A. Altaweel, R. Stoleru, G. Gu, A. K. Maity, “CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks,” 2019 IEEE Conference on Communications and Network Security (CNS), 2019.
M.K. Hosseini, A. Talebpour, S. Shakkottai, “Privacy Risk of Connected Vehicles in Relation to Vehicle Tracking when Transmitting Basic Safety Message Type 1 Data,” Transportation Research Record, September 2019.
C. Kwan, L. Kish, Y. Saez, X. Cao, “Low Cost and Unconditionally Secure Communications for Complex UAS Networks,” IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, October 2018.
H. Huang, K. Davis, “Power System Equipment Cyber-Physical Risk Assessment Based on Architecture and Critical Clearing Time,” 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm),” October 2018.
H. Li, H. Hu, G. Gu, G.J. Ahn, F. Zhang, “vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems,” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018.
H. Wang, G. Yang, P. Chinprutthiwong, L. Xu, Y. Zhang, G. Gu, “Towards fine-grained network security forensics and diagnosis in the sdn era,” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018.
J. Zhang, J.g Jang, G. Gu, M. P. Stoecklin, X. Hu, “Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence,” International Symposium on Research in Attacks, Intrusions, and Defenses, 2018.
R. Skowyra, L. Xu, G. Gu, V. Dedhia, T. Hobson, H. Okhravi, J. Landry, “Effective topology tampering attacks and defenses in software-defined networks,” 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018.
Z. Zheng, A. Webb, AL N. Reddy, R. Bettati, “IoTAegis: A Scalable Framework to Secure the Internet of Things,” 2018 27th International Conference on Computer Communication and Networks (ICCCN), July 2018.
C. Yang, J. Zhang and G. Gu. “Understanding the Market-level and Network-level Behaviors of the Android Malware Ecosystem.” In Proc. of the 37th International Conference on Distributed Computing Systems (ICDCS’17), Atlanta, GA, June 2017.
H. Wang, A. Srivastava, L. Xu, S. Hong, G. Gu. “Bring Your Own Controller: Enabling Tenant-defined SDN Apps in IaaS Clouds.” In Proc. of 2017 IEEE International Conference on Computer Communications (INFOCOM’17), Atlanta, GA, May 2017.
L. Xue, Y. Zhou, T. Chen, X. Luo, G. Gu. “Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART.” In Proc. of the 26th USENIX Security Symposium (Security’17), Vancouver, BC, Canada, August 2017.
T.J. Overbye, *Z. Mao, K.S. Shetye, J.D. Weber, “An Interactive, Extensible Environment for Power System Simulation on the PMU Time Frame with a Cyber Security Application,” Proc. 2017 Texas Power and Energy Conference, College Station, TX, February 2017.
J. Zhang, X. Hu, J. Jang, T. Wang, G. Gu, M. Stoecklin. “Hunting for Invisibility: Characterizing and Detecting Malicious Web Infrastructures through Server Visibility Analysis.” To appear in Proc. of 2016 IEEE International Conference on Computer Communications(INFOCOM’16), San Francisco, California, April 2016.
S. Hong, R. Baykov, L. Xu, S. Nadimpalli, G. Gu, “Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security.” To appear in Proc. of the Network and Distributed System Security Symposium (NDSS’16), San Diego, California, Feb. 2016.
S. Shin, L. Xu, S. Hong, G. Gu. “Enhancing Network Security through Software Defined Networking (SDN).” In Proc. of The 25th International Conference on Computer Communication and Networks (ICCCN’16), Hawaii, USA, August 2016.
N. Ruffing, Y. Zhu, R. Libertini, Y. Guan, R. Bettati, “Smartphone reconnaissance: operating system identification,” Consumer Communications & Networking Conference (CCNC), 2016 13th IEEE Annual, pp. 1086-1091, 2016.
A. Fayazi, K. Lee, J. Caverlee, A. Squicciarini, “Uncovering Crowdsourced Manipulation of Online Reviews,” in Proc. of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp 233-242, 2015.
Andrew D. Targhetta*, Donald E. Owen Jr., Francis L. Israel and Paul V. Gratz, “Energy-Efficient Implementations of GF(p)and GF(2^m)Elliptic Curve Cryptography”, The 33rd IEEE International Conference on Computer Design (ICCD), Oct. 2015. (Nominated for Best Paper)
B. Chen, N. Pattanaik, A. Goulart, K. L. Butler‑Purry, and D. Kundur, “Implementing attacks for modbus/TCP protocol in a real‑time cyber physical system test bed,” in Proceedings of the 2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR ’15), 2015, pp. 1‑6.
