Distributed Secure Systems

To view publications by project, click the buttons down below:

2020

  1. NDSS
    μRAI: Return Address Integrity for Embedded Systems,” Distributed Secure Systems
    Naif Saleh Almakhdhub (Purdue and King Saud University), Abraham A Clements (Sandia National Labs), Saurabh Bagchi, and Mathias Payer (EPFL). At the Network and Distributed System Security Symposium (NDSS), pp. 1–18, February 23-26, 2020. (Acceptance rate: 73/399 = 18.3%) [ Code ] [ Presentation ]
  2. Usenix Sec
    HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation,” Distributed Secure Systems
    Abraham A. Clements (Purdue & Sandia), Eric Gustafson (UCSB), Tobias Scharnowski (Ruhr University Bochum), Paul Grosen (UCSB), David Fritz (Sandia), Christopher Kruegel (UCSB), Giovanni Vigna (UCSB), Saurabh Bagchi, and Mathias Payer (EPFL). At the 29th USENIX Security Symposium (Usenix Sec), pp. 1-18, Aug 12-14, 2020, Boston, MA. (Acceptance rate: Not known till event) [ Artifact description ]

2019

  1. ACC
    The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems,” Distributed Secure Systems
    M Abdallah, P Naghizadeh, A Hota, T Cason, S Bagchi, S Sundaram. American Control Conference (ACC), 1—6.
  2. ECIR
    Misleading Metadata Detection on YouTube,” Distributed Secure Systems
    P Palod, A Patwari, S Bahety, S Bagchi, P Goyal. 41st European Conference on Information Retrieval (ECIR), pp. 1-6. (Acceptance rate: 44/151 = 29.1%)

2018

  1. Autonomous Robots
    Resilient Distributed State Estimation with Mobile Agents: Overcoming Byzantine Adversaries, Communication Losses, and Intermittent Measurements,” Distributed Secure Systems
    Aritra Mitra, John A. Richards (Sandia), Saurabh Bagchi, and Shreyas Sundaram. In Springer “Autonomous Robots” journal, Special Issue: Foundations of Resilience for Networked Robotic Systems, pp. 1-26, November 2018.
  2. USENIX Sec
    ACES: Automatic Compartments for Embedded Systems,” Distributed Secure Systems
    Abraham A. Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, and Mathias Payer. At the 27th USENIX Security Symposium (USENIX Sec), pp. 65-82, August 15-17, 2018, Baltimore, MD. (Acceptance rate: 100/524 = 19.1%) [ Presentation ]
  3. IFIP SEC
    A Hypergame Analysis for ErsatzPasswords,” Distributed Secure Systems
    Christopher Gutierrez, Mohammed Almeshekah, Eugene Spafford, and Saurabh Bagchi. Accepted to appear at the 33rd IFIP TC-11 International Conference on Information Security and Privacy Protection (IFIP SEC), pp. 1-14, September 18-20, Poznan, Poland. (Acceptance rate: 36%)
  4. TDSC
    Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks,” Distributed Secure Systems
    Christopher N. Gutierrez, Taegyu Kim, Raffaele Della Corte, Jeffrey Avery, Dan Goldwasser, Marcello Cinque, Saurabh Bagchi. Accepted to appear in IEEE Transactions on Dependable and Secure Computing (TDSC), pp. 1-17, 2018.
  5. CoSE
    Reactive Redundancy for Data Destruction Protection (R2D2),” Distributed Secure Systems
    Christopher Gutierrez, Eugene Spafford, Saurabh Bagchi, and Thomas Yurek. Accepted to appear in Elsevier Computers and Security (CoSE), pp. 1-16, 2018, notice of acceptance: December 2017.
  6. A Game-Theoretic Framework for Securing Interdependent Assets in Networks,” Distributed Secure Systems
    Ashish R. Hota, Abraham A. Clements, Saurabh Bagchi, Shreyas Sundaram, Book chapter in Springer “Game Theory for Security Risk Management: From Theory to Practice”, editors: Stefan Rass, Stefan Schauer, pp. 1-28, 2018.

