CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

Recent Publications

[-] 2016

[1] Venkatesan, S., Albanese, M., Cybenko, G. & Jajodia, S. "A Moving Target Defense Approach to Disrupting Stealthy Botnets". In Proceedings of the 3rd ACM Workshop on Moving Target Defense (MTD 2016), pages 37-46, ACM, 2016.

Electronic edition     Bibtex   

[2] Jajodia, S., Subrahmanian, V.S., Swarup, V. & Wang, C. "Cyber Deception: Building the Scientific Foundation". Springer Publishing Company, Incorporated, 2016.

Electronic edition     Bibtex   

[3] Pham, L.H., Albanese, M. & Venkatesan, S. "A Quantitative Risk Assessment Framework for Adaptive Intrusion Detection in the Cloud". In In Proceedings of the Second IEEE Workship on Security and Privacy in the Cloud (SPC 2016), 2016.(to appear).

Electronic edition     Bibtex   

[4] De Gaspari, F., Jajodia, S., Mancini, L.V. & Panico, A. "AHEAD: A New Architecture for Active Defense". In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 11-16, 2016.

Electronic edition     Bibtex   

[5] Zhang, N., Sun, K., Lou, W. & Hou, Y.T. "CaSE: Cache-Assisted Secure Execution on ARM Processors". In 2016 IEEE Symposium on Security and Privacy (SP), ():72-90, 2016.

Electronic edition     Bibtex   

[6] Ruan, X., Wu, Z., Wang, H. & Jajodia, S. "Profiling Online Social Behaviors for Compromised Account Detection". IEEE Transactions on Information Forensics and Security, 11(1):176-187, IEEE, 2016.

Electronic edition     Bibtex   

[7] Zhang, N., Sun, H., Sun, K., Lou, W. & Hou, Y.T. "CacheKit: Evading Memory Introspection Using Cache Incoherence". In 2016 IEEE European Symposium on Security and Privacy (EuroS P), ():337-352, 2016.

Electronic edition     Bibtex   

[8] Zhang, M., Wang, L., Jajodia, S., Singhal, A. & Albanese, M. "Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks". IEEE Transactions on Information Forensics and Security, 11(5):1071-1086, IEEE, 2016.

Electronic edition     Bibtex   

[9] Jajodia, S., Park, N., Serra, E. & Subrahmanian, V. "Using temporal probabilistic logic for optimal monitoring of security events with limited resources". Journal of Computer Security pages 1-57, IOS Press, 2016.

Electronic edition     Bibtex   

[10] Le, M., Kant, K., Athamnah, M. & Jajodia, S. "Minimum cost rule enforcement for cooperative database access". Journal of Computer Security pages 1-25, IOS Press, 2016.

Electronic edition     Bibtex   

[11] Ganesan, R., Jajodia, S., Shah, A. & Cam, H. "Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning". ACM Transactions on Intelligent Systems and Technology (TIST), 8(1):4, ACM, 2016.

Electronic edition     Bibtex   

[12] Wright, M., Venkatesan, S., Albanese, M. & Wellman, M.P. "Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis". In Proceedings of the 3rd ACM Workshop on Moving Target Defense (MTD 2016), pages 93-104, ACM, 2016.

Electronic edition     Bibtex   

[13] Li, Y., Wang, H. & Sun, K. "A study of personal information in human-chosen passwords and its security implications". In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, ():1-9, 2016.

Electronic edition     Bibtex   

[14] Venkatesan, S., Albanese, M., Amin, K., Jajodia, S. & Wright, M. "A moving target defense approach to mitigate DDoS attacks against proxy-based architectures". In IEEE Conference on Communications and Network Security, 2016.

Electronic edition     Bibtex   

[15] Borbor, D., Wang, L., Jajodia, S. & Singhal, A. "Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks". In IFIP Annual Conference on Data and Applications Security and Privacy, pages 295-312, 2016.

Electronic edition     Bibtex   

[16] Wallace, K., Moran, K., Novak, E., Zhou, G. & Sun, K. "Toward Sensor-Based Random Number Generation for Mobile and IoT Devices". IEEE Internet of Things Journal, 3(6):1189-1201, 2016.

Electronic edition     Bibtex   

[17] Guan, C., Sun, K., Wang, Z. & Zhu, W. "Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure". In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pages 629-640, ACM, 2016.

