BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables, Sima Arasteh, Jelena Mirkovic, Mukund Raghothaman, Christophe Hauser, In Proceedings of ASCAC, 2024PDFBIB
Puppeteer: Leveraging a Large Language Model for Scambaiting, Pithayuth Charnsethikul, Jelena Mirkovic, Rishit Saiya, Benjamin Crotty, Jeffrey Liu and Genevieve Bartlett, In Proceedings of HICCS, 2024PDFBIB
2023
Practical intent-driven routing configuration synthesis, Sivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu, Jelena Mirkovic, In Proceedings of 20th USENIX Symposium on Networked Systems Design and Implementation, 2023PDFBIB
Defending Root DNS Servers against DDoS Using Layered Defenses (Extended), ASM Rizvi, Jelena Mirkovic, John Heidemann, Wesley Hardaker, Robert Story, AdHoc Networks, volume 151, 2023PDFBIB
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications, Rajat Tandon, Haoda Wang, Nicolaas Weideman, Shushan Arakelyan, Genevieve Bartlett, Christophe Hauser, Jelena Mirkovic, In Proceedings of 26th International Symposium on Research in Attacks, Intrusions and Defenses, 2023PDFBIB
Defending Root DNS Servers Against DDoS Using Layered Defenses, A S M Rizvi, Jelena Mirkovic, John Heidemann, Wesley Hardaker and Robert Story, In Proceedings of IEEE COMSNETS, 2023PDFBIB
2022
AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs, Rajat Tandon, Pithayuth Charnsethikul, Michalis Kallitsis and Jelena Mirkovic, In Proceedings of Globecom, 2022PDFBIB
AutoCPS: Control Software Dataset Generation for Semantic Reverse Engineering, Haoda Wang, Christophe Hauser and Luis Garcia, In Proceedings of IEEE Security and Privacy Workshops , 2022PDFBIB
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables, Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic and Christophe Hauser, In Proceedings of RAID, 2022PDFBIB
Polymorphic Malware Behavior Through Network Trace Analysis, Xiyue Deng and Jelena Mirkovic, In Proceedings of International Conference on COMmunication Systems & NETworkS (COMSNETS), 2022PDFBIB
I know what you did on Venmo: Discovering privacy leaks in mobile social payments, Rajat Tandon, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy and Jelena Mirkovic, In Proceedings of Privacy Enhancing Technologies Symposium (PETS), 2022PDFBIB
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch, Taegyu Kim, Aolin Ding, Sriharsha Etigowni, Pengfei Sun, Jizhou Chen, Luis Garcia, Saman Zonouz, Dongyan Xu and Dave Tian, In Proceedings of 20th Annual International Conference on Mobile Systems, Applications and Services, 2022PDFBIB
Tinyodom: Hardware-aware efficient neural inertial navigation, Swapnil Sayan Saha, Sandeep Singh Sandha, Luis Antonio Garcia and Mani Srivastava, ACM Interactive Mobile Wearable Ubiquitous Technology, volume 6, number 2, 2022PDFBIB
Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts, David Balenson, Terry Benzel, Eric Eide, David Emmerich, David Johnson, Jelena Mirkovic and Laura Tinnel, In Proceedings of Cyber Security Experimentation and Test (CSET), 2022PDFBIB
Samba: Identifying Inappropriate Videos for Young Children on YouTube, Le Binh, Rajat Tandon, Chingis Oinar, Jeffrey Liu, Uma Durairaj, Jiani Guo, Spencer Zahabizadeh, Sanjana Ilango, Jeremy Tang, Fred Morstatter, Simon Woo and Jelena Mirkovic, In Proceedings of 31st ACM International Conference on Information & Knowledge Management (CKIM), 2022PDFBIB
Xatu: Boosting Existing DDoS Detection Systems Using Auxiliary Signals, Zhiying Xu, Sivaramakrishnan Ramanathan, Alexander Ruth, Jelena Mirkovic and Minlan Yu, In Proceedings of CoNext, 2022PDFBIB
2021
PERFUME: Programmatic Extraction and Refinement for Usability of Mathematical Expression, Weideman, Nicolaas, Felkner, Virginia K., Wu, Wei-Cheng, May, Jonathan, Hauser, Christophe, and Garcia, Luis, In Proceedings of Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks , 2021PDFBIB
