Distributed Secure Systems

To view publications by project, click the buttons down below:

2024

  1. S&P
    LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation,” Distributed Secure Systems
    Joshua Christian Zhao, Atul Sharma,  Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, and Saurabh Bagchi. Accepted to appear at the 45th IEEE Symposium on Security and Privacy (S&P), pp. 1-19, San Francisco, CA, May 2024. (Acceptance rate: 261/1463 = 17.8%)
  2. CVPR
    “Leak and Learn: An Attacker’s Cookbook to Train Using Leaked Data from Federated Learning,” Distributed Secure Systems
    Joshua C. Zhao, Ahaan Dabholkar, Atul Sharma, and Saurabh Bagchi. Accepted to appear at the Thirty-Fourth IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1-10, Seattle, WA, June 17-21, 2024. (Acceptance rate: )
  3. S&P
    Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors,” Distributed Secure Systems
    Taylor R. Schorlemmer, Kelechi G. Kalu, Luke Chigges, Kyung Myung Ko, Eman Abdul-Muhd Abu Ishgair, Saurabh Bagchi, Santiago Torres-Arias, and James C. Davis. Accepted to appear at the 45th IEEE Symposium on Security and Privacy (S&P), pp. 1-19, San Francisco, CA, May 2024. (Acceptance rate: 261/1463 = 17.8%)

2023

  1. AsiaCCS
    FLAIR: Defense against Model Poisoning Attack in Federated Learning,” Distributed Secure Systems
    Atul Sharma, Wei Chen, Joshua Zhao, Qiang Qiu, Saurabh Bagchi, and Somali Chaterji. To appear at the 18th ACM ASIA Conference on Computer and Communications Security (ASIACCS), pp. 553-566, July 2023. (Acceptance rate: 32/200 = 16.0%) [ Abstract ] [ Slides ]
  2. CVPR
    The Resource Problem of Using Linear Layer Leakage Attack in Federated Learning,”Distributed Secure Systems
    Joshua Christian Zhao; Ahmed Roushdy Elkordy (University of Southern California); Atul Sharma; Yahya H. Ezzeldin, Salman Avestimehr (University of Southern California); Saurabh Bagchi. Accepted to the IEEE / CVF Computer Vision and Pattern Recognition Conference (CVPR), pp. 3974-3983, Vancouver, Canada, June 18-23, 2023. (Acceptance rate: 2360/9155 = 25.8%) [ Abstract ] [ Supplementary ]
  3. FC23
    The Unique Chain Rule and its Applications,” Distributed Secure Systems
    Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate; Michael K. Reiter (Duke University). At the 27th International Conference on Financial Cryptography and Data Security (FC), pp. 1-27, May 2023. (Acceptance rate: 41/182 = 22.5%) [ Abstract ]

2022

  1. ISSREW
    An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware Dependencies,” Distributed Secure Systems
    Austin Ketterer, Asha Shekar, Edgardo Barsallo Yi, Saurabh Bagchi, Abraham Clements. At the 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 19-24, October-November 2022. (Acceptance rate: 47/162 = 29%)
  2. IEEE S&P
    “TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems,” Distributed Secure Systems
    Mustafa Abdallah, Daniel Woods; Parinaz Naghizadeh (Ohio State University); Issa Khalil (Qatar Computing Research Institute (QCRI), HBKU); Timothy Cason, Shreyas Sundaram, Saurabh Bagchi. Accepted to the 43rd IEEE Symposium on Security and Privacy (S&P 2022). (Acceptance rate: 57/407 = 14.0% (in 3rd reviewing cycle)) 
  3. AIStats
    “Can we Generalize and Distribute Private Representation Learning?,” Distributed Secure Systems
    Sheikh Shams Azam; Taejin Kim (Carnegie Mellon University); Seyyedali Hosseinalipour; Carlee Joe-Wong (Carnegie Mellon University); Saurabh Bagchi, Christopher Brinton. Accepted to appear at the 25th International Conference on Artificial Intelligence and Statistics (AIStats 2022). (Acceptance rate: 492/1685 = 29.2%)

