Content Editor

UIUC Science of Security Lablet Research Initiative

Bulk operations
TitleTypeAuthorPost datesort iconPublishedPost: PublicTaxonomy termsEdit link
0 items selected. Select all items:
12 SoS Quarterly Meeting July2016 Xie.pdfFileawhitesellOct 24 2016 - 4:23pmYesYes
User-Centric Mobile Security AssessmentBiblioawhitesellOct 24 2016 - 4:23pmYesYes
Beliefs about Cybersecurity Rules and Passwords A Comparison of Two Survey SamplesFileawhitesellOct 24 2016 - 4:12pmYesYes
Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular UsersBiblioawhitesellOct 24 2016 - 4:12pmYesYes
15 SoS Quarterly Meeting July2016 Iyer.pdfFileawhitesellOct 24 2016 - 3:56pmYesYes
Detection of Malicious Keyloggers in Virtual Desktop EnvironmentsBiblioawhitesellOct 24 2016 - 3:56pmYesYes
06 SoS Quarterly Meeting July2016 Sanders.pdfFileawhitesellOct 24 2016 - 3:48pmYesYes
ADVISE – Adversary View Security Evaluation: Practical Metrics for Enterprise Security Engineering (poster)BiblioawhitesellOct 24 2016 - 3:48pmYesYes
02 SoS Quarterly Meeting July2016 Viswanath.pdfFileawhitesellOct 24 2016 - 3:41pmYesYes
Metadata-conscious Anonymous MessagingBiblioawhitesellOct 24 2016 - 3:41pmYesYes
Bounded Invariant Verification for Time-delayed Nonlinear Networked Dyanmical SystemsFileawhitesellJul 13 2016 - 3:24pmYesYes
Bounced Invariant Verification for Time-delayed Nonlinear Networked Dynamical SystemsBiblioawhitesellJul 13 2016 - 3:24pmYesYes
DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined NetworkingFileawhitesellJul 13 2016 - 3:13pmYesYes
DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined Networking Emulation (poster)BiblioawhitesellJul 13 2016 - 2:59pmYesYes
DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined NetworkingFileawhitesellJul 13 2016 - 2:59pmYesYes
A Study of Grayware on Google PlayBiblioawhitesellJul 13 2016 - 2:44pmYesYes
A Study of Grayware on Google PlayFileawhitesellJul 13 2016 - 2:44pmYesYes
Measuring Code Behavioral Similarity for Programming and Software Engineering EducationFileawhitesellJul 13 2016 - 2:20pmYesYes
Measuring Code Behavioral Similarity for Programming and Software Engineering EducationBiblioawhitesellJul 13 2016 - 2:20pmYesYes
Metadata-conscious Anonymous MessagingFileawhitesellJul 13 2016 - 1:56pmYesYes
Metadata-conscious Anonymous MessagingBiblioawhitesellJul 13 2016 - 1:56pmYesYes
Rumor Source Obfuscation on Irregular TreesFileawhitesellJul 13 2016 - 1:49pmYesYes
Ravel A Database Defined NetworkFileawhitesellApr 12 2016 - 3:49pmYesYes
Ravel: A Database-Defined NetworkBiblioawhitesellApr 12 2016 - 3:46pmYesYes
Parallel Simulation and Virtual Machine Based Emulation of Software Defined NetworksFileawhitesellApr 12 2016 - 3:40pmYesYes
Parallel Simulation and Virtual-machine-based Emulation of Software-defined NetworkBiblioawhitesellApr 12 2016 - 3:40pmYesYes
SoSSDN 2016 - Artifacts Available NowEventawhitesellApr 1 2016 - 3:08pmYesYes
Science of Security for Cyber-Physical Systems WorkshopEventawhitesellJan 15 2016 - 1:47pmYesYes
Preemptive Intrusion Detection Theoretical Framework and Real-World MeasurementsFileamyclayNov 18 2015 - 3:17pmYesYes
Preemptive Intrusion Detection: Theoretical Framework and Real-World MeasurementsBiblioamyclayNov 18 2015 - 3:17pmYesYes
Differentially Private Distributed OptimizationFileamyclayNov 17 2015 - 6:40pmYesYes
Differentially Private Distributed OptimizationBiblioamyclayNov 17 2015 - 6:40pmYesYes
Entropy-minimizing Mechanism for Differential Privacy of Discrete-time Linear Feedback SystemsBiblioamyclayNov 17 2015 - 6:00pmYesYes
Entropy minimizing Mechanism for Differential Privacy of Discrete time Linear Feedback SystemsFileamyclayNov 17 2015 - 6:00pmYesYes