Defending Web Servers Against Flash Crowd Attacks, Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett, Jelena Mirkovic, In Proceedings of International Conference on Applied Cryptography and Network Security (ACNS), 2021PDFBIB
User Experiences with Network Testbeds, Jelena Mirkovic and Portia Pusey, In Proceedings of Cyber Security Experimentation and Test (CSET), 2021PDFBIB
I Always Feel Like Somebody’s Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors, Singh, Akash Deep, Garcia, Luis, Noor, Joseph, and Srivastava, Mani, In Proceedings of USENIX Security Symposium , 2021PDFBIB
Bin2vec: Learning Representations of Binary Executable Programs for Security Tasks, Shushan Arakelyan, Sima Arasteh, Christophe Hauser, Erik Kline and Aram Galstyan, Springer Cybersecurity, 2021PDFBIB
SecDeep: Secure and Performant On-device Deep Learning Inference Framework for Mobile and IoT Devices, Liue, Renju, Garcia, Luis, Liu, Zaoxing, Ou, Botong, and Srivastava, Mani, In Proceedings of nternational Conference on Internet of Things Design and Implementation, 2021PDFBIB
Perspectives on the SolarWinds Incident, Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash and James Bret Michael, IEEE Security & Privacy, volume 19, number 2, pp 7-13, 2021PDFBIB
2020
Malware Behavior Through Network Trace Analysis, Xiyue Deng and Jelena Mirkovic, In Proceedings of International Networking Conference (INC), 2020PDFBIB
Quantifying Cloud Misbehavior, Rajat Tandon, Jelena Mirkovic, Pithayuth Charnsethikul, In Proceedings of IEEE International Conference on Cloud Networking (CloudNet), 2020PDFBIB
Quantifying the Impact of Blocklisting in the Age of Address Reuse, Sivaramakrishnan Ramanathan, Anushah Hossain, Jelena Mirkovic, Minlan Yu, Sadia Afroz, In Proceedings of Internet Measurement Conference (IMC), 2020PDFBIB
BLAG: Improving the Accuracy of Blacklists, Sivaramakrishnan Ramanathan, Jelena Mirkovic and Minlan Yu, In Proceedings of Network and Distributed Systems Security Symposium (NDSS), 2020PDFBIB
Using Terminal Histories to Monitor Student Progress on Hands-on Exercises, Jelena Mirkovic, Aashray Aggarwal, David Weinman, Paul Lepe, Jens Mache and Richard Weiss, In Proceedings of SIGCSE, 2020PDFBIB
2019
BootKeeper: Validating Software Integrity Properties on BootFirmware Images, Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi, In Proceedings of Conference on Data and Application Security and Privacy (CODASPY), 2019PDFBIB
Sleak: Automating Address Space Layout Derandomization, Christophe Hauser,Jayakrishna Menon, Yan Shoshitaishvili, Ruoyu Wang, Giovanni Vigna and Christopher Kruegel, In Proceedings of 35th Annual Computer Security Applications Conference (ACSAC) , 2019PDFBIB
Using Episodic Memory for User Authentication, Simon S. Woo, Ron Artstein, Elsi Kaiser, Xiao Le and Jelena Mirkovic, ACM Transactions on Privacy and Security, volume 22, number 2, 2019PDFBIB
Measuring Student Learning On Network Testbeds, Paul Lepe, Aashray Aggarwal, Jelena Mirkovic, Jens Mache, Richard Weiss and David Weinmann, In Proceedings of MERIT Workshop (ICNP), 2019PDFBIB
Defending Web Servers Against Flash Crowd Attacks, Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett and Jelena Mirkovic, In Proceedings of MERIT Workshop (ICNP), 2019PDFBIB
Designing for Fallible Humans, J. Mirkovic and S. S. Woo, In Proceedings of Humans and CyberSecurity Workshop (HACS) - Invited paper, 2019PDFBIB
2018
SDProber: A Software Defined Prober for SDN, Sivaramakrishnan Ramanathan, Yaron Kanza, Balachander Krishnamurthy,, In Proceedings of the Symposium on SDN Research (SOSR), 2018PDFBIB
Blacklists Assemble: Aggregating Blacklists for Accuracy, Sivaramakrishnan Ramanathan, Jelena Mirkovic and Minlan Yu, Information Sciences Institute technical report number ISI-TR-730, 2018PDFBIB
Social Bots for Online Public Health Interventions, Ashok Deb, Anuja Majmundar, Sungyong Seo, Akira Matsui, Rajat Tandon, Shen Yan, Jon-Patrick Allem, Emilio Ferrara, In Proceedings of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2018PDFBIB