2017

  1. MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks,” Distributed Secure Systems
    Subramaniyam Kannan, Paul Wood, Larry Deatrick (Northrop Grumman), Patricia Beane (Northrop Grumman),  Somali Chaterji, and Saurabh Bagchi, EAI Endorsed Transactions on Security and Safety 17(11): e4, pp. 1-14, December 2017.
  2. CIKM
    A Multi-Classifier System for Detecting Check-Worthy Statements in Political Debates,” Distributed Secure Systems
    Ayush Patwari, Dan Goldwasser and Saurabh Bagchi. Accepted to appear at the 26th ACM International Conference on Information and Knowledge Management (CIKM) (Short paper), pp. 1-4, Nov 6-10, 2017, Singapore. (Acceptance rate: 119/398 = 29.9% (short papers))
  3. Securecomm
    Topology-based Host-Level Attribution for Multi-Stage Attacks in Enterprise Systems using Software Defined Networks,” Distributed Secure Systems
    Subramaniyam Kannan, Paul Wood, Larry Deatrick (Northrop Grumman), Patricia Beane (Northrop Grumman), Somali Chaterji, and Saurabh Bagchi. At the 13th International Conference on Security and Privacy in Communication Networks (Securecomm), pp. 1-22, October 22-24, 2017, Niagara Falls, Canada. (Acceptance rate: 31/105 = 29.5% (full papers)) [ Presentation ]
  4. DSN
    RL_BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters,” Distributed Secure Systems
    Jinkyu Koo, Xiaojun Lin, and Saurabh Bagchi. In Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 519-530, Jun 26-29, 2017, Denver, Colorado. (Acceptance rate: 49/220 = 22.3% (regular papers)) [ Presentation ]
  5. Oakland/S&P
    Protecting Bare-metal Embedded Systems with Privilege Overlays,” Distributed Secure Systems
    Abraham A Clements, Naif Saleh Almakhdhub, Khaled Saab (Georgia Tech), Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, and Mathias Payer. In Proceedings of the IEEE International Symposium on Security and Privacy (Oakland/S&P), pp. 289-303, May 22-24, 2017, San Jose, California. (Acceptance rate: 60/450 = 13.3%) [ Abstract ] [ Presentation ] [ Video ]
  6. COMSNETS
    Profiting from Attacks on Real-Time Price Communications in Smart Grids,” Distributed Secure Systems
    Paul Wood, Saurabh Bagchi, and Alefiya Hussain (USC/ISI). At the 9th IEEE International Conference on Communication Systems and Networks (COMSNETS), pp. 1-8, Jan 4-8, 2017, Bangalore, India. (Acceptance rate: 49/192 = 25.5%) [ Presentation ]

2016

  1. GameSec
    Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets,” Distributed Secure Systems
    Ashish R. Hota, Abraham A. Clements, Shreyas Sundaram, and Saurabh Bagchi. At the 7th Conference on Decision and Game Theory for Security (GameSec), pp. 1-13, Nov 2-4, 2016, New York City, New York. [ Presentation ]

2015

  1. SRDS
    Denial of Service Elusion (DoSE): Keeping Clients Connected for Less“, Distributed Secure Systems
    Paul Wood, Christopher N. Gutierrez, and Saurabh Bagchi. At the 34th International Symposium on Reliable Distributed Systems (SRDS), pp. 1-10, September 28-October 1, 2015, Montreal, Canada. (Acceptance rate: 27/81 = 33%) [ Presentation ]

