IA Publications

Selected Recent Publications


Brooks, T., Kaarst-Brown, M., Caicedo, C., Park, J., & McKnight, L. (2014). Secure the Edge? Understanding the Risk Toward Wireless Grids Edgeware Technology. International Journal of Internet Technology and Secured Transactions.

McKenna, P., Chauncey, S., McKnight, L. W., Kaarst-Brown, M., & Arnone, M. (2014). Ambient Privacy with Wireless Grids: Forging New Concepts of Relationship in 21st Century Information Society. International Journal of Information Security Research, 3(1-2).

Park, J. S., Kwiat, K. A., Kamhoua, C. A., White, J., & Kim, S. (2014). Trusted Online Social Network (OSN) Services with Optimal Data Management. Computers & Security, 42, 116–136. doi:10.1016/j.cose.2014.02.004

Wang, Y., Leon, P. G., Cranor, L. F., Acquisti, A., Sadeh, N., & Forget, A. (2014). A Field Trial of Privacy Nudges for Facebook. In Proceedings of the ACM Conf. Human Factors in Computer Systems (CHI).

Zhang, M., & Yin, H. (2014). AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications. In Proceedings of the 21st Annual Network & Distributed System Security Symposium (NDSS’14). San Diego, CA.

Zhang, M., & Yin, H. (2014). Efficient, Context-Aware Privacy Leakage Confinment for Android Applications without Firmware Modding. In Proceedings of the 9th ACM Symposium on Information, Computer and Communication Security. Kyoto, Japan.


Banks, W. (2013). Exceptional Courts in Counterterrorism: Lessons from the Foreign Intelligence Surveillance Act (FISA). In F. N. Aolain & O. Gross (Eds.), Guantanamo and Beyond: Exceptional Courts and Military Commissions in Comparative Perspective. Cambridge, UK: Cambridge University Press.

Banks, W. C., & Rishikof, H. (2013). Educating National Security Lawyers for the Twenty-?rst Century: The Intersection of National Security Law and International Affairs. Journal of National Security Law & Policy, 6(2). Retrieved from http://jnslp.com/wp-content/uploads/2013/04/Educating-National-Security-Lawyers.pdf

Hao, H., Singh, V., & Du, W. (2013). On the effectiveness of API-level access control using bytecode rewriting in Android. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security – ASIA CCS ’13 (p. 25). New York, New York, USA: ACM Press. doi:10.1145/2484313.2484317

Huang, H., Mehrotra, K., & Mohan, C. K. (2013). Rank-based outlier detection. Journal of Statistical Computation and Simulation, 83(3), 518–531. doi:10.1080/00949655.2011.621124

Kamhoua, C. A., Kwiat, K. A., Park, J. S., Hurley, P., & Chatterjee., M. (2013). Replication and diversity for survivability in cyberspace: A game theoretic approach. Journal of Information Warfare 1, 12(2).

Leon, P. G., Ur, B., Wang, Y., Sleeper, M., Balebako, R., Shay, R., Cranor, L. F. (2013). What matters to users? In Proceedings of the Ninth Symposium on Usable Privacy and Security – SOUPS ’13 (p. 1). New York, New York, USA: ACM Press. doi:10.1145/2501604.2501611

Prakash, A., Venkataramani, E., Yin, H., & Lin, Z. (2013). Manipulating semantic values in kernel data structures: Attack assessments and implications. In 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (pp. 1–12). IEEE. doi:10.1109/DSN.2013.6575344

Prakash, A., Yin, H., & Liang, Z. (2013). Enforcing system-wide control flow integrity for exploit detection and diagnosis. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security – ASIA CCS ’13 (p. 311). New York, New York, USA: ACM Press. doi:10.1145/2484313.2484352

Wang, Y., Huang, Y., & Louis, C. (2013). Towards a Framework for Privacy-Aware Mobile Crowdsourcing. In 2013 International Conference on Social Computing (pp. 454–459). IEEE. doi:10.1109/SocialCom.2013.71

Zhang, X., Ahlawat, A., & Du, W. (2013). AFrame: isolating advertisements from mobile applications in Android. In Proceedings of the 29th Annual Computer Security Applications Conference on – ACSAC ’13 (pp. 9–18). New York, New York, USA: ACM Press. doi:10.1145/2523649.2523652


Brooks, T., Caicedo, C., & Park, J. (2012). Security Vulnerability Analysis and Strategies for Trusted Virtualized Computing Environments. International Journal of Intelligent Computing Research, 3(1-2). Retrieved from http://www.infonomics-society.org/IJICR/Security Vulnerability Analysis in Virtualized Computing Environments.pdf

Chin, S.-K., Devendorf, E., Muccio, S., Older, S., & Royer, J. (2012). Formal Verification for Mission Assurance in Cyberspace: Education, Tools, and Results. In Proceedings of the 16th Colloquium for Information Systems Security Education (pp. 75–82). Lake Buena Vista, FL.