Simulation-based Verification of Cardiac Pacemakers with Guaranteed CoverageFileamyclayNov 17 2015 - 3:40pmYesYes
Simulation-based Verification of Cardiac Pacemakers with Guaranteed CoverageBiblioamyclayNov 17 2015 - 3:40pmYesYes
Controller Synthesis for Linear Time-varying Systems with AdversariesFileamyclayNov 17 2015 - 3:28pmYesYes
Controller Synthesis for Linear Time-varying Systems with AdversariesBiblioamyclayNov 17 2015 - 3:28pmYesYes
User-aware privacy control via extended static-information-flow analysisFileamyclayNov 17 2015 - 12:15pmYesYes
User-Aware Privacy Control via Extended Static-Information-Flow AnalysisBiblioamyclayNov 17 2015 - 12:15pmYesYes
AppContext: Differentiating Malicious and Benign Mobile App Behavior Under ContextBiblioamyclayNov 17 2015 - 11:58amYesYes
AppContext Differentiating Malicious and Benighn Mobile App Behaviors Using ContextFileamyclayNov 17 2015 - 11:58amYesYes
Gamifying Software Security Education and Training via Secure Coding Duels in Code HuntBiblioamyclayNov 17 2015 - 11:46amYesYes
Gamifying Softwre Security Education and Training via Secure Codeing Duels in Code Hunt Poster AbstractFileamyclayNov 17 2015 - 11:46amYesYes
Mismorphism: A Semiotic Model of Computer Security Circumvention (poster abstract)BiblioamyclayNov 17 2015 - 11:36amYesYes
Mismorphism: a Semiotic Model of Computer Security Circumvention Poster AbstractFileamyclayNov 17 2015 - 11:36amYesYes
Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent Based ModelingBiblioamyclayNov 16 2015 - 6:41pmYesYes
Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based ModelingFileamyclayNov 16 2015 - 6:41pmYesYes
Mismorphism: A Semiotic Model of Computer Security CircumventionBiblioamyclayNov 16 2015 - 6:35pmYesYes
Mismorphism: a Semiotic Model of Computer Security CircumventionFileamyclayNov 16 2015 - 6:35pmYesYes
Dynamic VM Dependability Monitoring Using Hypervisor ProbesBiblioamyclayNov 16 2015 - 6:12pmYesYes
Dynamic VM Dependability Monitoring Using Hypervisor ProbesFileamyclayNov 16 2015 - 6:12pmYesYes
Towards an Unified Security Testbed and Security Analytics FrameworkBiblioamyclayNov 16 2015 - 6:04pmYesYes
Towards an Unified Security Testbed and Security Analytics FrameworkFileamyclayNov 16 2015 - 6:04pmYesYes
Hypervisor Introspection Exploiting Timing Side channels against VM MonitoringFileamyclayNov 16 2015 - 5:58pmYesYes
Hypervisor Introspection: Exploiting Timing Side-Channels against VM MonitoringBiblioamyclayNov 16 2015 - 5:58pmYesYes
Reliability and Security Monitoring of Virtual Machines using Hardware Architectural InvariantsFileamyclayNov 16 2015 - 5:32pmYesYes
Reliability and Security Monitoring of Virtual Machines using Hardware Architectural InvariantsBiblioamyclayNov 16 2015 - 5:30pmYesYes
Building Reliable and Secure Virtual Machines using Architectural InvariantsFileamyclayNov 16 2015 - 5:22pmYesYes
Building Reliable and Secure Virtual Machines using Architectural InvariantsBiblioamyclayNov 16 2015 - 5:22pmYesYes
Resiliency Variance in Workflows with ChoiceFileamyclayNov 11 2015 - 6:45pmYesYes
Resiliency Variance in Workflows with ChoiceBiblioamyclayNov 11 2015 - 6:45pmYesYes
Impact of Policy Design on Workflow Resiliency Computation TimeFileamyclayNov 11 2015 - 6:38pmYesYes
Impact of Policy Design on Workflow Resiliency Computation TimeBiblioamyclayNov 11 2015 - 6:38pmYesYes
Modelling User Availablity in Workflow Resiliency AnalysisFileamyclayNov 11 2015 - 6:26pmYesYes
Modelling User Availability in Workflow Resiliency AnalysisBiblioamyclayNov 11 2015 - 6:26pmYesYes
On Massively Parallel Simulation of Large-Scale Fat-Tree Networks for HPC Systems and Data CentersFileamyclayNov 11 2015 - 6:12pmYesYes
On Massively Parallel Simulation of Large-Scale Fat-Tree Networks for HPC Systems and Data Centers (poster)BiblioamyclayNov 11 2015 - 6:07pmYesYes
