{"id":2098,"date":"2020-08-12T23:07:36","date_gmt":"2020-08-13T03:07:36","guid":{"rendered":"https:\/\/engineering.purdue.edu\/dcsl\/?page_id=2098"},"modified":"2026-02-21T15:31:54","modified_gmt":"2026-02-21T19:31:54","slug":"distributed-secure-systems","status":"publish","type":"page","link":"https:\/\/engineering.purdue.edu\/dcsl\/publications-by-year\/distributed-secure-systems\/","title":{"rendered":"Distributed Secure Systems"},"content":{"rendered":"<p style=\"text-align: left;\">To view publications by project, click the buttons down below:<\/p>\n<div class=\"btn-group-vertical\" style=\"text-align: left;\" role=\"group\" aria-label=\"Publication by Project\"><a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications-by-year\/\"><button class=\"btn btn-primary\" type=\"button\">All Publications<\/button><\/a><br \/>\n<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications-by-year\/fault-tolerance-for-distributed-applications\/\"><button class=\"btn btn-primary\" type=\"button\">Fault Tolerance for Distributed Applications<\/button><\/a><br \/>\n<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/resilient-wireless-networks\/\"><button class=\"btn btn-primary\" type=\"button\">Resilient Wireless Networks<\/button><\/a><br \/>\n<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications-by-year\/distributed-secure-systems\/\"><button class=\"btn btn-primary\" type=\"button\">Distributed Secure Systems<\/button><\/a><br \/>\n<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications-by-year\/resilient-ai\/\"><button class=\"btn btn-primary\" type=\"button\">Resilient AI<\/button><\/a><br \/>\n<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications-by-year\/phd-theses\/\"><button class=\"btn btn-primary\" type=\"button\">PhD Theses by DCSL Members<\/button><\/a><br \/>\n<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications-by-year\/miscellaneous\/\"><button class=\"btn btn-primary\" type=\"button\">Miscellaneous<\/button><\/a><\/div>\n<h2>2025<\/h2>\n<ol>\n<li><strong>DSN-W<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2025\/Lightweight_Reputation-Based_Mechanism_DSN-W25.pdf\">A Lightweight Reputation-Based Mechanism for Incentivizing Cooperation in Decentralized Federated Learning<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nKavindu Herath, Suraj Mahangade, and Saurabh Bagchi. In 2025 55th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops <strong>(DSN-W)<\/strong>, pp. 298-304, June 23-26, 2025.<\/li>\n<li><strong>SAC<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2025\/detection-of-device-triggerable-vulnerabilities-SAC25.pdf\">Detection of Device Triggerable Vulnerabilities in Android Companion Apps through Interactive Triaging<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nAditya Vardhan Padala, Saurabh Bagchi, and Aravind Kumar Machiry. In Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing <strong>(SAC)<\/strong>, pp. 1877-1885, March 31-April 4, 2025. (Acceptance rate: 216\/939 = 23.0%)<\/li>\n<\/ol>\n<h2>2024<\/h2>\n<ol>\n<li><strong>CCS<br \/>\n<\/strong><span style=\"font-weight: 400;\">&#8220;<\/span><a href=\"https:\/\/reitermk.github.io\/papers\/2024\/CCS1.pdf\"><span style=\"font-weight: 400;\">Random beacons in monte carlo: Efficient asynchronous random beacon without threshold cryptography<\/span><\/a><span style=\"font-weight: 400;\">.&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><\/span><br \/>\n<span style=\"font-weight: 400;\">Bandarupalli, Akhil, Adithya Bhat, Saurabh Bagchi, Aniket Kate, and Michael K. Reiter. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security <b>(CCS)<\/b>, pp. 2621-2635. 2024.<\/span><\/li>\n<li><strong>IEEE S&amp;P<br \/>\n<\/strong><span style=\"font-weight: 400;\">&#8220;<\/span><a href=\"https:\/\/engineering.purdue.edu\/dcsl\/wp-content\/uploads\/2025\/02\/Game_Theory_in_Distributed_Systems_Security_Foundations_Challenges_and_Future_Directions.pdf\"><span style=\"font-weight: 400;\">Game theory in distributed systems security: Foundations, challenges, and future directions<\/span><\/a><span style=\"font-weight: 400;\">.&#8221; <\/span><span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\n<span style=\"font-weight: 400;\">Abdallah, Mustafa, Saurabh Bagchi, Shaunak D. Bopardikar, Kevin Chan, Xing Gao, Murat Kantarcioglu, Congmiao Li, Peng Liu, and Quanyan Zhu<\/span>. <span style=\"font-weight: 400;\">IEEE Security &amp; Privacy Magazine (2024).