• Publications
  • Influence
A first look at cellular machine-to-machine traffic: large scale measurement and characterization
TLDR
Cellular network based Machine-to-Machine (M2M) communication is fast becoming a market-changing force for a wide spectrum of businesses and applications such as telematics, smart metering, point-of-sale terminals, and home security and automation systems . Expand
  • 256
  • 12
  • PDF
A semantics aware approach to automated reverse engineering unknown protocols
TLDR
ProDecoder is a network trace based protocol message format inference system that exploits the semantics of protocol messages without the executable code of application protocols. Expand
  • 89
  • 12
  • PDF
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
TLDR
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. previously unknown) malware. Expand
  • 141
  • 11
  • PDF
Large-Scale Measurement and Characterization of Cellular Machine-to-Machine Traffic
TLDR
Cellular network-based machine-to-machine (M2M) communication is fast becoming a market-changing force for a wide spectrum of businesses and applications. Expand
  • 130
  • 10
  • PDF
A large scale exploratory analysis of software vulnerability life cycles
TLDR
We conduct an exploratory measurement study of a large software vulnerability data set containing 46310 vulnerabilities disclosed since 1988 till 2011. Expand
  • 127
  • 9
  • PDF
A first look at cellular network performance during crowded events
TLDR
We show that more aggressive release of radio resources via 1-2 seconds shorter RRC timeouts as compared to routine days helps to achieve better tradeoff between wasted radio resources, energy consumption, and delay during crowded events; and opportunistic connection sharing can reduce connection failures by 95% when employed by a small number of devices in each cell sector. Expand
  • 120
  • 8
  • PDF
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots
TLDR
Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform. Expand
  • 94
  • 8
  • PDF
Using spatio-temporal information in API calls with machine learning algorithms for malware detection
TLDR
We use statistical features extracted from both spatial arguments) and temporal (sequences) information available in Windows API calls to improve the detection accuracy of run-time intrusion or malware detection. Expand
  • 114
  • 7
  • PDF
PE-Probe: Leveraging Packer Detection and Structural Information to Detect Malicious Portable Executables
TLDR
We present a novel scheme ‐ PE-Probe ‐ which has the ability to detect packed files and uses structural information of portable executables to detect zero-day (i.e. previously unseen) malicious executables. Expand
  • 49
  • 7
  • PDF
Characterizing and modeling internet traffic dynamics of cellular devices
TLDR
We measure and characterize the spatial and temporal dynamics of mobile Internet traffic from a week-long aggregated flow level mobile device traffic data collected from a major cellular operator's core network. Expand
  • 118
  • 6