Publication Populated IP Addresses: Classification and Applications Chi-Yao Hong, Fang Yu, Yinglian Xie ACM Conference on Computer and Communications Security (CCS) | October 2012 ACM Conference on Computer and Communications Security (CCS)
Publication Closing the Pandora’s box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks Rahul Potharaju, Endadul Hoque, Cristina Nita-Rotuaru 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012) | October 2012
Publication Collaborative TCP Sequence Number Inference Attack: How to Crack Sequence Number Under A Second Yinglian Xie ACM Conference on Computer and Communications Security (CCS) | October 2012
Publication Innocent by Association: Early Recognition of Legitimate Users Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Z. Morley Mao ACM Conference on Computer and Communications Security (CCS) | October 2012 ACM Conference on Computer and Communications Security (CCS)
Publication Using probabilistic generative models for ranking risks of Android apps Hao Peng, Chris Gates, Bhaskar Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotuaru, Ian Molloy (CCS ’12) Proceedings of the 2012 ACM conference on Computer and communications security | October 2012
Publication Short paper: Enhancing Mobile Application Permissions with Runtime Feedback and Constraints Jaeyeon Jung, Seungyeop Han, David Wetherall ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices | October 2012
Publication Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, XiaoFeng Wang ACM Conference on Computer and Communications Security (CCS) | October 2012
Publication Scalable Telemetry Classification for Automated Malware Detection Jack W. Stokes, John Platt, Helen Wang, Joe Faulhaber, Mady Marinescu, Anil Thomas, Marius Gheorghescu Proceedings of European Symposium on Research in Computer Security (ESORICS2012) | September 2012 Project
Publication Using File Relationships in Malware Classification Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu Proceedings of Conference on Detection of Intrusions and Malware & Vulnerability Assessment | September 2012 Proceedings of Conference on Detection of Intrusions and Malware & Vulnerability Assessment Project
Publication A New Hash and Sign Approach and Structure-Preserving Signatures from DLIN Melissa Chase, Markulf Kohlweiss Security and Cryptography for Networks (SCN) 2012 | September 2012 Security and Cryptography for Networks (SCN)