Recent Publications (only 2-3 selected from each CISAT person since 2018)
Wanning Ding, Yuzhe Tang, Yibo Wang. (2025). “Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs.” The 46th IEEE Symposium on
Security and Privacy.
M. Alam, S. Zhang, E. Rodriguez, A. Nafis, and E. Hoque, (2024) “iConPAL: LLM-guided Policy Authoring Assistant for Configuring IoT Defenses,” Proc. of IEEE Secure Development Conference (SecDev), Oct, 2024.
Bappy, F. H., Zaman, S., Islam, M. T., Rizvee, R. A., Park, J. S., & Hasan, K. (2023). Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control. IEEE GLOBECOM.
Salman, A.S., Du, W. (2024). A Framework for TrustZone Encoding/Decoding for QR Buyer-Presented and VCC Offline Generated Payments. In Proceedings of the Future Technologies Conference (FTC) 2024.
Yibo Wang, Yuzhe Tang, Kai Li, Wanning Ding, Zhihua Yang. (2024). “Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing.” USENIX Security’24.
Keyu Zhu, Ferdinando Fioretto, Pascal Van Hentenryck. Post-processing of Differentially Private Data: A Fairness Perspective. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), 2022.
Tariqul Islam, Kamrul Hasan, Saheb Singh, and Joon Park. A Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing. In Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), Xi’an, China, June 25-27, 2022. *Best Paper Award*
Tina AlSadhan and Joon S. Park. Advancing Information Security Continuous Monitoring to Improve Cyber Posture in the Federal Government. In Proceedings of the 21st European Conference on Cyber Warfare and Security (ECCWS), Chester, United Kingdom, June 16-17, 2022.
Lin Zhang, ZifanWang, Mengyu Liu, and Fanxin Kong, “Adaptive Window-Based Sensor Attack Detection for Cyber-Physical Systems”, in the 59th Design Automation Conference (DAC), 2022.
Wenlian Du. Computer & Internet Security: A Hands-on Approach (3rd edition), 2022.
Cuong Tran, Ferdinando Fioretto, Pascal Van Hentenryck, Zhiyan Yao. Decision Making with Differential Privacy under the Fairness Lens. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), 2021. *2022 Caspar Bowden PET award*
Francis Akowuah and Fanxin Kong, “Real-Time Adaptive Sensor Attack Detection in Autonomous Cyber-Physical Systems”, in 27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2021.
K. Li, Y. Wang, Yuzhe Tang. “DETER: Denial of Ethereum Txpool sERvices”, ACM CCS 2021.
K. Li, J. Chen, X. Liu, Yuzhe Tang, X. Wang, X. Luo. “As Strong As Its Weakest Link: How to Break (and Fix) Blockchain DApps at RPC Service”, ISOC NDSS 2021.
T. Islam, K. Lim and D. Manivannan, “Blending Convergent Encryption and Access Control Scheme for Achieving A Secure and Storage Efficient Cloud,” in Proceedings of the IEEE Consumer Communications & Networking Conference (CCNC-2020), January 2020.
K. Lim, T. Islam, K. Hyunbum, and J. Jingon, “A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks,” in Proceedings of the IEEE Consumer Communications & Networking Conference (CCNC-2020), January 2020.
Kristopher Micinski, David Darais, and Thomas Gilray. Abstracting Faceted Execution. In 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, Massachusetts, June 22-26, 2020. IEEE Computer Society, 2020.
Amith K. Belman, Vir V. Phoha. Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification. ACM Transactions on Privacy and Security. 23(1): 4:1-4:36 (2020).
James E. Baker. The Centaur’s Dilemma—National Security Law for the Coming AI Revolution. Brookings Institution Press, 2020.
Nata Barbosa, Yang Wang, and Joon S. Park. Predicting Personalized Privacy Preferences in the Smart Home with Machine Learning. In Proceedings of the Privacy Enhancing Technologies Symposium (PETS), Stockholm, Sweden, July 16-20, 2019.
Daniel Votipka, Seth Rabin, Kristopher Micinski, Jeffrey S. Foster, and Michelle L. Mazurek. An Observational Investigation of Reverse Engineers’ Processes. USENIX Security, 2019.
Shukla and Vir V. Phoha, “Stealing Passwords by Observing Hands Movement,” in IEEE Transactions on Information Forensics and Security, vol. 14, no. 12, pp. 3086-3101, Dec. 2019.
Kailiang Ying, Priyank Thavai, and Wenliang Du. TruZ-View: Developing TrustZone User Interface for Mobile OS Using Delegation Integration Model. In Proceedings of The 9th ACM Conference on Data and Application Security and Privacy (CODASPY ’19), March 25–27, 2019, Richardson, TX, USA.
Yahyazadeh, P. Podder, E. Hoque, and O. Chowdhury. Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms. In the proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019), Toronto, ON, Canada, June 2019.
Samuel Jero, Endadul Hoque, David Choffnes, Alan Mislove, and Cristina Nita-Rotaru. Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. In the proceedings of Network and Distributed System Security Symposium (NDSS), San Diego, California, Feb 2018. *Distinguished Paper Award*
Daniel Votipka, Kristopher Micinski, Seth M. Rabin, Thomas Gilray, Michelle M. Mazurek, and Jeffrey S. Foster. User Comfort with Android Background Resource Accesses in Different Contexts. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), Baltimore, MD, 2018. USENIX Association.