SENSS Against Volumetric DDoS Attacks, Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu and Ying Zhang, In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2018PDFBIB
A binary analysis approach to retrofit security in input parsing routines, Jayakrishna Menon, Christophe Hauser, Yan Shoshitaishvili and Stephen Schwab, In Proceedings of the IEEE Symposium on Security and Privacy Workshops, 2018PDFBIB
Optimizing noise level for perturbing geo-location data, Abhinav Palia and Rajat Tandon, arXiv, volume 1705.02108 , 2018PDFBIB
Social Bots for Online Public Health Interventions, Ashok Deb, Anuja Majmundar, Sungyong Seo, Akira Matsui, Rajat Tandon, Shen Yan, Jon-Patrick Allem and Emilio Ferrara, arXiv, volume 1804.07886, number , pp. , 2018PDFBIB
Handling Anti-Virtual Machine Techniques in Malicious Software, Hao Shi, Jelena Mirkovic and Abdulla Alwabel, ACM Transactions on Privacy and Security (TOPS), volume 21, number 1, pp. , 2018PDFBIB
DEW: Distributed Experiment Workflows , Jelena Mirkovic, Genevieve Bartlett and James Blythe, In Proceedings of CSET, 2018PDFBIB
Malware Analysis through High-Level Behavior , Xiyue Deng and Jelena Mirkovic, In Proceedings of CSET, 2018PDFBIB
GuidedPass: Helping Users to Create Strong and Memorable Passwords , Simon S. Woo and Jelena Mirkovic, In Proceedings of the 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018PDFBIB
Leveraging Semantic Transformation to Investigate Password Habits and Their Causes , Ameya Hanamsagar, Simon S. Woo, Chris Kanich and Jelena Mirkovic, In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI), 2018PDFBIB
2017
Understanding Malware’s Network Behaviors using Fantasm, Xiyue Deng, Hao Shi and Jelena Mirkovic, In Proceedings of LASER Workshop, 2017PDFBIB
Enabling SDN Experimentation in Network Testbeds, Sivaramakrishnan Ramanathan, Pravein Kannan, Chan Mun Choon, Jelena Mirkovic and Keith Sklower, In Proceedings of ACM SDNNFV Security Workshop, 2017PDFBIB
Hiding Debuggers from Malware with Apate, Hao Shi, Jelena Mirkovic,, In Proceedings of ACM SAC, 2017PDFBIB
Do You See Me Now? Sparsity in Passive Observations of Address Liveness , Jelena Mirkovic,Genevieve Bartlett, John Heidemann, Hao Shi and Xiyue Deng, In Proceedings of Traffic Measurement and Analysis Conference (TMA), 2017PDFBIB
Commoner Privacy And A Study On Network Traces, Xiyue Deng and Jelena Mirkovic, In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2017PDFBIB
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense, Jelena Mirkovic, Erik Kline and Peter Reiher, In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2017PDFBIB
2016
Improving Recall and Security of Passphrases through Use of Mnemonics, Simon Woo and Jelena Mirkovic, In Proceedings of Passwords Conference, 2016PDFBIB
Life-Experience Passwords (LEPs), Simon Woo, Elsi Keiser, Ron Artstein and Jelena Mirkovic, In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2016PDFBIB
Good Automatic Authentication Question Generation, Simon Woo, Zuyao Li, Jelena Mirkovic, In Proceedings of International Natural Language Generation Conference, 2016PDFBIB
2015
Evaluation Theory and Practice Applied to Cybersecurity Education, M. Dark and J. Mirkovic, IEEE Security and Privacy Magazine, volume 13, number 2, pp. 75-80, 2015PDFBIB
Engaging Novices in Cybersecurity Competitions: A Vision and Lessons Learned at ACM Tapia 2015, Jelena Mirkovic, Aimee Tabor, Simon Woo, Portia Pusey, In Proceedings of USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE), 2015PDFBIB
Expressing Different Traffic Models Using The LegoTG Framework, Genevieve Bartlett and Jelena Mirkovic, In Proceedings of Workshop on Computer and Networking Experimental Research using Testbeds (CNERT), 2015PDFBIB
Evaluating Cybersecurity Education Interventions: Three Case Studies, J Mirkovic, M Dark, W Du, G Vigna and T Denning, IEEE Security and Privacy Magazine, volume 13, number 3, pp. 63-69, 2015PDFBIB