<\/span><\/li>\n<li><strong>S&amp;P<\/strong><br \/>\n&#8220;<a href=\"https:\/\/arxiv.org\/abs\/2303.12233\">LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nJoshua Christian Zhao, Atul Sharma, \u00a0Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, and Saurabh Bagchi. Accepted to appear at the 45th IEEE Symposium on Security and Privacy (S&amp;P), pp. 1-19, San Francisco, CA, May 2024. (Acceptance rate: 261\/1463 = 17.8%)<\/li>\n<li><strong>CVPR<\/strong><br \/>\n&#8220;Leak and Learn: An Attacker\u2019s Cookbook to Train Using Leaked Data from Federated Learning,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nJoshua C. Zhao, Ahaan Dabholkar, Atul Sharma, and Saurabh Bagchi. Accepted to appear at the Thirty-Fourth IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1-10, Seattle, WA, June 17-21, 2024. (Acceptance rate: )<\/li>\n<li><strong>S&amp;P<\/strong><br \/>\n&#8220;<a href=\"https:\/\/arxiv.org\/abs\/2401.14635\">Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nTaylor R. Schorlemmer, Kelechi G. Kalu, Luke Chigges, Kyung Myung Ko, Eman Abdul-Muhd Abu Ishgair, Saurabh Bagchi, Santiago Torres-Arias, and James C. Davis. Accepted to appear at the 45th IEEE Symposium on Security and Privacy (S&amp;P), pp. 1-19, San Francisco, CA, May 2024. (Acceptance rate: 261\/1463 = 17.8%)<\/li>\n<\/ol>\n<h2>2023<\/h2>\n<ol>\n<li><b>AsiaCCS<\/b><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2023\/flair-asiaccs23.pdf\">FLAIR: Defense against Model Poisoning Attack in Federated Learning<\/a>,&#8221; <span class=\" authors\"><span class=\"badge badge-danger\">Distributed Secure Systems<\/span><\/span><br \/>\nAtul Sharma, Wei Chen, Joshua Zhao, Qiang Qiu, Saurabh Bagchi, and Somali Chaterji. To appear at the 18th ACM ASIA Conference on Computer and Communications Security (ASIACCS), pp. 553-566, July 2023. (Acceptance rate: 32\/200 = 16.0%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2023\/flair-asiaccs23-abstract.txt\">Abstract<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2023\/FLAIR-AsiaCCS-23-final.pdf\">Slides<\/a> ]<\/li>\n<li><strong>CVPR<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2023\/flprivacy-cvpr23.pdf\">The Resource Problem of Using Linear Layer Leakage Attack in Federated Learning<\/a>,&#8221;<span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nJoshua Christian Zhao; Ahmed Roushdy Elkordy (University of Southern California); Atul Sharma; Yahya H. Ezzeldin, Salman Avestimehr (University of Southern California); Saurabh Bagchi. Accepted to the IEEE \/ CVF Computer Vision and Pattern Recognition Conference (CVPR), pp. 3974-3983, Vancouver, Canada, June 18-23, 2023. (Acceptance rate: 2360\/9155 = 25.8%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2023\/llleakage-cvpr23-abstract.txt\">Abstract<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2023\/flprivacy-cvpr23-supplementary.pdf\">Supplementary<\/a> ]<\/li>\n<li><strong>FC23<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2023\/ucr-fc23.pdf\">The Unique Chain Rule and its Applications<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nAdithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate; Michael K. Reiter (Duke University). At the 27th International Conference on Financial Cryptography and Data Security (FC), pp. 1-27, May 2023. (Acceptance rate: 41\/182 = 22.5%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2023\/chainrule-fc23-abstract.txt\">Abstract<\/a> ]<\/li>\n<\/ol>\n<h2>2022<\/h2>\n<ol>\n<li><strong>ISSREW<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2023\/firmware-issrew23.pdf\">An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware Dependencies<\/a>,&#8221; <span class=\" authors\"><span class=\"badge badge-danger\">Distributed Secure Systems<\/span><\/span><br \/>\nAustin Ketterer, Asha Shekar, Edgardo Barsallo Yi, Saurabh Bagchi, Abraham Clements. At the 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 19-24, October-November 2022. (Acceptance rate: 47\/162 = 29%)<\/li>\n<li><b>IEEE S&amp;P<\/b><br \/>\n<span class=\" authors\">&#8220;TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nMustafa Abdallah, Daniel Woods; Parinaz Naghizadeh (Ohio State University); Issa Khalil (Qatar Computing Research Institute (QCRI), HBKU); Timothy Cason, Shreyas Sundaram, Saurabh Bagchi. Accepted to the 43rd IEEE Symposium on Security and Privacy (S&amp;P 2022). (Acceptance rate: 57\/407 = 14.0% (in 3rd reviewing cycle))\u00a0<\/span><\/li>\n<li><b>AIStats<\/b><br \/>\n&#8220;Can we Generalize and Distribute Private Representation Learning?,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nSheikh Shams Azam; Taejin Kim (Carnegie Mellon University); Seyyedali Hosseinalipour; Carlee Joe-Wong (Carnegie Mellon University); Saurabh Bagchi, Christopher Brinton. Accepted to appear at the 25th International Conference on Artificial Intelligence and Statistics (AIStats 2022). (Acceptance rate: 492\/1685 = 