Ahn, G-J., Mar 1 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 2, p. 217-230 14 p.

Research output: Contribution to journalArticle

Cryptography
1 Citation (Scopus)

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

Oest, A., Safei, Y., Doupe, A., Ahn, G-J., Wardman, B. & Warner, G., Jun 8 2018, Proceedings of the 2018 APWG Symposium on Electronic Crime Research, eCrime 2018. IEEE Computer Society, Vol. 2018-May. p. 1-12 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Websites
Paint
Servers
Phishing
1 Citation (Scopus)

Measuring E-mail header injections on the world wide web

Chandramouli, S. P., Bajan, P. M., Kruegel, C., Vigna, G., Zhao, Z., Doupe, A. & Ahn, G-J., Apr 9 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. Association for Computing Machinery, Vol. Part F137816. p. 1647-1656 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
World Wide Web
Websites
Ruby

Riskpol: A risk assessment framework for preventing attribute-forgery attacks to ABAC policies

Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Mar 14 2018, ABAC 2018 - Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 54-60 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Risk assessment

Secore: Continuous extrospection with high visibility on multi-core ARM platforms

Zhang, P., Ngabonziza, B., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 161-163 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visibility
Program processors
Monitoring
Internet of things
Coprocessor
1 Citation (Scopus)

Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps

Chen, J., Wang, C., He, K., Zhao, Z., Chen, M., Du, R. & Ahn, G-J., Jan 1 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing.

Research output: Contribution to journalArticle

Application programs
Risk assessment
Semantics
Fuzzy clustering
Ecosystems

Special track on internet of things (IoT)

Ahn, G-J., Cho, S. J. & Zheng, J., Apr 9 2018, In : Proceedings of the ACM Symposium on Applied Computing. Part F137816

Research output: Contribution to journalEditorial

Internet of things

VniDS: Towards elastic security with safe and efficient virtualization of network intrusion detection systems

Li, H., Hu, H., Gu, G., Ahn, G-J. & Zhang, F., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 17-34 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Virtualization
Elasticity
2017
11 Citations (Scopus)

A game theoretic approach to strategy generation for moving target defense in web applications

Sengupta, S., Vadlamudi, S. G., Kambhampati, S., Doupe, A., Zhao, Z., Taguinod, M. & Ahn, G-J., Jan 1 2017, 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), Vol. 1. p. 178-186 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Uncertainty
39 Citations (Scopus)

Deep android malware detection

McLaughlin, N., Del Rincon, J. M., Kang, B. J., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 301-308 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Pipelines
Malware
Neural networks
Graphics processing unit

Foreword

Ghinita, G., Pretschner, A. & Ahn, G-J., Mar 22 2017, In : CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. p. iii-iv

Research output: Contribution to journalEditorial

6 Citations (Scopus)

HoneyProxy: Design and implementation of next-generation honeynet via SDN

Kyung, S., Han, W., Tiwari, N., Dixit, V. H., Srinivas, L., Zhao, Z., Doupe, A. & Ahn, G-J., Dec 19 2017, 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data acquisition
Controllers
Multicasting
Network architecture
Telecommunication traffic
2 Citations (Scopus)

Mutated policies: Towards proactive attribute-based defenses for access control

Rubio-Medrano, C. E., Lamp, J., Doupe, A., Zhao, Z. & Ahn, G-J., Oct 30 2017, MTD 2017 - Proceedings of the 2017 Workshop on Moving Target Defense, co-located with CCS 2017. Association for Computing Machinery, Inc, Vol. 2017-January. p. 39-49 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Industry
2 Citations (Scopus)

OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements

Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Dec 9 2017, Proceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

energy
Ontology
Ukraine
ontology
Energy
1 Citation (Scopus)

Poster: On the safety and efficiency of virtual firewall elasticity control

Li, H., Deng, J., Hu, H., Wang, K. C., Ahn, G-J., Zhao, Z. & Han, W., Jun 7 2017, SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Vol. Part F128644. p. 129-131 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Elasticity
Controllers
Access control
Costs
Network function virtualization
1 Citation (Scopus)

Risk assessment of mobile applications based on machine learned malware dataset

Kim, H., Cho, T., Ahn, G-J. & Hyun Yi, J., May 5 2017, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-16 16 p.