Electronic edition     Bibtex   

[18] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Efficient Integrity Checks for Join Queries in the Cloud". Journal of Computer Security pages 1-32, IOS Press, 2016.

Electronic edition     Bibtex   

[19] Sun, J. & Sun, K. "DESIR: Decoy-enhanced seamless IP randomization". In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, ():1-9, 2016.

Electronic edition     Bibtex   

[20] Wang, L., Li, Y. & Sun, K. "Amnesia: A Bilateral Generative Password Manager". In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ():313-322, 2016.

Electronic edition     Bibtex   

[21] Wright, M., Venkatesan, S., Albanese, M. & Wellman, M. "Moving target defense against DDoS attacks: An empirical game-theoretic analysis". In 2016 IEEE Conference on Communications and Network Security (IEEE CNS 2016), 2016.(to appear).

Electronic edition     Bibtex   

[22] Venkatesan, S., Albanese, M., Cybenko, G. & Jajodia, S. "A Moving Target Defense Approach to Disrupting Stealthy Botnets". In Proceedings of the 2016 ACM Workshop on Moving Target Defense, pages 37-46, 2016.

Electronic edition     Bibtex   

[+] 2015

[1] Venkatesan, S., Albanese, M. & Jajodia, S. "Disrupting stealthy botnets through strategic placement of detectors". In 2015 IEEE Conference on Communications and Network Security (IEEE CNS 2015), pages 95-103, 2015.(Best Paper Runner-Up Award).

Electronic edition     Bibtex    Award

[2] Deliri, S. & Albanese, M. "Security and privacy issues in social networks". In Data Management in Pervasive Systems, pages 195-209, Springer, 2015.

Electronic edition     Bibtex   

[3] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Integrity for Approximate Joins on Untrusted Computational Servers". In ICT Systems Security and Privacy Protection, 455:446-459, Springer International Publishing, 2015.

Electronic edition     Bibtex   

[4] Albanese, M., Battista, E. & Jajodia, S. "A deception based approach for defeating OS and service fingerprinting". In 2015 IEEE Conference on Communications and Network Security (CNS), pages 253-261, 2015.

Electronic edition     Bibtex   

[5] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Loose Associations to Increase Utility in Data Publishing". Journal of Computer Security, 23(1):59-88, IOS Press, 2015.

Electronic edition     Bibtex   

[6] Sun, H., Sun, K., Wang, Y. & Jing, J. "Reliable and Trustworthy Memory Acquisition on Smartphones". IEEE Transactions on Information Forensics and Security, 10(12):2547-2561, 2015.

Electronic edition     Bibtex   

[7] Clark, A., Sun, K., Bushnell, L. & Poovendran, R. "A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense". In Decision and Game Theory for Security, pages 3-21, Springer International Publishing, 2015.

Electronic edition     Bibtex   

[8] Zhang, N., Sun, K., Lou, W., Hou, Y.T. & Jajodia, S. "Now You See Me: Hide and Seek in Physical Address Space". In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS '15), pages 321-331, ACM, 2015.

Electronic edition     Bibtex   

[9] Serra, E., Jajodia, S., Pugliese, A., Rullo, A. & Subrahmanian, V.S. "Pareto-Optimal Adversarial Defense of Enterprise Systems". ACM Trans. on Information and System Security, 17(3):11:1-11:39, ACM, 2015.

Electronic edition     Bibtex   

[10] Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V. & Wang, C. "Cyber Warfare: Building the Scientific Foundation". Springer Publishing Company, Incorporated, 2015.

Electronic edition     Bibtex   

[+] 2014

[1] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Fragmentation in presence of data dependencies". IEEE Transactions on Dependable and Secure Computing, 11(6):510-523, IEEE, 2014.

Electronic edition     Bibtex   

[2] Sun, H., Sun, K., Wang, Y., Jing, J. & Jajodia, S. "TrustDump: Reliable Memory Acquisition on Smartphones". In Computer Security-ESORICS 2014, pages 202-218, Springer, 2014.

Electronic edition     Bibtex   

[3] Li, L., Zhu, S., Torrieri, D. & Jajodia, S. "Self-healing wireless networks under insider jamming attacks". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 220-228, 2014.