29.2%)<\/li>\n<\/ol>\n<h2>2021<\/h2>\n<ol>\n<li><b>ASIACCS<\/b><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2020\/morshed_asiaccs21.pdf\">Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nMustafa Abdallah, Daniel Woods, Parinaz Naghizadeh (Ohio State University), Issa Khalil (Qatar Computing Research Institute (QCRI)), Timothy Cason, Shreyas Sundaram, and Saurabh Bagchi. <span class=\" authors\">Accepted to appear at the 16th ACM Asia Conference on Computer and Communications Security (ASIACCS), pp. 1&#8211;15, 2021. (Acceptance rate: 28\/157 = 17.8%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2021\/morshed_asiaccs21_slides.pdf\">Slides<\/a> ] [ <a href=\"https:\/\/drive.google.com\/file\/d\/1NqpNYsISCsNLAut9AActyoJaZL9UeD79\/view\">Video presentation<\/a> ]\n<\/span><\/li>\n<li><b>SafeThings<\/b><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2021\/hybrid-modeling_safethings21.pdf\">Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nMustafa Abdallah, Sayan Mitra (UIUC), Shreyas Sundaram, and Saurabh Bagchi. <span class=\" authors\">Accepted to appear at the IEEE Workshop on the Internet of Safe Things (SafeThings), co-located with Oakland\/Security and Privacy, pp. 1&#8211;6, May 2021.<\/span><\/li>\n<li><b>SPIE<\/b><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2021\/hawkeye_spie21.pdf\">HAWKEYE: Adversarial Example Detection through Ensemble Detectors<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nRuqi Bai, Jinkyu Koo (NVIDIA), Heron Teegarden, Michael Roth (Google), Kevin Chan (ARL), David I. Inouye, and Saurabh Bagchi. <span class=\" authors\">Accepted to appear at the SPIE Defense and Commercial Sensing Symposium, pp. 1&#8211;15, April 2021. <\/span><span class=\" authors\">\u00a0<\/span><\/li>\n<\/ol>\n<h2>2020<\/h2>\n<ol>\n<li><b>NeurIPS<\/b><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2020\/feature-shift_neurips20.pdf\">Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nSean M. Kulinski, Saurabh Bagchi, and David I. Inouye. At the 34th Conference on Neural Information Processing Systems (NeurIPS), pp. 1&#8211;11, November 2020. <span class=\" authors\">(Acceptance rate: 1900\/9454 = 20.1%) [ <a href=\"https:\/\/neurips.cc\/virtual\/2020\/protected\/poster_e2d52448d36918c575fa79d88647ba66.html\">Video<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2020\/feature-shift_neurips20.ppsx\">Slides<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2020\/feature-shift_neurips20_poster.png\">Poster<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2020\/feature-shift_neurips20_supplement.pdf\">Supplement<\/a> ]\n<\/span><\/li>\n<li><b>CSUR<\/b><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2020\/firmware-analysis_csur_2020.pdf\">Challenges in Firmware Re-Hosting and Analysis<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\n<span class=\" authors\">Christopher Wright, William A. Moeglein (Sandia National Lab), Saurabh Bagchi, Milind Kulkarni, and Abraham A. Clements (Sandia National Lab)<\/span>. Accepted to appear in the ACM Computing Surveys (CSUR), pp. 1-37, acceptance date: September 2020.<\/li>\n<li><b>TCNS<\/b><br \/>\n&#8220;<a class=\"gsc_vcd_title_link\" href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2020\/game-theory-security_tcns20.pdf\" data-clk=\"hl=en&amp;sa=T&amp;ei=UACCX5aRAdqEy9YPoZiauAE\">Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nMustafa Abdallah, Parinaz Naghizadeh (Ohio State University), Ashish R Hota (Indian Institute of Technology Kharagpur), Timothy Cason, Saurabh Bagchi, and Shreyas Sundaram. Accepted to appear in IEEE Transactions on Control of Network Systems (TCNS), pp. 1&#8211;12, 2020.<\/li>\n<li><strong>NDSS<\/strong><br \/>\n\u201c<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2020\/uRAI_ndss20_cameraready.pdf\">\u03bcRAI: Return Address Integrity for Embedded Systems<\/a>,\u201d <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nNaif Saleh Almakhdhub (Purdue and King Saud University), Abraham A Clements (Sandia National Labs), Saurabh Bagchi, and Mathias Payer (EPFL). At the Network and Distributed System Security Symposium (NDSS), pp. 1\u201318, February 23-26, 2020. (Acceptance rate: 73\/399 = 18.3%) [ <a href=\"https:\/\/github.com\/embedded-sec\/uRAI\">Code<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2020\/uRAI_ndss20.ppsx\">Presentation<\/a> ]<\/li>\n<li><strong>Usenix Sec<\/strong><br \/>\n\u201c<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2019\/halucinator_usenixsec20_cameraready.pdf\">HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation<\/a>,\u201d <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nAbraham A. Clements (Purdue &amp; Sandia), Eric Gustafson (UCSB), Tobias Scharnowski (Ruhr University Bochum), Paul