LegoTG: Composable Traffic Generation with a Custom Blueprint, J. Mirkovic and G. Bartlett, Information Sciences Institute technical report number ISI-TR-699, 2015PDFBIB
2014
Critter: Content-Rich Traffic Trace Repository, V. Sharma, G. Bartlett and J. Mirkovic, In Proceedings of Workshop on Information Sharing and Collaborative Security (WISCS), 2014PDFBIB
Class Capture-the-Flag Exercises, J. Mirkovic, P. A. H. Peterson, In Proceedings of USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE), 2014PDFBIB
Safe and Automated Live Malware Experimentation on Public Testbeds, A. Alwabel, H. Shi, G. Bartlett and J. Mirkovic, In Proceedings of CSET, 2014PDFBIB
Life-Experience Passwords (LEPs), S. Woo, J. Mirkovic, E. Kaiser and R. Artstein, In Proceedings of Who are you? Adventures in Authentication Workshop, 2014PDFBIB
Cardinal Pill Testing of System Virtual Machines, H. Shi, A. Alwabel, and J. Mirkovic, In Proceedings of USENIX Security Symposium, 2014PDFBIB
Cardinal Pill Testing of System Virtual Machines, H. Shi, A. Alwabel, and J. Mirkovic, In Proceedings of USENIX Security Symposium, 2014PDFBIB
Class Capture-the-Flag Exercises, J. Mirkovic and P. A. H. Peterson, In Proceedings of USENIX Summit on Gaming, Games and Gamification in Security Education, 2014PDFBIB
Optimal application allocation on multiple public clouds, Simon S. Woo and Jelena Mirkovic, Elsevier Computer Networks, volume 68, number , pp. 138-148, 2014PDFBIB
2012
Reducing Allocation Errors in Network Testbeds, J. Mirkovic, H. Shi and A. Hussain, In Proceedings of Internet Measurement Conference (IMC), 2012PDFBIB
Beyond Disk Imaging for Preserving User State in Network Testbeds, J. Mirkovic, A. Alwabel and T. Faber., In Proceedings of CSET, 2012PDFBIB
Teaching Cybersecurity with DeterLab, J. Mirkovic and T. Benzel, IEEE Security and Privacy Magazine, volume 10, number 1, pp. 73-76, 2012PDFBIB
2011
Comparative Evaluation of Spoofing Defenses, J. Mirkovic and E. Kissel, IEEE Transactions on Dependable and Secure Computing, volume 8, number 2, pp. 218-232, 2011PDFBIB
Chapter on "Collaborative DDoS Defenses" in Encyclopedia of Cryptography and Security, 2nd Edition, Jelena Mirkovic, Springer, 2011PDFBIB
Analysis of Proximity-1 Space Link Interleaved Time Synchronization Protocol, Simon S Woo, In Proceedings of the IEEE Globecom, 2011PDFBIB
Teaching Security with Network Testbeds, Jelena Mirkovic, Mike Ryan, John Hickey, Keith Sklower, Peter Reiher, Peter A. H. Peterson, Brent H. Kang, Mooi Choo Chuah, Daniel Massey and Gisele Ragusa, In Proceedings of ACM SIGCOMM Workshop on Education, 2011PDFBIB
A Semantic Framework for Data Analysis in Networked Systems, A. Viswanathan, A. Hussain, J. Wroclawski, S. Schwab and J. Mirkovic, In Proceedings of the Networked System Design and Implementation (NSDI), 2011PDFBIB
2010
Space Time Distribution and Synchronization Protocol Development for Mars Proximity Link, Simon Woo, David Mill and J. Gao, In Proceedings of the AIAA SpaceOps, 2010PDFBIB
MACHETE: A Protocol Evaluation Tool for Space-Based Networking Architecture and Simulation, E. Jennings, J. Segui and Simon Woo, In Proceedings of AIAA SpaceOps, 2010PDFBIB
Tools for worm experimentation on the DETER testbed, S.Wei, A. Hussain, J. Mirkovic and C. Ko,, International Journal of Communication Networks and Distributed Systems (IJCNDS), volume 5, number 1/2, pp. 151-171, 2010PDFBIB
The DETER Project: Advancing the Science of Cyber Security Experimentation and Test, J. Mirkovic, T. Benzel. S. Schwab, J. Wroclawski, T. Faber and B. Braden, In Proceedings of IEEE Homeland Security Technologies Conference (IEEE HST), 2010PDFBIB
2009
Modeling Human Behavior for Defense against Flash Crowd Attacks, G. Oikonomou and J. Mirkovic, In Proceedings of IEEE International Conference on Communications (ICC), 2009PDFBIB
RAD: Reflector Attack Defense Using Message Authentication Codes, E. Kline, M. Beaumont-Gay, J. Mirkovic and P. Reiher, In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2009PDFBIB