2021

  1. ASIACCS
    Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems,” Distributed Secure Systems
    Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh (Ohio State University), Issa Khalil (Qatar Computing Research Institute (QCRI)), Timothy Cason, Shreyas Sundaram, and Saurabh Bagchi. Accepted to appear at the 16th ACM Asia Conference on Computer and Communications Security (ASIACCS), pp. 1–15, 2021. (Acceptance rate: 28/157 = 17.8%) [ Slides ] [ Video presentation ]
  2. SafeThings
    Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems,” Distributed Secure Systems
    Mustafa Abdallah, Sayan Mitra (UIUC), Shreyas Sundaram, and Saurabh Bagchi. Accepted to appear at the IEEE Workshop on the Internet of Safe Things (SafeThings), co-located with Oakland/Security and Privacy, pp. 1–6, May 2021.
  3. SPIE
    HAWKEYE: Adversarial Example Detection through Ensemble Detectors,” Distributed Secure Systems
    Ruqi Bai, Jinkyu Koo (NVIDIA), Heron Teegarden, Michael Roth (Google), Kevin Chan (ARL), David I. Inouye, and Saurabh Bagchi. Accepted to appear at the SPIE Defense and Commercial Sensing Symposium, pp. 1–15, April 2021.  

2020

  1. NeurIPS
    Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests,” Distributed Secure Systems
    Sean M. Kulinski, Saurabh Bagchi, and David I. Inouye. At the 34th Conference on Neural Information Processing Systems (NeurIPS), pp. 1–11, November 2020. (Acceptance rate: 1900/9454 = 20.1%) [ Video ] [ Slides ] [ Poster ] [ Supplement ]
  2. CSUR
    Challenges in Firmware Re-Hosting and Analysis,” Distributed Secure Systems
    Christopher Wright, William A. Moeglein (Sandia National Lab), Saurabh Bagchi, Milind Kulkarni, and Abraham A. Clements (Sandia National Lab). Accepted to appear in the ACM Computing Surveys (CSUR), pp. 1-37, acceptance date: September 2020.
  3. TCNS
    Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs,” Distributed Secure Systems
    Mustafa Abdallah, Parinaz Naghizadeh (Ohio State University), Ashish R Hota (Indian Institute of Technology Kharagpur), Timothy Cason, Saurabh Bagchi, and Shreyas Sundaram. Accepted to appear in IEEE Transactions on Control of Network Systems (TCNS), pp. 1–12, 2020.
  4. NDSS
    μRAI: Return Address Integrity for Embedded Systems,” Distributed Secure Systems
    Naif Saleh Almakhdhub (Purdue and King Saud University), Abraham A Clements (Sandia National Labs), Saurabh Bagchi, and Mathias Payer (EPFL). At the Network and Distributed System Security Symposium (NDSS), pp. 1–18, February 23-26, 2020. (Acceptance rate: 73/399 = 18.3%) [ Code ] [ Presentation ]
  5. Usenix Sec
    HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation,” Distributed Secure Systems
    Abraham A. Clements (Purdue & Sandia), Eric Gustafson (UCSB), Tobias Scharnowski (Ruhr University Bochum), Paul Grosen (UCSB), David Fritz (Sandia), Christopher Kruegel (UCSB), Giovanni Vigna (UCSB), Saurabh Bagchi, and Mathias Payer (EPFL). At the 29th USENIX Security Symposium (Usenix Sec), pp. 1-18, Aug 12-14, 2020, Boston, MA. (Acceptance rate: Not known till event) [ Artifact description ]

2019

  1. ACC
    The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems,” Distributed Secure Systems
    M Abdallah, P Naghizadeh, A Hota, T Cason, S Bagchi, S Sundaram. American Control Conference (ACC), 1—6.
  2. ECIR
    Misleading Metadata Detection on YouTube,” Distributed Secure Systems
    P Palod, A Patwari, S Bahety, S Bagchi, P Goyal. 41st European Conference on Information Retrieval (ECIR), pp. 1-6. (Acceptance rate: 44/151 = 29.1%)