Grosen (UCSB), David Fritz (Sandia), Christopher Kruegel (UCSB), Giovanni Vigna (UCSB), Saurabh Bagchi, and Mathias Payer (EPFL). At the 29th USENIX Security Symposium (Usenix Sec), pp. 1-18, Aug 12-14, 2020, Boston, MA. (Acceptance rate: Not known till event) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2019\/halucinator_usenixsec20_artifact.pdf\">Artifact description<\/a> ]<\/li>\n<\/ol>\n<h2>2019<\/h2>\n<ol>\n<li><strong>ACC<\/strong><br \/>\n\u201c<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2019\/final_behavioral-game-theory_acc19_cameraready.pdf\">The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems<\/a>,\u201d <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nM Abdallah, P Naghizadeh, A Hota, T Cason, S Bagchi, S Sundaram. American Control Conference (ACC), 1\u20146.<\/li>\n<li><strong>ECIR<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2019\/misleading_metadata_youtube.pdf\">Misleading Metadata Detection on YouTube<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nP Palod, A Patwari, S Bahety, S Bagchi, P Goyal. 41st European Conference on Information Retrieval (ECIR), pp. 1-6. (Acceptance rate: 44\/151 = 29.1%)<\/li>\n<\/ol>\n<h2>2018<\/h2>\n<ol>\n<li><strong>Autonomous Robots<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2018\/final_sensor-scheduling_autonomous-robots18.pdf\">Resilient Distributed State Estimation with Mobile Agents: Overcoming Byzantine Adversaries, Communication Losses, and Intermittent Measurements<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nAritra Mitra, John A. Richards (Sandia), Saurabh Bagchi, and Shreyas Sundaram. In Springer &#8220;Autonomous Robots&#8221; journal, Special Issue: Foundations of Resilience for Networked Robotic Systems, pp. 1-26, November 2018.<\/li>\n<li><strong>USENIX Sec<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2018\/final_aces_usenixsec18_cameraready.pdf\">ACES: Automatic Compartments for Embedded Systems<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nAbraham A. Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, and Mathias Payer. At the 27th USENIX Security Symposium (USENIX Sec), pp. 65-82, August 15-17, 2018, Baltimore, MD. (Acceptance rate: 100\/524 = 19.1%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2018\/aces_usenixsec18.pptx\">Presentation<\/a> ]<\/li>\n<li><strong>IFIP SEC<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2018\/final_hypergame-ersatz-password_sec18_submitted.pdf\">A Hypergame Analysis for ErsatzPasswords<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nChristopher Gutierrez, Mohammed Almeshekah, Eugene Spafford, and Saurabh Bagchi. Accepted to appear at the 33rd IFIP TC-11 International Conference on Information Security and Privacy Protection (IFIP SEC), pp. 1-14, September 18-20, Poznan, Poland. (Acceptance rate: 36%)<\/li>\n<li><strong>TDSC<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2018\/final_phising-detection_tdsc18.pdf\">Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nChristopher N. Gutierrez, Taegyu Kim, Raffaele Della Corte, Jeffrey Avery, Dan Goldwasser, Marcello Cinque, Saurabh Bagchi. Accepted to appear in IEEE Transactions on Dependable and Secure Computing (TDSC), pp. 1-17, 2018.<\/li>\n<li><strong>CoSE<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2018\/final_reactive-redundancy-data_accepted.pdf\">Reactive Redundancy for Data Destruction Protection (R2D2)<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nChristopher Gutierrez, Eugene Spafford, Saurabh Bagchi, and Thomas Yurek. Accepted to appear in Elsevier Computers and Security (CoSE), pp. 1-16, 2018, notice of acceptance: December 2017.<\/li>\n<li>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2018\/final_game-theory-security_springerbook18.pdf\">A Game-Theoretic Framework for Securing Interdependent Assets in Networks<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nAshish R. Hota, Abraham A. Clements, Saurabh Bagchi, Shreyas Sundaram, Book chapter in Springer &#8220;Game Theory for Security Risk Management: From Theory to Practice&#8221;, editors: Stefan Rass, Stefan Schauer, pp. 1-28, 2018.<\/li>\n<\/ol>\n<h2>2017<\/h2>\n<ol>\n<li>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2017\/final_maat_transactions18-security-n-safety.pdf\">MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nSubramaniyam Kannan, Paul Wood, Larry Deatrick (Northrop Grumman), Patricia Beane (Northrop Grumman),\u00a0 Somali Chaterji, and Saurabh Bagchi, EAI Endorsed Transactions on Security and Safety 17(11): e4, pp. 1-14, December 2017.