Research output: Contribution to journalArticle

Risk assessment
Identification (control systems)
Malware
Mobile devices
1 Citation (Scopus)

Science DMZ: SDN based secured cloud testbed

Chowdhary, A., Dixit, V. H., Tiwari, N., Kyung, S., Huang, D. & Ahn, G-J., Dec 7 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1-2 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Watches
Software defined networking
Industry
2 Citations (Scopus)

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation

Tu, H., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 4 2017, Proceedings of the 2016 ITU Kaleidoscope Academic Conference: ICTs for a Sustainable World, ITU WT 2016. Institute of Electrical and Electronics Engineers Inc., 7805728

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Industry

Towards adaptive and proactive security assessment for energy delivery systems

Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Oct 10 2017, 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, MSCPES 2017 - Held as part of CPS Week, Proceedings. Institute of Electrical and Electronics Engineers Inc., 8064532

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Modernization
Computer networks
Energy
Attack
6 Citations (Scopus)

Towards automated threat intelligence fusion

Modi, A., Sun, Z., Panwar, A., Khairnar, T., Zhao, Z., Doupe, A., Ahn, G-J. & Black, P., Jan 6 2017, Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 408-416 9 p. 7809731

Research output: Chapter in Book/Report/Conference proceedingConference contribution

intelligence
Fusion reactions
threat
event
workflow
11 Citations (Scopus)

Towards PII-based multiparty access control for photo sharing in Online Social Networks

Vishwamitra, N., Li, Y., Wang, K., Hu, H., Caine, K. & Ahn, G-J., Jun 7 2017, SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Vol. Part F128644. p. 155-166 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Level control
Electric current control
Specifications
17 Citations (Scopus)

Uncovering the Face of Android Ransomware: Characterization and Real-time Detection

Chen, J., Wang, C., Zhao, Z., Chen, K., Du, R. & Ahn, G-J., Dec 27 2017, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

Malware
Viruses
Cryptography
2016
10 Citations (Scopus)

AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing

Riad, K., Yan, Z., Hu, H. & Ahn, G-J., Mar 1 2016, Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015. Institute of Electrical and Electronics Engineers Inc., p. 28-35 8 p. 7423062

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Access control
23 Citations (Scopus)

Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin

Liao, K., Zhao, Z., Doupe, A. & Ahn, G-J., Jun 8 2016, Proceedings of the 2016 APWG Symposium on Electronic Crime Research, eCrime 2016. IEEE Computer Society, Vol. 2016-June. p. 1-13 13 p. 7487938

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fog
Ecosystems
Topology
Cybercrime
Payment
5 Citations (Scopus)

Checking intent-based communication in android with intent space analysis

Jing, Y., Ahn, G-J., Doupe, A. & Yi, J. H., May 30 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 735-746 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Access control
Experiments
1 Citation (Scopus)

dbling: Identifying extensions installed on encrypted web thin clients

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Aug 7 2016, In : Digital Investigation. 18, p. S55-S65

Research output: Contribution to journalArticle

Application programs
Digital storage
Dermatoglyphics
digital media
Equipment and Supplies
15 Citations (Scopus)

HoneyMix: Toward SDN-based intelligent honeynet

Han, W., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 11 2016, SDN-NFV Security 2016 - Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
12 Citations (Scopus)

Moving target defense for Web applications using Bayesian Stackelberg games

Vadlamud, S. G., Sengupta, S., Taguinod, M., Zhao, Z., Doupe, A., Ahn, G-J. & Kambhampati, S., 2016, AAMAS 2016 - Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1377-1378 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Launching
Ecosystems
Masks
Switches
3 Citations (Scopus)

Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces

Zhao, Z., Sankaran, M., Ahn, G-J., Holt, T. J., Jing, Y. & Hu, H., May 1 2016, In : IEEE Security and Privacy. 14, 3, p. 32-43 12 p., 7478573.

Research output: Contribution to journalArticle

sale
commerce
Seals
Sales
migration

Position paper: Towards a moving target defense approach for attribute-based access control

Rubio-Medrano, C. E., Lamp, J., Taguinod, M., Doupe, A., Zhao, Z. & Ahn, G-J., Mar 11 2016, ABAC 2016 - Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 68-71 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forging
Access control
Health
2 Citations (Scopus)

Ransomware and cryptocurrency Partners in crime

Ahn, G-J., Doupe, A., Zhao, Z. & Liao, K., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 105-126 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

offense

SDN-NFV security 2016 preface

Ahn, G-J., Gu, G., Hu, H. & Shin, S., Mar 11 2016, In : Unknown Journal. p. iii

Research output: Contribution to journalArticle

15 Citations (Scopus)

SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam

Tu, H., Doupe, A., Zhao, Z. & Ahn, G-J., Aug 16 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 320-338 19 p. 7546510

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Telephone
Electronic mail
Ecosystems
Costs
6 Citations (Scopus)

State-Aware network access management for software-defined networks

Han, W., Hu, H., Zhao, Z., Doupe, A., Ahn, G-J., Wang, K. C. & Deng, J., Jun 6 2016, SACMAT 2016 - Proceedings of the 21st ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Vol. 06-08-June-2016. p. 1-11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Access control
Throughput
Degradation
Controllers