C. Yang, G. Yang, A. Gehani, V. Yegneswaran, D. Tariq, G. Gu. “Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps.” In Proc. of 11th International Conference on Security and Privacy in Communication Networks (SecureComm’15), Dallas, US, October 2015.
H. Wang, L. Xu, G. Gu. “FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks.” In Proc. of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’15), Rio de Janeiro, Brazil, June 2015.
J. Zhang, S. Saha, G. Gu, S. Lee, M. Mellia. “Systematic Mining of Associated Server Herds for Malware Campaign Discovery.” In Proc. of the 35th International Conference on Distributed Computing Systems (ICDCS’15), Columbus, OH, June 2015.
L. Kish, Z. Gingl, R. Mingesz, G. Vadai, J. Smulko, C. Grangvist, “Analysis of an Attenuator Artifact in an experimental Attack by Gunn-Allison-Abbott Against the Kirchoff-law-Johnson-Noise (KLJN) Secure Key Exchange System,” Fluctuation and Noise Letters, vol. 14, issue 1, 2015.
S. Hong, L. Xu, H. Wang, G. Gu. “Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.” In Proc. of 22nd Annual Network & Distributed System Security Symposium (NDSS’15), San Diego, CA, USA. February 2015.
Y. Nan, M. Yang, Z. Yang, S. Zhou, G. Gu, and X. Wang, “Uipicker: User‑input privacy identification in mobile applications,” in Proceedings of the 24th USENIX Security Symposium (USENIX ’15), 2015, pp. 993‑1008.
Y. Zhang, M. Yang, G. Gu, H. Chen. “FineDroid: Enforcing Permissions with System-wide Application Execution Context.” In Proc. of 11th International Conference on Security and Privacy in Communication Networks (SecureComm’15), Dallas, US, October 2015.
B. Chen, K. L. Butler-Purry, S. Nuthalapati and D. Kundur, “Network delay caused by cyber attacks on SVC and its impact on transient stability of smart grids,” 2014 IEEE PES General Meeting | Conference & Exposition, National Harbor, MD, 2014, pp. 1-5.
C. Pak Hou, S. Kadhe, M. Bakshi, C. Chung, S. Jaggi, and A. Sprintson, “Reliable, deniable and hidable communication: A quick survey,” in Proceedings of the 2014 Information Theory Workshop (ITW), 2014, pp. 227‑231.
C. Yang*, Z. Xu*, G. Gu, V. Yegneswaran, and P. Porras, “Droidminer: Automated mining and characterization of fine‑grained malicious behaviors in android applications,” in Computer Security‑ESORICS 2014, ed: Springer, 2014, pp. 163‑182.
Chen, K. L. Butler‑Purry, S. Nuthalapati, and D. Kundur, “Network delay caused by cyber attacks on SVC and its impact on transient stability of smart grids,” in Proceedings of the 2014 IEEE Power and Energy Society (PES) General Meeting 2014, pp. 1‑5.
L. Kish, C. Grangvist, “Elimination of a Second-Law-Attack, and all Cable-Resistance-Based Attacks, in the Kirchhoff-law-Johnson-noise (KLJN) Secure Key Exchange System,” Entropy, vol. 16, issue 10, pp. 5223-5231, 2014.
S. Kadhe, S. Jaggi, M. Bakshi, and A. Sprintson, “Reliable, deniable, and hidable communication over multipath networks,” in Proceedings of the 2014 IEEE International Symposium on Information Theory (ISIT ’14), 2014, pp. 611‑615.
“The Design Space of Ultra-low Energy Asymmetric Cryptography”, A. D. Targhetta*, D. E. Owen Jr., P. V. Gratz, The 2014 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), Mar. 2014.
Y. Saez, L. Kish, R. Mingesz, Z. Gingl, C. Granqvist, “Current and Voltage Based Bit Errors and Their Combined Mitigation for the Kirchhoff-law-Johnson-noise Secure Key Exchange,” Journal of Computational Electronics, vol. 13, issue 1, pp. 271-277, 2014.
Y. Wang, Z. Xu*, J. Zhang*, L. Xu*, H. Wang*, and G. Gu, “SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA,” in Computer Security‑ESORICS 2014, ed: Springer, 2014, pp. 401‑418.
Y. Zhang, M. Yang, Z. Yang, G. Gu, P. Ning, and B. Zang, “Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps,” IEEE Transactions on Information Forensics and Security, vol. 9, pp. 1828‑1842, 2014.
Z. Xu, A. Nappa, R. Baykov, G. Yang, J. Caballero, G. Gu, “AutoProbe: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis,” in Proc. of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 179-190, 2014.