<\/li>\n<li><strong>CIKM<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2017\/final_tathya_cikm17_cameraready.pdf\">A Multi-Classifier System for Detecting Check-Worthy Statements in Political Debates<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nAyush Patwari, Dan Goldwasser and Saurabh Bagchi. Accepted to appear at the 26th ACM International Conference on Information and Knowledge Management (CIKM) (Short paper), pp. 1-4, Nov 6-10, 2017, Singapore. (Acceptance rate: 119\/398 = 29.9% (short papers))<\/li>\n<li><strong>Securecomm<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2017\/final_tophat_securecomm17_submitted.pdf\">Topology-based Host-Level Attribution for Multi-Stage Attacks in Enterprise Systems using Software Defined Networks<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nSubramaniyam Kannan, Paul Wood, Larry Deatrick (Northrop Grumman), Patricia Beane (Northrop Grumman), Somali Chaterji, and Saurabh Bagchi. At the 13th International Conference on Security and Privacy in Communication Networks (Securecomm), pp. 1-22, October 22-24, 2017, Niagara Falls, Canada. (Acceptance rate: 31\/105 = 29.5% (full papers)) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2017\/securecomm_presentation_skannan_final.pdf\">Presentation<\/a> ]<\/li>\n<li><strong>DSN<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2017\/final_smart-grid-privacy_dsn17_cameraready.pdf\">RL_BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nJinkyu Koo, Xiaojun Lin, and Saurabh Bagchi. In Proceedings of the 47th IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 519-530, Jun 26-29, 2017, Denver, Colorado. (Acceptance rate: 49\/220 = 22.3% (regular papers)) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2017\/final_dsn17_rl-blh_jinkyu.pdf\">Presentation<\/a> ]<\/li>\n<li><strong>Oakland\/S&amp;P<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2017\/final_oakland17-epoxy_cameraready.pdf\">Protecting Bare-metal Embedded Systems with Privilege Overlays<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nAbraham A Clements, Naif Saleh Almakhdhub, Khaled Saab (Georgia Tech), Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, and Mathias Payer. In Proceedings of the IEEE International Symposium on Security and Privacy (Oakland\/S&amp;P), pp. 289-303, May 22-24, 2017, San Jose, California. (Acceptance rate: 60\/450 = 13.3%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2017\/embeddedsecurity_oakland17_abstract.txt\">Abstract<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2017\/final_oakland17-epoxy_presentation.pptx\">Presentation<\/a> ] [ <a href=\"https:\/\/www.youtube.com\/watch?v=Aumoz190wHM\">Video<\/a> ]<\/li>\n<li><strong>COMSNETS<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2017\/final_smartgridattacks_comsnets17_cameraready.pdf\">Profiting from Attacks on Real-Time Price Communications in Smart Grids<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nPaul Wood, Saurabh Bagchi, and Alefiya Hussain (USC\/ISI). At the 9th IEEE International Conference on Communication Systems and Networks (COMSNETS), pp. 1-8, Jan 4-8, 2017, Bangalore, India. (Acceptance rate: 49\/192 = 25.5%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2017\/final_COMSNETS17_CPS_sbagchi.pdf\">Presentation<\/a> ]<\/li>\n<\/ol>\n<h2>2016<\/h2>\n<ol>\n<li><strong>GameSec<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2016\/final_strategicadversary_gamesec16.pdf\">Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nAshish R. Hota, Abraham A. Clements, Shreyas Sundaram, and Saurabh Bagchi. At the 7th Conference on Decision and Game Theory for Security (GameSec), pp. 1-13, Nov 2-4, 2016, New York City, New York. [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2016\/gamesec16_interdependentgames.pdf\">Presentation<\/a> ]<\/li>\n<\/ol>\n<h2>2015<\/h2>\n<ol class=\"style12\">\n<li><strong>SRDS<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2015\/dose_srds15.pdf\">Denial of Service Elusion (DoSE): Keeping Clients Connected for Less<\/a>&#8220;, <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nPaul Wood, Christopher N. Gutierrez, and Saurabh Bagchi. At the 34th International Symposium on Reliable Distributed Systems (SRDS), pp. 1-10, September 28-October 1, 2015, Montreal, Canada. (Acceptance rate: 27\/81 = 33%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2015\/srds15_dose.pptx\">Presentation<\/a> ]<\/li>\n<\/ol>\n<h2>2014<\/h2>\n<ol class=\"style12\">\n<li>\n<div><strong>SmartGridComm<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2014\/smartmeterattack_nathan_smartgridcomm14.pdf\">A Risk Assessment Tool for Advanced Metering Infrastructures<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nTawfeeq Shawly, Jun Liu, Nathan Burow, Saurabh Bagchi, Robin Berthier (University of Illinois at Urbana-Champaign), and Rakesh B. Bobba (University of Illinois