2018

  1. Autonomous Robots
    Resilient Distributed State Estimation with Mobile Agents: Overcoming Byzantine Adversaries, Communication Losses, and Intermittent Measurements,” Distributed Secure Systems
    Aritra Mitra, John A. Richards (Sandia), Saurabh Bagchi, and Shreyas Sundaram. In Springer “Autonomous Robots” journal, Special Issue: Foundations of Resilience for Networked Robotic Systems, pp. 1-26, November 2018.
  2. USENIX Sec
    ACES: Automatic Compartments for Embedded Systems,” Distributed Secure Systems
    Abraham A. Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, and Mathias Payer. At the 27th USENIX Security Symposium (USENIX Sec), pp. 65-82, August 15-17, 2018, Baltimore, MD. (Acceptance rate: 100/524 = 19.1%) [ Presentation ]
  3. IFIP SEC
    A Hypergame Analysis for ErsatzPasswords,” Distributed Secure Systems
    Christopher Gutierrez, Mohammed Almeshekah, Eugene Spafford, and Saurabh Bagchi. Accepted to appear at the 33rd IFIP TC-11 International Conference on Information Security and Privacy Protection (IFIP SEC), pp. 1-14, September 18-20, Poznan, Poland. (Acceptance rate: 36%)
  4. TDSC
    Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks,” Distributed Secure Systems
    Christopher N. Gutierrez, Taegyu Kim, Raffaele Della Corte, Jeffrey Avery, Dan Goldwasser, Marcello Cinque, Saurabh Bagchi. Accepted to appear in IEEE Transactions on Dependable and Secure Computing (TDSC), pp. 1-17, 2018.
  5. CoSE
    Reactive Redundancy for Data Destruction Protection (R2D2),” Distributed Secure Systems
    Christopher Gutierrez, Eugene Spafford, Saurabh Bagchi, and Thomas Yurek. Accepted to appear in Elsevier Computers and Security (CoSE), pp. 1-16, 2018, notice of acceptance: December 2017.
  6. A Game-Theoretic Framework for Securing Interdependent Assets in Networks,” Distributed Secure Systems
    Ashish R. Hota, Abraham A. Clements, Saurabh Bagchi, Shreyas Sundaram, Book chapter in Springer “Game Theory for Security Risk Management: From Theory to Practice”, editors: Stefan Rass, Stefan Schauer, pp. 1-28, 2018.

2017

  1. MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks,” Distributed Secure Systems
    Subramaniyam Kannan, Paul Wood, Larry Deatrick (Northrop Grumman), Patricia Beane (Northrop Grumman),  Somali Chaterji, and Saurabh Bagchi, EAI Endorsed Transactions on Security and Safety 17(11): e4, pp. 1-14, December 2017.
  2. CIKM
    A Multi-Classifier System for Detecting Check-Worthy Statements in Political Debates,” Distributed Secure Systems
    Ayush Patwari, Dan Goldwasser and Saurabh Bagchi. Accepted to appear at the 26th ACM International Conference on Information and Knowledge Management (CIKM) (Short paper), pp. 1-4, Nov 6-10, 2017, Singapore. (Acceptance rate: 119/398 = 29.9% (short papers))
  3. Securecomm
    Topology-based Host-Level Attribution for Multi-Stage Attacks in Enterprise Systems using Software Defined Networks,” Distributed Secure Systems
    Subramaniyam Kannan, Paul Wood, Larry Deatrick (Northrop Grumman), Patricia Beane (Northrop Grumman), Somali Chaterji, and Saurabh Bagchi. At the 13th International Conference on Security and Privacy in Communication Networks (Securecomm), pp. 1-22, October 22-24, 2017, Niagara Falls, Canada. (Acceptance rate: 31/105 = 29.5% (full papers)) [ Presentation ]
  4. DSN
    RL_BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters,” Distributed Secure Systems
    Jinkyu Koo, Xiaojun Lin, and Saurabh Bagchi. In Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 519-530, Jun 26-29, 2017, Denver, Colorado. (Acceptance rate: 49/220 = 22.3% (regular papers)) [ Presentation ]
  5. Oakland/S&P
    Protecting Bare-metal Embedded Systems with Privilege Overlays,” Distributed Secure Systems
    Abraham A Clements, Naif Saleh Almakhdhub, Khaled Saab (Georgia Tech), Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, and Mathias Payer. In Proceedings of the IEEE International Symposium on Security and Privacy (Oakland/S&P), pp. 289-303, May 22-24, 2017, San Jose, California. (Acceptance rate: 60/450 = 13.3%) [ Abstract ] [ Presentation ] [ Video ]
  6. COMSNETS
    Profiting from Attacks on Real-Time Price Communications in Smart Grids,” Distributed Secure Systems
    Paul Wood, Saurabh Bagchi, and Alefiya Hussain (USC/ISI). At the 9th IEEE International Conference on Communication Systems and Networks (COMSNETS), pp. 1-8, Jan 4-8, 2017, Bangalore, India. (Acceptance rate: 49/192 = 25.5%) [ Presentation ]

2016

  1. GameSec
    Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets,” Distributed Secure Systems
    Ashish R. Hota, Abraham A. Clements, Shreyas Sundaram, and Saurabh Bagchi. At the 7th Conference on Decision and Game Theory for Security (GameSec), pp. 1-13, Nov 2-4, 2016, New York City, New York. [ Presentation ]

