• Publications
  • Influence
Measuring the mixing time of social graphs
TLDR
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. Expand
  • 188
  • 15
  • PDF
XMSS: eXtended Merkle Signature Scheme
TLDR
This note describes the eXtended Merkle Signature Scheme (XMSS), a hash-based digital signature system. Expand
  • 47
  • 12
Keep your friends close: Incorporating trust into social network-based Sybil defenses
TLDR
In this paper we introduce several designs to tune the performance of Sybil defenses by accounting for differential trust in social graphs and modeling these trust values by biasing random walks performed on these graphs. Expand
  • 111
  • 9
  • PDF
Losing control of the internet: using the data plane to attack the control plane
TLDR
We introduce the Coordinated Cross Plane Session Termination, or CXPST, attack, a distributed denial of service attack that attacks the control plane of the Internet. Expand
  • 82
  • 8
  • PDF
AMAL: High-fidelity, behavior-based automated malware analysis and classification
TLDR
This paper introduces AMAL, an automated and behavior-based malware analysis and labeling system that addresses shortcomings of the existing systems. Expand
  • 102
  • 6
  • PDF
Kindred domains: detecting and clustering botnet domains using DNS traffic
TLDR
We propose to analyze domain name system (DNS) traffic, such as Non-Existent Domain (NXDomain) queries, at several premier Top Level Domain (TLD) authoritative name servers to identify strongly connected cliques of malware related domains. Expand
  • 69
  • 6
  • PDF
Keylogging-Resistant Visual Authentication Protocols
TLDR
The design of secure authentication protocols is quite challenging, considering that various kinds of root kits reside in Personal Computers (PCs). Expand
  • 35
  • 6
  • PDF
SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery
TLDR
We propose a new approach to defending against ransomware inside NAND flash-based SSDs, which is invariant across various ransomwares and lightweight enough to be used in SSDs. Expand
  • 23
  • 5
  • PDF
Exploring the Attack Surface of Blockchain: A Systematic Overview
TLDR
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Expand
  • 41
  • 4
  • PDF
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones
TLDR
We use a state-of-the-art automatic speaker verification system to defend against machine-based voice impersonation attacks. Expand
  • 47
  • 4
  • PDF