Electronic edition     Bibtex   

[4] Albanese, M., Molinaro, C., Persia, F., Picariello, A. & Subrahmanian, V. "Discovering the top-k unexplained sequences in time-stamped observation data". IEEE Transactions on Knowledge and Data Engineering, 26(3):577-594, IEEE, 2014.

Electronic edition     Bibtex   

[5] Wang, L., Zhang, M., Jajodia, S., Singhal, A. & Albanese, M. "Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks". In Computer Security-ESORICS 2014, pages 494-511, Springer, 2014.

Electronic edition     Bibtex   

[6] Le, M., Kant, K. & Jajodia, S. "Consistency and enforcement of access rules in cooperative data sharing environment". Computers & Security, 41:3-18, Elsevier, 2014.

Electronic edition     Bibtex   

[7] Cybenko, G., Jajodia, S., Wellman, M.P. & Liu, P. "Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation (invited paper)". In Information Systems Security, pages 1-8, Springer, 2014.

Electronic edition     Bibtex   

[8] De Capitani Di Vimercati, S., Erbacher, R.F., Foresti, S., Jajodia, S., Livraga, G. & Samarati, P. "Encryption and Fragmentation for Data Confidentiality in the Cloud". In Foundations of Security Analysis and Design VII, pages 212-243, Springer, 2014.

Electronic edition     Bibtex   

[9] Albanese, M., Jajodia, S., Singhal, A. & Wang, L. "An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities". In E-Business and Telecommunications, pages 322-340, Springer, 2014.

Electronic edition     Bibtex   

[10] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Integrity for distributed queries". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 364-372, 2014.

Electronic edition     Bibtex   

[11] Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V. & Wang, C. "Secure cloud computing". Springer, 2014.

Electronic edition     Bibtex   

[12] Albanese, M., Jajodia, S., Jhawar, R. & Piuri, V. "Securing Mission-Centric Operations in the Cloud". In Secure Cloud Computing, pages 239-259, Springer, 2014.

Electronic edition     Bibtex   

[13] De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Optimizing integrity checks for join queries in the cloud". In Data and Applications Security and Privacy XXVIII, pages 33-48, Springer, 2014.(Best Paper Award).

Electronic edition     Bibtex    Award

[14] Sun, K. & Jajodia, S. "Protecting enterprise networks through attack surface expansion". In Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, pages 29-32, 2014.

Electronic edition     Bibtex   

[15] Xu, Z., Wang, H. & Jajodia, S. "Gemini: An Emergency Line of Defense against Phishing Attacks". In 2014 IEEE 33rd International Symposium on Reliable Distributed Systems (SRDS), pages 11-20, 2014.

Electronic edition     Bibtex   

[16] Shakarian, P., Paulo, D., Albanese, M. & Jajodia, S. "Keeping Intruders at Large: A Graph-Theoretic Approach to Reducing the Probability of Successful Network Intrusions". In Proc. 11th International Conference on Security and Cryptography (SECRYPT 2014), Vienna, Austria, August, 2014.

Electronic edition     Bibtex   

[17] Albanese, M., Battista, E., Jajodia, S. & Casola, V. "Manipulating the attacker's view of a system's attack surface". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 472-480, 2014.

Electronic edition     Bibtex   

[18] Albanese, M. & Jajodia, S. "Formation of Awareness". In Cyber Defense and Situational Awareness, pages 47-62, Springer, 2014.

Electronic edition     Bibtex   

[19] Casola, V., De Benedictis, A. & Albanese, M. "A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices". In Integration of Reusable Systems, pages 299-324, Springer, 2014.

Electronic edition     Bibtex   

[20] Albanese, M., Erbacher, R.F., Jajodia, S., Molinaro, C., Persia, F., Picariello, A., Sperli, G. & Subrahmanian, V. "Recognizing Unexplained Behavior in Network Traffic". In Network Science and Cybersecurity, pages 39-62, Springer, 2014.

Electronic edition     Bibtex   

[21] Roy, S., Conti, M., Setia, S. & Jajodia, S. "Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact". IEEE Transactions on Information Forensics and Security, IEEE, 2014.

Electronic edition     Bibtex   

[22] Le, M., Kant, K. & Jajodia, S. "Enabling Collaborative Data Authorization Between Enterprise Clouds". In Secure Cloud Computing, pages 149-169, Springer, 2014.