Z. Xu*, J. Zhang*, G. Gu, and Z. Lin, “GOLDENEYE: Efficiently and Effectively Unveiling Malware’s Targeted Environment,” in Research in Attacks, Intrusions and Defenses, ed: Springer, 2014, pp. 22‑45.
A. A. Amleshwaram, N. Reddy, S. Yadav*, G. Gu, and C. Yang, “CATS: Characterizing automation of Twitter spammers,” in Proceedings of the Fifth International Conference on Communication Systems and Networks (COMSNETS ’13) 2013, pp. 1‑10.
B. Chen, S. Mashayekh, K. L. Butler‑Purry, and D. Kundur, “Impact of cyber attacks on transient stability of smart grids with voltage support devices,” in Proceedings of the 2013 IEEE Power and Energy Society (PES) General Meeting, 2013, pp. 1‑5.
C. Jasson Casey, A. Sutton, G. Dos Reis, and A. Sprintson, “Eliminating network protocol vulnerabilities through abstraction and systems language design,” in Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP ’13) 2013, pp. 1‑6.
C. Yang*, R. Harkreader*, and G. Gu, “Empirical evaluation and new design for fighting evolving Twitter spammers,” IEEE Transactions on Information Forensics and Security, vol. 8, pp. 1280‑1293, 2013.
E. Gonzalez, L. Kish, R. Balog, P. Enjeti, “Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution Over the Smart Grid with Switched Filters,” PloS one, vol. 8, issue 7, 2013.
J. Pecarina and J.‑C. Liu, “Behavior instance extraction for risk aware control in mission centric systems,” in Proceedings of the IEEE International Multi‑Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA ’13), 2013, pp. 51‑58.
S. Liu, S. Mashayekh, D. Kundur, T. Zourntos, and K. Butler Purry, “A Framework for Modeling Cyber Physical Switching Attacks in Smart Grid,” IEEE Transactions on Emerging Topics in Computing, vol. 1, pp. 273 285, 2013.
S. Shin* and G. Gu, “Attacking software‑defined networks: A first feasibility study,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, 2013, pp. 165‑166.
S. Shin*, V. Yegneswaran, P. Porras, and G. Gu, “Avant‑guard: Scalable and vigilant switch flow management in software‑defined networks,” in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 2013, pp. 413‑424.
S. Son, S. Shin*, V. Yegneswaran, P. Porras, and G. Gu, “Model checking invariant security properties in OpenFlow,” in Proceedings of the 2013 IEEE International Conference on Communications (ICC), 2013, pp. 1974‑1979.
S. Vikram*, C. Yang*, and G. Gu, “Nomad: Towards non‑intrusive moving‑target defense against web bots,” in Proceedings of the 2013 IEEE Conference on Communications and Network Security (CNS), 2013, pp. 55‑63.
Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, et al., “Vetting undesirable behaviors in android apps with permission use analysis,” in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 2013, pp. 611‑622.
Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang, “Analyzing sensitive data transmission in android for privacy leakage detection,” in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 2013, pp. 1043‑1054.
C. Yang, R. Harkreader, J. Zhang, S. Shin, G. Gu, “Analyzing Spammers’ Social Networks for Fun and Profit: A Case Study of Cyber Criminal Ecosystem Twitter,” in Proc. of the 21st International Conference on World Wide Web, pp. 71-80, 2012.
P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, G. Gu, “A Security Enforcement Kernel for OpenFlow Networks,” in Proc. of the First Workshop on Hot Topics in Software Defined Networks, pp. 121-126, 2012.
S. Liu, D. Kundur, T. Zourntos and K. L. Butler-Purry, “Coordinated variable structure switching attack in the presence of model error and state estimation,” 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), Tainan, 2012, pp. 318-323.
S. Liu, S. Mashayekh, D. Kundur, T. Zourntos, and K. Butler-Purry, “A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks,” in Proc. of the 2012 IEEE Power and Energy Society General Meeting, 2012.
S. Wang, L. Cui, J. Que, D.-H. Choi, X. Jiang, S. Cheng, L. Xie, “A Randomized Response Model for Privacy Preserving Smart Metering,” IEEE Transaction on Smart Grid, vol. 3, issue 3, pp. 1317-1324, 2012.
S. Yadav*, A. K. K. Reddy, A. L. N. Reddy and S. Ranjan, “Detecting Algorithmically Generated Domain-Flux Attacks with DNS Traffic Analysis,” in IEEE/ACM Transactions on Networking, vol. 20, no. 5, pp. 1663-1677, Oct. 2012.
*S. Zonouz, *K.M. Rogers, *R. Berthier, R.B. Bobba, W.H. Sanders, T.J. Overbye, “SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures”, IEEE Transactions on Smart Grid, vol. 3, pp. 1790-1799, December 2012.