Mueller, M. L., & Asghari, H. (2012). Deep packet inspection and bandwidth management: Battles over BitTorrent in Canada and the United States. Telecommunications Policy, 36(6), 462–475. doi:10.1016/j.telpol.2012.04.003

Older, S., & Chin, S.-K. (2012). Engineering Assurance at the Undergraduate Leve. IEEE Security & Privacy, 10(6), 74–77.

Park, J. S., Chandramohan, P., Suresh, A. T., Giordano, J. V., & Kwiat, K. A. (2012). Component survivability at runtime for mission-critical distributed systems. The Journal of Supercomputing, 66(3), 1390–1417. doi:10.1007/s11227-012-0818-2

Park, J. S., Kim, S., Kamhoua, C. A., & Kwiat, K. A. (2012). Optimal State Management of Data Sharing in Online Social Network (OSN) Services. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 648–655). IEEE. doi:10.1109/TrustCom.2012.216

Raven-Hansen, P., Dycus, S., & Banks, W. C. (2012). A Brief History of the Field of National Security Law. In J. D.Rhodes (Ed.), National Security Law Fifty Years of Transformation: An Anthology. Chicago: ABA Publishing.

Ur, B., Leon, P. G., Cranor, L. F., Shay, R., & Wang, Y. (2012). Smart, useful, scary, creepy. In Proceedings of the Eighth Symposium on Usable Privacy and Security – SOUPS ’12 (p. 1). New York, New York, USA: ACM Press. doi:10.1145/2335356.2335362

Xiong, K., Wang, R., Du, W., & Ning, P. (2012). Containing bogus packet insertion attacks for broadcast authentication in sensor networks. ACM Transactions on Sensor Networks, 8(3), 1–30. doi:10.1145/2240092.2240094

Zhang, M., Prakash, A., Li, X., Liang, Z., & Heng, Y. (2012). Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS’12).


Chin, S.-K., & Older, S. (2011). Access Control, Security, and Trust: A Logical Approach. CRC Press.

Cronkrite, M., Szydlik, J., & Park, J. S. (2011). Protecting Cyber Critical Infrastructure by Enhancing Software Assurance. In Proceedings of the 6th International Conference on Information Warfare and Security. Washington, DC.

Du, W., Jayaraman, K., Tan, X., Luo, T., & Chapin, S. (2011). Position paper. In Proceedings of the 2011 workshop on New security paradigms workshop – NSPW ’11 (p. 83). New York, New York, USA: ACM Press. doi:10.1145/2073276.2073285

Du, W., Tan, X., Luo, T., Jayaraman, K., & Zhu, Z. (2011). Re-designing the Web’s Access Control System. In Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy (DBSec’11). Richmond, VA. doi:10.1007/978-3-642-22348-8_2

Dycus, S., Berney, A. L., Banks, W. C., & Raven-Hansen, P. (2011). National Security Law (5th editio.). Aspen Publishing.

Kuerbis, B., & Mueller, M. L. (2011). Negotiating a new governance hierarchy: The conflicting incentives to secure Internet routing. Communications & Strategies, 81, 125–142.

Luo, T., Hao, H., Du, W., Wang, Y., & Yin, H. (2011). Attacks on WebView in the Android system. In Proceedings of the 27th Annual Computer Security Applications Conference on – ACSAC ’11 (p. 343). New York, New York, USA: ACM Press. doi:10.1145/2076732.2076781


Longstaff, P. H., Armstrong, N. J., & Perrin, K. (2010). Building Resilient Communities: A Preliminary Framework for Assessment. Homeland Security Affairs, 6(3).

Stanton, J. M. (2010). Security of Information and Communication Networks. Journal of the American Society for Information Science and Technology, 61(5).

Zhu, Z., & Du, W. (2010). K-anonymous association rule hiding. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security – ASIACCS ’10 (p. 305). New York, New York, USA: ACM Press. doi:10.1145/1755688.1755726