Recent Refereed Security-Related Publications

To appear

  1. M. Ozsoy, D. Ponomarev, N. Abu-Ghazaleh and T. Suri, SIFT: Low-Complexity Energy-Efficient Information Flow Tracking on SMT Processors, to appear, IEEE Transactions on Computers.

2012

  1. Ruiqi Luo, Ping Yang, Shiyong Lu, and Mikhail I. Gofman, Analysis of Scientific Workflow Provenance Access Control Policies, The 9th IEEE International Conference on Services Computing (SCC), © IEEE Press, 2012.
  2. L. Domnister, J. Leow, A. Jaleel, D. Ponomarev and N. Abu-Ghazaleh, Non-Monopolizable Caches: Low-Complexity Mitigation of Cache Side Channel Attacks, ACM Transactions on Architecture and Code Optimization, Jan. 2012.
  3. M. Kayaalp, M. Ozsoy, N. Abu-Ghazaleh, D. Ponomarev, Branch Regulation: Low-Overhead Protection from Code Reuse Attacks, ACM/IEEE International Symposium on Computer Architecture (ISCA), 2012.

2011

  1. Mikhail I. Gofman, Ruiqi Luo, Ping Yang and Kartik Gopalan, SPARC: A Security and Privacy Aware Virtual Machine Checkpointing Mechanism, Proceedings of the 10th annual ACM Workshop on Privacy in the Electronic Society (WPES), in conjunction with the ACM Conference on Computer and Communications Security (CCS), full paper, &ACM Press, 2011.
  2. J. Schmitz, J. Loew, J. Elwell, D. Ponomarev and N. B. Abu-Ghazaleh, TPM-SIM: A Framework for Performance Evaluation of Trusted Platform Modules, IEEE/ACM Design Automation Conference, 2011
  3. M. Ozsoy, D. Ponomarev, N. B. Abu-Ghazaleh and T. Suri, "SIFT: A Low-Overhead Dynamic Information Flow Tracking Architecture for SMT Processors", ACM International Conference on Computing Frontiers, 2011.
  4. Zijiang Yang, Shiyong Lu, Ping Yang and Fahima Bhuyan, Model Checking Approach to Secure Host Access Enforcement of Mobile Tasks in Scientific Workflows, Special Issue on Scientific Workflows, Provenance and Their Applications of International Journal of Computers and Their Applications, 18(3), 148--159, 2011.
  5. Amit Sasturkar, Ping Yang, Scott D. Stoller, and C.R. Ramakrishnan, Policy Analysis for Administrative Role Based Access Control, Theoretical Computer Science, Volume 412, Issue 44, Pages 6208-6234, 14 October 2011, © Elsevier.
  6. Scott D. Stoller, Ping Yang, Mikhail Gofman, and C. R. Ramakrishnan, Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control, Computers & Security , 30(2-3):148-164, March-May 2011.

2010

  1. Artem Chebotko, Shiyong Lu, S. Chang, F Fotouhi and Ping Yang, Secure Scientific Workflow Provenance Querying with Security Views, IEEE Transactions on Services Computing, 2010.
  2. L. Domnister, D. Ponomarev and N. B. Abu-Ghazaleh, A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors, Mathematical Methods, Models and Architectures for Computer Network Security, 2010.
  3. Ping Yang, Shiyong Lu, Mikhail Gofman, and Zijiang Yang, Information Flow Analysis of Scientific Workflows, Special issue on scientific workflows, Journal of Computer and System Sciences (JCSS) , volume 76(6), pages 390-402, @copy Elsevier, 2010.
  4. Zhao Lin, Kartik Gopalan, and Ping Yang, A case for Secure Virtual Append-only Storage for Virtual Machines, International Workshop on Security in Cloud Computing (SCC), in conjunction with ICPP, © IEEE Press, 2010.
  5. Mikhail Gofman, Ruiqi Luo, and Ping Yang, User-Role Reachability Analysis of Evolving Administrative Role Based Access Control, 15th European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science, 2010.