Electronic edition     Bibtex   

[23] Wang, Z., Sun, K., Jajodia, S. & Jing, J. "Proof of Isolation for Cloud Storage". In Secure Cloud Computing, pages 95-121, Springer, 2014.

Electronic edition     Bibtex   

[24] Jajodia, S., Litwin, W. & SJ, T.S. "Scalable Distributed Virtual Data Structures". Academy of Science and Engineering (ASE), USA,copyright ASE 2014, 2014.

Electronic edition     Bibtex   

[25] Wang, L., Jajodia, S., Singhal, A., Cheng, P. & Noel, S. "k-Zero day safety: A network security metric for measuring the risk of unknown vulnerabilities". IEEE Transactions on Dependable and Secure Computing, 11(1):30-44, IEEE, 2014.

Electronic edition     Bibtex   

[26] Wang, L., Albanese, M. & Jajodia, S. "Network Hardening". Springer, 2014.

Electronic edition     Bibtex   

[27] Albanese, M., Cam, H. & Jajodia, S. "Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance". In Cybersecurity Systems for Human Cognition Augmentation, pages 47-60, Springer, 2014.

Electronic edition     Bibtex   

[28] De Capitani Di Vimercati, S., Foresti, S., Jajodia, S. & Samarati, P. "Database security and privacy". Chapman and Hall/CRC, 2014.

Electronic edition     Bibtex   

[29] Le, M., Kant, K. & Jajodia, S. "Consistent Query Plan Generation in Secure Cooperative Data Access". In Data and Applications Security and Privacy XXVIII, pages 227-242, Springer, 2014.

Electronic edition     Bibtex   

[30] Albanese, M., De Benedictis, A., Jajodia, S. & Torrieri, D. "A probabilistic framework for jammer identification in MANETs". Ad Hoc Networks, 14:84-94, Elsevier, 2014.

Electronic edition     Bibtex   

[31] Noel, S. & Jajodia, S. "Metrics suite for network attack graph analytics". In Proceedings of the 9th Annual Cyber and Information Security Research Conference, pages 5-8, 2014.

Electronic edition     Bibtex   

[+] 2013

[1] Albanese, M., Fayzullin, M., Shakarian, J. & Subrahmanian, V. "Automated Coding of Decision Support Variables". In Handbook of Computational Approaches to Counterterrorism, pages 69-80, Springer, 2013.

Electronic edition     Bibtex   

[2] Le, M., Kant, K. & Jajodia, S. "Rule enforcement with third parties in secure cooperative data access". In Data and Applications Security and Privacy XXVII, pages 282-288, Springer, 2013.

Electronic edition     Bibtex   

[3] Albanese, M. "Measuring trust in big data". In Algorithms and Architectures for Parallel Processing, pages 241-248, Springer, 2013.

Electronic edition     Bibtex   

[4] Albanese, M., Pugliese, A. & Subrahmanian, V. "Fast activity detection: Indexing for temporal stochastic automaton-based activity models". IEEE Transactions on Knowledge and Data Engineering, 25(2):360-373, IEEE, 2013.

Electronic edition     Bibtex   

[5] Wang, L., Wang, Z., Sun, K. & Jajodia, S. "Reducing Attack Surface with VM-Based Phantom Server". In 2013 IEEE Military Communications Conference, MILCOM 2013, pages 1429-1435, 2013.

Electronic edition     Bibtex   

[6] Nzoukou, W., Wang, L., Jajodia, S. & Singhal, A. "A Unified Framework for Measuring a Network's Mean Time-to-Compromise". In 2013 IEEE 32nd International Symposium on Reliable Distributed Systems (SRDS), pages 215-224, 2013.

Electronic edition     Bibtex   

[7] Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S. & Mancini, L.V. "Preserving privacy against external and internal threats in WSN data aggregation". Telecommunication Systems, 52(4):2163-2176, Springer, 2013.

Electronic edition     Bibtex   

[8] di Vimercati, S.D.C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Enforcing dynamic write privileges in data outsourcing". Computers & security, 39:47-63, Elsevier, 2013.

Electronic edition     Bibtex   

[9] Casola, V., De Benedictis, A. & Albanese, M. "A moving target defense approach for protecting resource-constrained distributed devices". In 2013 IEEE 14th International Conference on Information Reuse and Integration (IRI), pages 22-29, 2013.