2014

  1. SmartGridComm
    A Risk Assessment Tool for Advanced Metering Infrastructures,” Distributed Secure Systems
    Tawfeeq Shawly, Jun Liu, Nathan Burow, Saurabh Bagchi, Robin Berthier (University of Illinois at Urbana-Champaign), and Rakesh B. Bobba (University of Illinois at Urbana-Champaign). At the 5th IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 1-6, November 3-6, 2014. (Acceptance rate: 168/398 = 42.2%; in the Security and Privacy track, 41%) [ Presentation ] [Abstract ]
  2. DSN
    pSigene: Webcrawling to Generalize SQL Injection Signatures,” Distributed Secure Systems
    Gaspar Modelo-Howard, Fahad A. Arshad, Christopher Gutierrez, Saurabh Bagchi, and Alan Qi. At the 44th Annual IEEE/IFIP International Symposium on Dependable Systems and Networks (DSN), pp. 45-56, June 23 – 26, 2014 (Acceptance rate: 56/185 = 30.3%) [ Abstract ] [ Presentation ]

2013

2012

  1. ESORICS
    Privatus: Wallet-Friendly Privacy Protection for Smart Meters,” Distributed Secure Systems
    Jinkyu Koo, Xiaojun Lin, and Saurabh Bagchi. At the 17th European Symposium on Research in Computer Security (ESORICS), pp. 1-18, September 10-4, 2012, Pisa, Italy. (Acceptance rate: 50/248 = 20.2%) [ Presentation ] [ Abstract ]

2011

  1. SecureComm
    Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems,” Distributed Secure Systems
    Gaspar Modelo-Howard, Jevin Sweval, and Saurabh Bagchi, At the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), 20 pages (LNCS format), London, UK, Sep 7-9, 2011. (Acceptance rate: 23/95 = 24.2%) [ Abstract ] [Presentation ]
  2. SecureComm
    v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks,” Distributed Secure Systems
    Amiya Maji and Saurabh Bagchi, At the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), 20 pages (LNCS format), London, UK, Sep 7-9, 2011. (Acceptance rate: 23/95 = 24.2%) [ Abstract ] [Presentation ]

2010

2009

  1. DSN
    Spam Detection in Voice-over-IP Calls through Semi-Supervised Clustering“: Distributed Secure Systems
    Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, and Ratsameetip Wita. In: 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Lisbon, Portugal, pp. 307-316, June 29-July 2, 2009. (Acceptance rate: 63/260 = 24.2%) [ Presentation ] [ abstract ]
  2. INFOCOM
    Covert TCP/IP Timing Channels: Theory to Implementation“: Distributed Secure Systems
    Sarah Sellke, Chih-Chun Wang, Saurabh Bagchi, Ness Shroff. 28th Annual IEEE Conference on Computer Communications (INFOCOM), pp. 2204-2212, April 19-25 2009, Rio de Janeiro, Brazil. (Acceptance rate: 282/1435 = 19.7%). [ Presentation ] [ abstract ]
  3. IJIS
    Intrusion Detection in Voice-over-IP Environments“: Distributed Secure Systems
    Yu-Sung Wu, Vinita Apte, Saurabh Bagchi, Sachin Garg, Navjot Singh. Elsevier International Journal of Information Security (IJIS). [ abstract ]

2008

  1. SRDS
    Search for Efficiency in Automated Intrusion Response for Distributed Applications“: Distributed Secure Systems
    Yu-Sung Wu, Gaspar Modelo-Howard, Bingrui Foo, Saurabh Bagchi, Eugene Spafford. In: 27th International Symposium on Reliable Distributed Systems (SRDS), pp. 53-62, Naples, Italy, October 6-8, 2008. (Acceptance rate: 28/112 = 25%) [ presentation ] [ abstract ]
  2. RAID
    Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling“: Distributed Secure Systems
    Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon. In: 11th International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 271-290, Boston, MA, September 15-17, 2008. (Acceptance rate: 20/80 = 25%) [ presentation ] [ abstract ]