2009

  1. Eric Sabbah and Kyoung-Don Kang, "Security in Wireless Sensor Networks", Guide to Wireless Sensor Networks, Sudip Misra, Isaac Woungang, and Subhas Chandra Misra (eds.), Springer London, 2009.
  2. Mikhail Gofman, Ruiqi Luo, Jian He, Yingbin Zhang, and Ping Yang, Incremental Information Flow Analysis of Role Based Access Control, International Conference on Security and Management, 2009.
  3. Scott D. Stoller, Ping Yang, Mikhail Gofman, and C. R. Ramakrishnan, Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control, 14th ACM symposium on access control models and technologies (SACMAT), Pages 165--174, © ACM press, 2009.
  4. Mikhail Gofman, Ruiqi Luo, Ayla Solomon, Yingbin Zhang, Ping Yang and Scott D. Stoller, RBAC-PAT: A Policy Analysis Tool for Role Based Access Control, 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Pages 46--49, Lecture Notes in Computer Science, © Springer-Verlag, 2009.

2008

  1. Erdem Aktas and Kanad Ghose, Dare: A Framework for Dynamic Authentication of Remote Execution, Annual Computer Security Applications Conference (ACSAC), 2008.
  2. E. Sabbah, K. D. Kang, N. Abu-Ghazaleh, A. Majeed, and K. Liu, "An Application-Driven Approach to Designing Secure Wireless Sensor Networks", Wireless Communications and Mobile Computing, Wiley Interscience, Volume 8, Issue 3, pages 369-384, March, 2008.
  3. Artem Chebotko, S. Chang, Shiyong Lu, F Fotouhi and Ping Yang, Secure Scientific Workflow Provenance Querying with Security Views, 9th International Conference on Web-Age Information Management (WAIM), pages 349-356, © IEEE press, 2008.
  4. J. Rrushi and K. D. Kang, "CyberRadar: A Regression Analysis Approach to the Identification of Cyber-Physical Mappings in Process Control Systems", In Proceedings of the IEEE/ACM Workshop on Embedded Systems Security (in conjunction with the IEEE/ACM EMSOFT '2008 and the Embedded Systems Week), Oct. 23, 2008.

2007

  1. Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, Mikhail I. Gofman, Efficient Policy Analysis for Administrative Role Based Access Control, 14the ACM Conference on Computer and Communications Security (CCS), pages 445-455, © ACM press, 2007.
  2. K. Liu, N. Abu-Ghazaleh, and K. D. Kang, Location Verification and Trust Management for Resilient Geographic Routing, Journal of Parallel and Distributed Computing, Vol. 67, pages 215-228, 2007.
  3. Zhenhai Duan, Yingfei Dong, and Kartik Gopalan, DMTP: Controlling Spam Through Message Delivery Differentiation , In Computer Networks Journal, Volume 51, Issue 10, July 2007.
  4. Zhenhai Duan, Kartik Gopalan, and Xin Yuan, Behavioral Characteristics of Spammers and Their Network Reachability Properties , In Proc. of the International Conference on Communications (ICC), 2007.
  5. Onur Demir, Michael R. Head, Kanad Ghose, and Madhusudhan Govindaraju, Securing Grid Data Transfer Services with Active Network Portals , in The 8th IEEE International Workshop on Parallel and Distributed Scientific and Engineering Computing (PDSEC), held in conjunction with The 21st International Parallel and Distributed Processing Symposium (IPDPS-07), 2007.
  6. Onur Demir, Michael R. Head, Kanad Ghose and Madhusudhan Govindaraju, "Protecting GRIDftp Transfers with Active Network Portals", in the Journal of High Performance Computing, Special Issue on Grid Computing, 2007 Vol. 3, Nos. 3/4, 2007.
  7. Zijiang Yang, Shiyong Lu, and Ping Yang, Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows, IEEE International Symposium on Ubisafe Computing, pages 506-511, © IEEE press, 2007.
  8. Ping Yang, Zijiang Yang, and Shiyong Lu, Formal Modelling and Analysis of Scientific Workflows Using Hierarchical State Machines, 2nd International Workshop on Scientific Workflows and Business Workflow Standards in e-Science, held in conjuction with IEEE international conference on e-science and grid computing, pages 619-626, © IEEE press, 2007.
  9. B. Kravitz, M. I. Gofman, K. D. Kang, and V. Candela, Extending Trust Based Routing by Collusion Avoidance and Detection", IEEE Upstate NY Workshop on Communications, Sensors, and Networking, November 9, 2007.