Electronic edition     Bibtex   

[10] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Extending loose associations to multiple fragments". In Data and Applications Security and Privacy XXVII, pages 1-16, Springer, 2013.

Electronic edition     Bibtex   

[11] Yang, Y., Zhang, Y., Wang, A.H., Yu, M., Zang, W., Liu, P. & Jajodia, S. "Quantitative survivability evaluation of three virtual machine-based server architectures". Journal of Network and Computer Applications, 36(2):781-790, Elsevier, 2013.

Electronic edition     Bibtex   

[12] Xiao, Z. & Xiao, Y. "Security and privacy in cloud computing". IEEE Communications Surveys & Tutorials, 15(2):843-859, IEEE, 2013.

Electronic edition     Bibtex   

[13] Jajodia, S., Ghosh, A.K., Subrahmanian, V., Swarup, V., Wang, C. & Wang, X.S. "Moving Target Defense II". Springer, 2013.

Electronic edition     Bibtex   

[14] Albanese, M., Jajodia, S., Singhal, A. & Wang, L. "An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities.". In SECRYPT, pages 207-218, 2013.(Best Paper Award).

Electronic edition     Bibtex    Award

[15] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "On information leakage by indexes over data fragments". In 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), pages 94-98, 2013.

Electronic edition     Bibtex   

[16] Jajodia, S., Litwin, W. & SJ, T.S. "Recoverable encryption through a noised secret over a large cloud". In Transactions on Large-Scale Data-and Knowledge-Centered Systems IX, pages 42-64, Springer, 2013.

Electronic edition     Bibtex   

[17] Chu, Z., Gianvecchio, S., Koehl, A., Wang, H. & Jajodia, S. "Blog or block: Detecting blog bots through behavioral biometrics". Computer Networks, 57(3):634-646, Elsevier, 2013.

Electronic edition     Bibtex   

[18] Albanese, M., Jajodia, S., Jhawar, R. & Piuri, V. "Reliable mission deployment in vulnerable distributed systems". In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), pages 1-8, 2013.

Electronic edition     Bibtex   

[19] Deliri, S. & Albanese, M. "Security-Aware Scheduling of Mission Tasks under Temporal Constraints". In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pages 452-457, 2013.

Electronic edition     Bibtex   

[20] Wang, Z., Sun, K., Jing, J. & Jajodia, S. "Verification of data redundancy in cloud storage". In Proceedings of the 2013 international workshop on Security in cloud computing, pages 11-18, 2013.

Electronic edition     Bibtex   

[21] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Integrity for join queries in the cloud". IEEE Transactions on Cloud Computing, 1(2):187-200, IEEE, 2013.

Electronic edition     Bibtex   

[22] Ardagna, C.A., Jajodia, S., Samarati, P. & Stavrou, A. "Providing users' anonymity in mobile hybrid networks". ACM Transactions on Internet Technology (TOIT), 12(3):7, ACM, 2013.

Electronic edition     Bibtex   

[23] De Benedictis, A., Koosha, B., Albanese, M. & Casola, V. "A probabilistic framework for distributed localization of attackers in manets". In Security and Trust Management, pages 49-64, Springer, 2013.

Electronic edition     Bibtex   

[24] Albanese, M., d'Acierno, A., Moscato, V., Persia, F. & Picariello, A. "A multimedia recommender system". ACM Transactions on Internet Technology (TOIT), 13(1):3, ACM, 2013.

Electronic edition     Bibtex   

[25] Albanese, M., Jajodia, S. & Molinaro, C. "A Logic Framework for Flexible and Security-Aware Service Composition". In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pages 337-346, 2013.

Electronic edition     Bibtex   

[26] Albanese, M., De Benedictis, A., Jajodia, S. & Sun, K. "A moving target defense mechanism for manets based on identity virtualization". In 2013 IEEE Conference on Communications and Network Security (CNS), pages 278-286, 2013.

Electronic edition     Bibtex   

[27] Wang, Z., Sun, K., Jajodia, S. & Jing, J. "Terracheck: Verification of dedicated cloud storage". In Data and Applications Security and Privacy XXVII, pages 113-127, Springer, 2013.

Electronic edition     Bibtex