2015

  1. SRDS
    Denial of Service Elusion (DoSE): Keeping Clients Connected for Less“, Distributed Secure Systems
    Paul Wood, Christopher N. Gutierrez, and Saurabh Bagchi. At the 34th International Symposium on Reliable Distributed Systems (SRDS), pp. 1-10, September 28-October 1, 2015, Montreal, Canada. (Acceptance rate: 27/81 = 33%) [ Presentation ]

2014

  1. SmartGridComm
    A Risk Assessment Tool for Advanced Metering Infrastructures,” Distributed Secure Systems
    Tawfeeq Shawly, Jun Liu, Nathan Burow, Saurabh Bagchi, Robin Berthier (University of Illinois at Urbana-Champaign), and Rakesh B. Bobba (University of Illinois at Urbana-Champaign). At the 5th IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 1-6, November 3-6, 2014. (Acceptance rate: 168/398 = 42.2%; in the Security and Privacy track, 41%) [ Presentation ] [Abstract ]
  2. DSN
    pSigene: Webcrawling to Generalize SQL Injection Signatures,” Distributed Secure Systems
    Gaspar Modelo-Howard, Fahad A. Arshad, Christopher Gutierrez, Saurabh Bagchi, and Alan Qi. At the 44th Annual IEEE/IFIP International Symposium on Dependable Systems and Networks (DSN), pp. 45-56, June 23 – 26, 2014 (Acceptance rate: 56/185 = 30.3%) [ Abstract ] [ Presentation ]

2013

2012

  1. ESORICS
    Privatus: Wallet-Friendly Privacy Protection for Smart Meters,” Distributed Secure Systems
    Jinkyu Koo, Xiaojun Lin, and Saurabh Bagchi. At the 17th European Symposium on Research in Computer Security (ESORICS), pp. 1-18, September 10-4, 2012, Pisa, Italy. (Acceptance rate: 50/248 = 20.2%) [ Presentation ] [ Abstract ]

2011

  1. SecureComm
    Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems,” Distributed Secure Systems
    Gaspar Modelo-Howard, Jevin Sweval, and Saurabh Bagchi, At the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), 20 pages (LNCS format), London, UK, Sep 7-9, 2011. (Acceptance rate: 23/95 = 24.2%) [ Abstract ] [Presentation ]
  2. SecureComm
    v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks,” Distributed Secure Systems
    Amiya Maji and Saurabh Bagchi, At the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), 20 pages (LNCS format), London, UK, Sep 7-9, 2011. (Acceptance rate: 23/95 = 24.2%) [ Abstract ] [Presentation ]

2010

2009

  1. DSN
    Spam Detection in Voice-over-IP Calls through Semi-Supervised Clustering“: Distributed Secure Systems
    Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, and Ratsameetip Wita. In: 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Lisbon, Portugal, pp. 307-316, June 29-July 2, 2009. (Acceptance rate: 63/260 = 24.2%) [ Presentation ] [ abstract ]
  2. INFOCOM
    Covert TCP/IP Timing Channels: Theory to Implementation“: Distributed Secure Systems
    Sarah Sellke, Chih-Chun Wang, Saurabh Bagchi, Ness Shroff. 28th Annual IEEE Conference on Computer Communications (INFOCOM), pp. 2204-2212, April 19-25 2009, Rio de Janeiro, Brazil. (Acceptance rate: 282/1435 = 19.7%). [ Presentation ] [ abstract ]
  3. IJIS
    Intrusion Detection in Voice-over-IP Environments“: Distributed Secure Systems
    Yu-Sung Wu, Vinita Apte, Saurabh Bagchi, Sachin Garg, Navjot Singh. Elsevier International Journal of Information Security (IJIS). [ abstract ]

2008

  1. SRDS
    Search for Efficiency in Automated Intrusion Response for Distributed Applications“: Distributed Secure Systems
    Yu-Sung Wu, Gaspar Modelo-Howard, Bingrui Foo, Saurabh Bagchi, Eugene Spafford. In: 27th International Symposium on Reliable Distributed Systems (SRDS), pp. 53-62, Naples, Italy, October 6-8, 2008. (Acceptance rate: 28/112 = 25%) [ presentation ] [ abstract ]
  2. RAID
    Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling“: Distributed Secure Systems
    Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon. In: 11th International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 271-290, Boston, MA, September 15-17, 2008. (Acceptance rate: 20/80 = 25%) [ presentation ] [ abstract ]