at Urbana-Champaign). At the 5th IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 1-6, November 3-6, 2014. (Acceptance rate: 168\/398 = 42.2%; in the Security and Privacy track, 41%) [ Presentation ] [<a class=\"ShowAsLink\">Abstract<\/a> ]<\/div>\n<\/li>\n<li>\n<div id=\"wrapper5\"><strong>DSN<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2014\/psigene_gaspar_dsn14.pdf\">pSigene: Webcrawling to Generalize SQL Injection Signatures<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nGaspar Modelo-Howard, Fahad A. Arshad, Christopher Gutierrez, Saurabh Bagchi, and Alan Qi. At the 44th Annual IEEE\/IFIP International Symposium on Dependable Systems and Networks (DSN), pp. 45-56, June 23 &#8211; 26, 2014 (Acceptance rate: 56\/185 = 30.3%) [ <a class=\"ShowAsLink\">Abstract<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2014\/psigene_dsn14_pres.pptx\">Presentation<\/a> ]<\/div>\n<\/li>\n<\/ol>\n<h2>2013<\/h2>\n<h2>2012<\/h2>\n<ol class=\"style12\">\n<li>\n<div id=\"wrapper5\"><strong>ESORICS<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2012\/smartmeter_esorics12.pdf\">Privatus: Wallet-Friendly Privacy Protection for Smart Meters<\/a>,&#8221;\u009d <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nJinkyu Koo, Xiaojun Lin, and Saurabh Bagchi. At the 17th European Symposium on Research in Computer Security (ESORICS), pp. 1-18, September 10-4, 2012, Pisa, Italy. (Acceptance rate: 50\/248 = 20.2%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2012\/smartmeter_esorics12_pres.pdf\">Presentation<\/a> ] [ <a class=\"ShowAsLink\">Abstract<\/a> ]<\/div>\n<\/li>\n<\/ol>\n<h2>2011<\/h2>\n<ol class=\"style12\">\n<li><strong>SecureComm<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2011\/gmodeloh-securecomm11-cr.pdf\">Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nGaspar Modelo-Howard, Jevin Sweval, and Saurabh Bagchi, At the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), 20 pages (LNCS format), London, UK, Sep 7-9, 2011. (Acceptance rate: 23\/95 = 24.2%) [ <a class=\"ShowAsLink\">Abstract<\/a> ] [<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2011\/gmodeloh-securecomm-presentation.pdf\">Presentation<\/a> ]<\/li>\n<li><strong>SecureComm<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2011\/securecomm11_cbps.pdf\">v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nAmiya Maji and Saurabh Bagchi, At the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), 20 pages (LNCS format), London, UK, Sep 7-9, 2011. (Acceptance rate: 23\/95 = 24.2%) [ <a class=\"ShowAsLink\">Abstract<\/a> ] [<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2011\/v-CAPS_amaji_presentation.pdf\">Presentation<\/a> ]<\/li>\n<\/ol>\n<h2>2010<\/h2>\n<h2>2009<\/h2>\n<ol class=\"style10\">\n<li>\n<div id=\"wrapper\"><strong>DSN<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2009\/spam-detection-dsn2009-rev-v13.pdf\">Spam Detection in Voice-over-IP Calls through Semi-Supervised Clustering<\/a>&#8220;: <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nYu-Sung Wu, Saurabh Bagchi, Navjot Singh, and Ratsameetip Wita. In: 39th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), Lisbon, Portugal, pp. 307-316, June 29-July 2, 2009. (Acceptance rate: 63\/260 = 24.2%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2009\/voip_spit_detection_dsn09.pdf\">Presentation<\/a> ] [ <a class=\"ShowAsLink\">abstract<\/a> ]<\/div>\n<\/li>\n<li>\n<div><strong>INFOCOM<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2009\/timingchannel_infocom09_submit.pdf\">Covert TCP\/IP Timing Channels: Theory to Implementation<\/a>&#8220;: <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nSarah Sellke, Chih-Chun Wang, Saurabh Bagchi, Ness Shroff. 28th Annual IEEE Conference on Computer Communications (INFOCOM), pp. 2204-2212, April 19-25 2009, Rio de Janeiro, Brazil. (Acceptance rate: 282\/1435 = 19.7%). [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2009\/timingchannels_infocom09.pdf\">Presentation<\/a> ] [ <a class=\"ShowAsLink\">abstract<\/a> ]<\/div>\n<\/li>\n<li>\n<div id=\"wrapper\"><strong>IJIS<\/strong><br \/>\n&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2009\/voipids_ijis09_submit.pdf\">Intrusion Detection in Voice-over-IP Environments<\/a>&#8220;: <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nYu-Sung Wu, Vinita Apte, Saurabh Bagchi, Sachin Garg, Navjot Singh. Elsevier International Journal of Information Security (IJIS). [ <a class=\"ShowAsLink\">abstract<\/a> ]<\/div>\n<\/li>\n<\/ol>\n<h2>2008<\/h2>\n<ol>\n<li><strong>SRDS<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2008\/adepts_srds08_submit.pdf\">Search for Efficiency in Automated Intrusion Response for Distributed Applications<\/a>&#8220;: <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nYu-Sung Wu, Gaspar Modelo-Howard, Bingrui Foo, Saurabh Bagchi, Eugene Spafford. In: 27th International Symposium on Reliable Distributed Systems (SRDS), pp. 53-62, Naples, Italy, October 6-8, 2008. (Acceptance rate: 28\/112 = 25%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2008\/swift_srds08_presentation.pdf\">presentation<\/a> ] [ <a class=\"ShowAsLink\">abstract<\/a> ]<\/li>\n<li><strong>RAID<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2008\/gmodeloh-RAID08.pdf\">Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling<\/a>&#8220;: <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nGaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon. In: 11th International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 271-290, Boston, MA, September 15-17, 2008. (Acceptance rate: 20\/80 = 25%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2008\/s5-3-Modelo-DeterminingPlacement.pdf\">presentation<\/a> ]\n[ <a class=\"ShowAsLink\">abstract<\/a> ]<\/li>\n<\/ol>\n<h2>2007<\/h2>\n<ol>\n<li>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2007\/tmchannel_cameraready.pdf\">Capacity Bounds on Timing Channels with Bounded Service Times<\/a>&#8220;: <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nSarah H. Sellke, Chih-Chun Wang, Ness Shroff, and Saurabh Bagchi. In: IEEE International Symposium on Information Theory, pp. 981-985, Nice, France, June 24-29, 2007.<br \/>\n[ <a class=\"ShowAsLink\">abstract<\/a> ]<\/li>\n<li>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2007\/wiley_irssurvey.pdf\">Intrusion Response Systems: A Survey<\/a>&#8220;: <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nBingrui Foo, Matthew W. Glause, Gaspar Modelo-Howard, Yu-Sung Wu, Saurabh Bagchi, and Eugene Spafford. Book chapter in &#8220;Information Assurance: Dependability and Security in Networked Systems&#8221;, pp. 377-416, Morgan Kaufmann Publishers. Publication date: Fall 2007. [ <a class=\"ShowAsLink\">abstract<\/a> ]<\/li>\n<li>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2007\/adepts_jcn06_cameraready.pdf\">Automated Adaptive Intrusion Containment in Systems of Interacting Services<\/a>&#8220;, <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nYu-Sung Wu, Bingrui Foo, Yu-ChunMao, Saurabh Bagchi, Eugene Spafford. Elsevier Journal of Computer Networks, Volume 51, Issue 5, pp. 1334-1360, April 2007.<br \/>\n[ <a class=\"ShowAsLink\">abstract<\/a> ]<\/li>\n<\/ol>\n<h2>2006<\/h2>\n<ol>\n<li>\n<div align=\"justify\">\n<div align=\"justify\">\n<div align=\"justify\">\n<div align=\"justify\">\n<div align=\"justify\">&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2006\/timingchannel_allerton06.pdf\">Timing Channel Capacity for Uniform and Gaussian Servers<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nSarah Sellke, Ness B. Shroff, Saurabh Bagchi, and Chih-Chun Wang. Forty-Fourth Annual Allerton Conference On Communication, Control, and Computing, Sep 27-29, 2006, Allerton, IL, USA.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div align=\"justify\">\n<div align=\"justify\">\n<div align=\"justify\">\n<div align=\"justify\">\n<div align=\"justify\"><strong>DSN<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2006\/spacedive_dsn06fastabs_cameraready.pdf\">SPACEDIVE: A Distributed Intrusion Detection System for Voice-over-IP Environments<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nVinita Apte, Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, and Navjot Singh. Fast Abstract in the Supplemental Proceedings of the International Conference on Dependable Systems and Networks (DSN), June 25-28, 2006, Philadelphia, Pennsylvania, USA. [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2006\/spacedive_dsn06.pdf\">Presentation<\/a> ]<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ol>\n<h2>2005<\/h2>\n<ol>\n<li><strong>DSN<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2005\/final_adepts_dsn05_submit.pdf\">ADEPTS: Adaptive Intrusion Response using Attack Graphs in an E-Commerce Environment<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nBingrui Foo , Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, and Eugene Spafford. International Conference on Dependable Systems and Networks (DSN), June 28- July 1, 2005, Yokohama, Japan. (Acceptance rate: DCCS track 54\/204 ~ 26.8%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2005\/adepts_dsn05_cameraready.pdf\">Camera ready<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2005\/adepts_dsn05_presentation.pdf\">Presentation<\/a> ]<\/li>\n<li>\n<div align=\"justify\"><strong>DSN<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2005\/worm.pdf\">Modeling and Automated