VT-Mininet Vitual-time-enabled Mininet for Scalable and Accurate Software-Define Network EmulationFileamyclayNov 11 2015 - 5:49pmYesYes
VT-Miniet: Virtual-time-enabled Mininet for Scalable and Accurate Software-Define Network EmulationBiblioamyclayNov 11 2015 - 5:49pmYesYes
FatTreeSim: Modeling Large-scale,Fat-Tree Networks for HPC Systems and Data Centers Using Parallel and Discrete Event SimulationFileamyclayNov 11 2015 - 4:23pmYesYes
FatTreeSim: Modeling a Large-scale Fat-Tree Network for HPC Systems and Data Centers Using Parallel and Discrete Even SimulationBiblioamyclayNov 11 2015 - 4:23pmYesYes
A Virtual Time System for Linux-container-based Emulation of Software-defined NetworksFileamyclayNov 11 2015 - 4:06pmYesYes
A Virtual Time System for Linux-container-based Emulation of Software-defined NetworksBiblioawhitesellNov 11 2015 - 4:06pmYesYes
Enforcing Customizable Consistency Properties in Software-Defined NetworksFileawhitesellNov 11 2015 - 3:41pmYesYes
Enforcing Customizable Consistency Properties in Software-Defined NetworksBiblioawhitesellNov 11 2015 - 3:41pmYesYes
Securing Industrial Control Systems with a Simulation-based Verification SystemBiblioawhitesellJan 13 2015 - 12:36pmYesYes
Towards Correct Network VirtualizationBiblioawhitesellJan 13 2015 - 12:19pmYesYes
Static Dynamic Analysis of Security Metrics for Cyberphysical SystemsFilemitrasOct 30 2014 - 1:51pmYesYes
Agent-based Modeling of User Circumvention of SecurityBiblioKatie DeyOct 24 2014 - 12:51pmYesYes
Science of Human Circumvention of SecurityGroup ProjectmitrasOct 23 2014 - 1:31pmYesYes
A Hypothesis Testing Framework for Network SecurityGroup ProjectMatt CaesarOct 23 2014 - 1:29pmYesYes
Data Driven Security Models and AnalysisGroup ProjectZbigniew KalbarczykOct 23 2014 - 1:09pmYesYes
Data-Driven Model-Based Decision-MakingGroup ProjectDavid NicolOct 23 2014 - 1:03pmYesYes
Static-Dynamic Analysis of Security Metrics for Cyber-Physical SystemsGroup ProjectGeir DullerudOct 22 2014 - 2:25pmYesYes
Personalized Password Guessing: A New Security ThreatBiblioZbigniew KalbarczykSep 17 2014 - 6:31pmYesYes
Preemptive Intrusion DetectionBiblioZbigniew KalbarczykSep 17 2014 - 6:31pmYesYes
Proving Abstractions of Dynamical Systems Through Numerical SimulationsBibliomitrasSep 17 2014 - 6:31pmYesYes
Quantitative Security Metrics for Cyber-Human SystemsGroup ProjectHeather LucasNov 9 2012 - 8:47pmYesYes
Trust from Explicit Evidence: Integrating Digital Signatures and Formal ProofsGroup ProjectHeather LucasNov 9 2012 - 8:18pmYesYes
Towards a Science of Securing Network ForwardingGroup ProjectHeather LucasNov 9 2012 - 8:17pmYesYes
Toward a Theory of Resilience in Systems: A Game-Theoretic ApproachGroup ProjectHeather LucasNov 9 2012 - 8:16pmYesYes
Theoretical Foundations of Threat Assessment by Inverse Optimal ControlGroup ProjectHeather LucasNov 9 2012 - 8:14pmYesYes
Secure Platforms via Stochastic ComputingGroup ProjectHeather LucasNov 9 2012 - 8:13pmYesYes
The Science of Summarizing Systems: Generating Security Properties Using Data Mining and Formal AnalysisGroup ProjectHeather LucasNov 9 2012 - 8:12pmYesYes
Scalable Methods for Security Against Distributed AttacksGroup ProjectHeather LucasNov 9 2012 - 8:11pmYesYes
Quantitative Assessment of Access Control in Complex Distributed SystemsGroup ProjectHeather LucasNov 9 2012 - 8:10pmYesYes
Protocol Verification: Beyond Reachability PropertiesGroup ProjectHeather LucasNov 9 2012 - 8:09pmYesYes
From Measurements to Security Science: Data-Driven ApproachGroup ProjectHeather LucasNov 9 2012 - 8:08pmYesYes
Enhancing Cyber Security Through Networks Resilient to Targeted AttacksGroup ProjectHeather LucasNov 9 2012 - 8:07pmYesYes