2006

  1. K. D. Kang and S. H. Son, "Towards Security and QoS Optimization in Real-Time Embedded Systems", ACM SIGBED Review, Special Interest Group on Embedded Systems, SIGBED Review, Vol. 3, No. 1, January 2006.
  2. Amit Sasturkar, Ping Yang, Scott D. Stoller, and C.R. Ramakrishnan, Policy Analysis for Administrative Role Based Access Control, 19th IEEE Computer Security Foundations Workshop (CSFW), pages 124-138, © IEEE Press, 2006.
  3. Ping Yang, Samik Basu, and C. R. Ramakrishnan, Parameterized Verification of Pi-Calculus Systems, 12th. International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pages 42-57, lecture notes in computer science, © Springer-Verlag, 2006.
  4. Zhenhai Duan, Yingfei Dong, Kartik Gopalan, DMTP: Controlling Spam Through Message Delivery Differentiation , In Proc. of Networking 2006, Coimbra, Portugal, May, 2006.
  5. K. D. Kang and S. H. Son, Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications , Sydney, Australia, Aug. 16-18, 2006.
  6. K.D. Kang, K. Liu and N. Abu-Ghazaleh, Securing Geographic Routing, 9th Annual NYS Cyber Security Conference: Symposium on Information Assurance, Albany, New York, June 14-15, 2006. (Best Paper Award)
  7. Zijiang Yang, Shiyong Lu, and Ping yang, Runtime Security Verification for Itinerary-Driven Mobile Agents, 2nd IEEE Symposium on Dependable Autonomic and Secure Computing (DASC), pages 177-186, © IEEE Press, 2006.

2005 and earlier

  1. Onur Demir, Michael R. Head, Kanad Ghose, Madhusudhan Govindaraju, "Protecting Grid Data Transfer Services with Active Network Interfaces", Proc. 6-th IEEE Grid Computing Workshop, 2005. (fully peer-reviewed based on the submission of a complete paper and had an acceptance rate of 16% for 2005.)
  2. Onur Demir and Kanad Ghose, in Proc. "Improving Transaction Server Performance under Heavy Loads with Differentiated Service and Active Network Interface", IEEE Intl. Symposium on Network Computing and Applications (NCA), July 2005.
  3. Onur Demir and Kanad Ghose, "Real-Time Protection against DDoS Attacks Using Active Gateways", In Proc. Security in Distributed Computing Systems, April, 2005.
  4. Zhenhai Duan, Kartik Gopalan, Yingfei Dong, Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic, In Proc. of USENIX SRUTI 2005 Workshop, MIT, Cambridge, MA, July 2005.
  5. Zhenhai Duan, Yingfei Dong, Kartik Gopalan, A Differentiated Message Delivery Architecture to Control Spam, In Proc. of Workshop on Security in Networks and Distributed Systems (SNDS05), Fukuoka, Japan, July 2005.
  6. K. D. Kang and S. H. Son, Dynamic Security and QoS Adaptation in Real-Time Embedded Systems, 26th IEEE Real-Time Systems Symposium, WIP Session, Miami, Florida, Dec. 5-8, 2005.
  7. Onur Demir and Kanad Ghose, "Maintaining Useful Server Throughput under Load Attacks Using Active NIC Portals", Proc. IEEE Globecom 2004 - Security and Network Management Track, pp 202-207.
  8. K. D. Kang, Integrated Security and Quality of Service in E-Commerce , 6th Internal Conference on Electronic Commerce Research, Dallas, Texas, pages 1-7, Oct. 2003.
  9. Radu Grosu, Xiaowan Huang, Scott A. Smolka, and Ping Yang, Monte Carlo Analysis of Security Protocols: Needham-Schroeder Revisited, DIMACS workshop on Security Analysis of Protocols, June 2004.