Hossein Siadati, Bahador Saket, Nasir Memon The authors present APT-Hunter, a visualization tool that helps security analysts to explore login data for discovering patterns and detecting malicious logins
Category: Publications
System, method and computer-accessible medium for security-centric electronic system design
Jeyavijayan Rajendran, Ramesh Karri, and Ozgur Sinanoglu An exemplary system, method and computer-accessible medium can be provided which can include, for example, generating a super control dataflow graph(s) (CDFG) by applying a plurality of electronic system level ESL design constraints associated with an integrated circuit, determining an upper bound(s) number and a lower bound(s) number based...
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats
Stefan Rass and Quanyan Zhu We present a dynamic game framework to model and design defense strategies for advanced persistent threats (APTs). The model is based on a sequence of nested finite two-person zero-sum games, in which the APT is modeled as the attempt to get through multiple protective shells of a system towards conquering...
A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars
Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, and Quanyan Zhu In this paper, the authors formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user.
Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things
Juntao Chen and Quanyan Zhu The development of advanced wireless communication technologies and smart embedded control devices makes everything connected, leading to an emerging paradigm of the Internet of Controlled Things (IoCT). IoCT consists of two layers of systems: cyber layer and physical layer. This work aims to establish a holistic framework that integrates the cyber-physical...
Attack-Aware Cyber Insurance of Interdependent Computer Networks
Rui Zhang, Quanyan Zhu The authors provide an integrative view of the cyber insurance through a bi-level game-theoretic model.
A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation
Jeffrey Pawlick and Quanyan Zhu The authors address the strategic interaction between trackers who collect data and users when incentives to maintain privacy and improve accuracy are misaligned.
A Security Analysis of an In Vehicle Infotainment and App Platform
Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, and Damon McCoy The authors discuss the security implications of the increasing trend in the automotive industry towards integrating trusted third-party apps with In-Vehicle-Infotainment systems (IVI) via smartphones.
Verifiable ASICs
Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, and Michael Walfish A manufacturer of custom hardware (ASICs) can undermine the intended execution of that hardware; high-assurance execution thus requires controlling the manufacturing chain. However, a trusted platform might be orders of magnitude worse in performance or price than an advanced, untrusted platform. This paper...
LAVA: Large-Scale Automated Vulnerability Addition
Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti, William K. Robertson, Frederick Ulrich, and Ryan Whelan Work on automating vulnerability discovery has long been hampered by a shortage of ground-truth corpora with which to evaluate tools and techniques. This lack of ground truth prevents authors and users of tools alike from being able...