2007

  1. Capacity Bounds on Timing Channels with Bounded Service Times“: Distributed Secure Systems
    Sarah H. Sellke, Chih-Chun Wang, Ness Shroff, and Saurabh Bagchi. In: IEEE International Symposium on Information Theory, pp. 981-985, Nice, France, June 24-29, 2007.
    [ abstract ]
  2. Intrusion Response Systems: A Survey“: Distributed Secure Systems
    Bingrui Foo, Matthew W. Glause, Gaspar Modelo-Howard, Yu-Sung Wu, Saurabh Bagchi, and Eugene Spafford. Book chapter in “Information Assurance: Dependability and Security in Networked Systems”, pp. 377-416, Morgan Kaufmann Publishers. Publication date: Fall 2007. [ abstract ]
  3. Automated Adaptive Intrusion Containment in Systems of Interacting Services“, Distributed Secure Systems
    Yu-Sung Wu, Bingrui Foo, Yu-ChunMao, Saurabh Bagchi, Eugene Spafford. Elsevier Journal of Computer Networks, Volume 51, Issue 5, pp. 1334-1360, April 2007.
    [ abstract ]

2006

  1. Timing Channel Capacity for Uniform and Gaussian Servers,” Distributed Secure Systems
    Sarah Sellke, Ness B. Shroff, Saurabh Bagchi, and Chih-Chun Wang. Forty-Fourth Annual Allerton Conference On Communication, Control, and Computing, Sep 27-29, 2006, Allerton, IL, USA.
  2. DSN
    SPACEDIVE: A Distributed Intrusion Detection System for Voice-over-IP Environments,” Distributed Secure Systems
    Vinita Apte, Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, and Navjot Singh. Fast Abstract in the Supplemental Proceedings of the International Conference on Dependable Systems and Networks (DSN), June 25-28, 2006, Philadelphia, Pennsylvania, USA. [ Presentation ]

2005

  1. DSN
    ADEPTS: Adaptive Intrusion Response using Attack Graphs in an E-Commerce Environment,” Distributed Secure Systems
    Bingrui Foo , Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, and Eugene Spafford. International Conference on Dependable Systems and Networks (DSN), June 28- July 1, 2005, Yokohama, Japan. (Acceptance rate: DCCS track 54/204 ~ 26.8%) [ Camera ready ] [ Presentation ]
  2. DSN
    Modeling and Automated Containment of Worms,” Distributed Secure Systems
    Sarah Sellke, Ness B. Shroff, and Saurabh Bagchi. International Conference on Dependable Systems and Networks (DSN), June 28 – July 1, 2005, Yokohama, Japan. (Acceptance rate: DCCS track 54/204 ~ 26.8%) [ Camera ready ] [ Presentation ]

2004

  1. DSN
    SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments,” Distributed Secure Systems
    Saurabh Bagchi, Yu-Sung Wu (Purdue U. , USA); Sachin Garg, Navjot Singh, Tim Tsai (Avaya Labs, USA). IEEE Dependable Systems and Networks Conference (DSN 2004), June28-July 1, 2004, Florence, Italy. (Acceptance rate: DCCS track 58/276 ~ 21%).
    [ Camera ready ] [ Presentation ]
  2. ADEPTS: Adaptive Intrusion Containment in Distributed Service Environments,” Distributed Secure Systems
    Bingrui Foo, Yu-Sung Wu, Saurabh Bagchi, Gene Spafford, and Blake Matheny. CERIAS Tech Report 2004.

2003

  1. Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS,” Distributed Secure Systems
    Yu-Sung Wu, Bingrui Foo, Yongguo Mei, and Saurabh Bagchi. 19th Annual Computer Security Applications Conference, December 8-12, 2003, Las Vegas, Nevada, USA. (Acceptance rate: 36/110 ~ 32.7% ). [ Presentation ]
  2. ADEPTS: Adaptive Intrusion Containment and Response using Attack Graphs in an E-Commerce Environment,” Distributed Secure Systems
    Yu-Sung Wu, Bingrui Foo, Blake Matheny, Tyler Olsen, and Saurabh Bagchi. CERIAS Tech Report 2003-33.
Copyright notice: Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional
purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work
in other works must be obtained from the appropriate publisher (IEEE, ACM, Elsevier, etc.)

Last modified: January 13, 2021