Containment of Worms<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nSarah Sellke, Ness B. Shroff, and Saurabh Bagchi. International Conference on Dependable Systems and Networks (DSN), June 28 &#8211; July 1, 2005, Yokohama, Japan. (Acceptance rate: DCCS track 54\/204 ~ 26.8%) [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2005\/worm_dsn05_cameraready.pdf\">Camera ready<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2005\/worm_dsn05_presentation.pdf\">Presentation<\/a> ]<\/div>\n<\/li>\n<\/ol>\n<h2>2004<\/h2>\n<ol>\n<li><strong>DSN<br \/>\n<\/strong>&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2004\/scidive_dsn04_submit.pdf\">SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nSaurabh Bagchi, Yu-Sung Wu (Purdue U. , USA); Sachin Garg, Navjot Singh, Tim Tsai (Avaya Labs, USA). IEEE Dependable Systems and Networks Conference (DSN 2004), June28-July 1, 2004, Florence, Italy. (Acceptance rate: DCCS track 58\/276 ~ 21%).<br \/>\n[ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2004\/scidive_dsn04_cameraready.pdf\">Camera ready<\/a> ] [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2004\/scidive_dsn04_presentation.pdf\">Presentation<\/a> ]<\/li>\n<li>\n<div align=\"justify\">&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2004\/adepts_ccs04_submit.pdf\">ADEPTS: Adaptive Intrusion Containment in Distributed Service Environments<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nBingrui Foo, Yu-Sung Wu, Saurabh Bagchi, Gene Spafford, and Blake Matheny. CERIAS Tech Report 2004.<\/div>\n<\/li>\n<\/ol>\n<h2>2003<\/h2>\n<ol>\n<li>\n<div align=\"justify\">&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2003\/cids_acsac03_cameraready.pdf\">Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nYu-Sung Wu, Bingrui Foo, Yongguo Mei, and Saurabh Bagchi. 19th Annual Computer Security Applications Conference, December 8-12, 2003, Las Vegas, Nevada, USA. (Acceptance rate: 36\/110 ~ 32.7% ). [ <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/presentations1\/2003\/hank_cids_acsac03.pdf\">Presentation<\/a> ]<\/div>\n<\/li>\n<li>\n<div align=\"justify\">\n<div align=\"justify\">\n<div align=\"justify\">&#8220;<a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2003\/adepts_ceriastr03.pdf\">ADEPTS: Adaptive Intrusion Containment and Response using Attack Graphs in an E-Commerce Environment<\/a>,&#8221; <span class=\"badge badge-danger\">Distributed Secure Systems<\/span><br \/>\nYu-Sung Wu, Bingrui Foo, Blake Matheny, Tyler Olsen, and Saurabh Bagchi. CERIAS Tech Report 2003-33.<\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ol>\n<div style=\"text-align: left;\" align=\"center\"><strong>Copyright notice:<\/strong> Personal use of this material is permitted. However, permission to reprint\/republish this material for advertising or promotional<br \/>\npurposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work<br \/>\nin other works must be obtained from the appropriate publisher (IEEE, ACM, Elsevier, etc.)<\/div>\n<p><!--more--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To view publications by project, click the buttons down below: All Publications Fault Tolerance for Distributed Applications Resilient Wireless Networks Distributed Secure Systems Resilient AI PhD Theses by DCSL Members Miscellaneous 2025 DSN-W &#8220;A Lightweight Reputation-Based Mechanism for Incentivizing Cooperation in Decentralized Federated Learning,&#8221; Distributed Secure Systems Kavindu Herath, Suraj Mahangade, and Saurabh Bagchi. In [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":73,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"tags":[],"_links":{"self":[{"href":"https:\/\/engineering.purdue.edu\/dcsl\/wp-json\/wp\/v2\/pages\/2098"}],"collection":[{"href":"https:\/\/engineering.purdue.edu\/dcsl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/engineering.purdue.edu\/dcsl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/engineering.purdue.edu\/dcsl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/engineering.purdue.edu\/dcsl\/wp-json\/wp\/v2\/comments?post=2098"}],"version-history":[{"count":20,"href":"https:\/\/engineering.purdue.edu\/dcsl\/wp-json\/wp\/v2\/pages\/2098\/revisions"}],"predecessor-version":[{"id":3594,"href":"https:\/\/engineering.purdue.edu\/dcsl\/wp-json\/wp\/v2\/pages\/2098\/revisions\/3594"}],"up":[{"embeddable":true,"href":"https:\/\/engineering.purdue.edu\/dcsl\/wp-json\/wp\/v2\/pages\/73"}],"wp:attachment":[{"href":"https:\/\/engineering.purdue.edu\/dcsl\/wp-json\/wp\/v2\/media?parent=2098"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/engineering.purdue.edu\/dcsl\/wp-json\/wp\/v2\/tags?post=2098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}