2007

  1. Capacity Bounds on Timing Channels with Bounded Service Times“: Distributed Secure Systems
    Sarah H. Sellke, Chih-Chun Wang, Ness Shroff, and Saurabh Bagchi. In: IEEE International Symposium on Information Theory, pp. 981-985, Nice, France, June 24-29, 2007.
    [ abstract ]
  2. Intrusion Response Systems: A Survey“: Distributed Secure Systems
    Bingrui Foo, Matthew W. Glause, Gaspar Modelo-Howard, Yu-Sung Wu, Saurabh Bagchi, and Eugene Spafford. Book chapter in “Information Assurance: Dependability and Security in Networked Systems”, pp. 377-416, Morgan Kaufmann Publishers. Publication date: Fall 2007. [ abstract ]
  3. Automated Adaptive Intrusion Containment in Systems of Interacting Services“, Distributed Secure Systems
    Yu-Sung Wu, Bingrui Foo, Yu-ChunMao, Saurabh Bagchi, Eugene Spafford. Elsevier Journal of Computer Networks, Volume 51, Issue 5, pp. 1334-1360, April 2007.
    [ abstract ]

2006

  1. Timing Channel Capacity for Uniform and Gaussian Servers,” Distributed Secure Systems
    Sarah Sellke, Ness B. Shroff, Saurabh Bagchi, and Chih-Chun Wang. Forty-Fourth Annual Allerton Conference On Communication, Control, and Computing, Sep 27-29, 2006, Allerton, IL, USA.
  2. DSN
    SPACEDIVE: A Distributed Intrusion Detection System for Voice-over-IP Environments,” Distributed Secure Systems
    Vinita Apte, Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, and Navjot Singh. Fast Abstract in the Supplemental Proceedings of the International Conference on Dependable Systems and Networks (DSN), June 25-28, 2006, Philadelphia, Pennsylvania, USA. [ Presentation ]

2005

  1. DSN
    ADEPTS: Adaptive Intrusion Response using Attack Graphs in an E-Commerce Environment,” Distributed Secure Systems
    Bingrui Foo , Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, and Eugene Spafford. International Conference on Dependable Systems and Networks (DSN), June 28- July 1, 2005, Yokohama, Japan. (Acceptance rate: DCCS track 54/204 ~ 26.8%) [ Camera ready ] [ Presentation ]
  2. DSN
    Modeling and Automated Containment of Worms,” Distributed Secure Systems
    Sarah Sellke, Ness B. Shroff, and Saurabh Bagchi. International Conference on Dependable Systems and Networks (DSN), June 28 – July 1, 2005, Yokohama, Japan. (Acceptance rate: DCCS track 54/204 ~ 26.8%) [ Camera ready ] [ Presentation ]

2004

  1. DSN
    SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments,” Distributed Secure Systems
    Saurabh Bagchi, Yu-Sung Wu (Purdue U. , USA); Sachin Garg, Navjot Singh, Tim Tsai (Avaya Labs, USA). IEEE Dependable Systems and Networks Conference (DSN 2004), June28-July 1, 2004, Florence, Italy. (Acceptance rate: DCCS track 58/276 ~ 21%).
    [ Camera ready ] [ Presentation ]
  2. ADEPTS: Adaptive Intrusion Containment in Distributed Service Environments,” Distributed Secure Systems
    Bingrui Foo, Yu-Sung Wu, Saurabh Bagchi, Gene Spafford, and Blake Matheny. CERIAS Tech Report 2004.

2003

  1. Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS,” Distributed Secure Systems
    Yu-Sung Wu, Bingrui Foo, Yongguo Mei, and Saurabh Bagchi. 19th Annual Computer Security Applications Conference, December 8-12, 2003, Las Vegas, Nevada, USA. (Acceptance rate: 36/110 ~ 32.7% ). [ Presentation ]
  2. ADEPTS: Adaptive Intrusion Containment and Response using Attack Graphs in an E-Commerce Environment,” Distributed Secure Systems
    Yu-Sung Wu, Bingrui Foo, Blake Matheny, Tyler Olsen, and Saurabh Bagchi. CERIAS Tech Report 2003-33.
Copyright notice: Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional
purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work
in other works must be obtained from the appropriate publisher (IEEE, ACM, Elsevier, etc.)

Last modified: April 1, 2024