Student Publication and Presentation

(Note: MSSI Student)

  • Jingyang Zou, Zhaoxi Sun, Chunyen Ku, Xiangyang Li, and Anton Dahbura, “WiP: Developing High-interaction Honeypots to Capture and Analyze Region-Specific Bot Behaviors,” The Hot Topics in the Science of Security Symposium (HotSoS 2024), Virtual Event, April 2-4, 2024. (Fall 2023 Project)
  • Luis Rivas, Spencer Stevens, Andrew Zitter, Vinayak Khandelwal, Amodini Vardhan, Chinmay Lohani, Chris Rouff, and Lanier Watkins, “Assuring Safe Navigation and Network Operations of Autonomous Ships,” IEEE Computing and Communication Workshop and Conference (CCWC), January 2024.
  • Taylor Bradley, Lanier Watkins, Elie Alhajjar, and Avi Rubin, “Autonomic Cybersecurity Enhanced with Survival Analysis (ACSeSA)”, In IEEE Local Computer Networks (LCN), October 2023.
  • Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, and Yinzhi Cao, “Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning,” The 32nd USENIX Security Symposium, Anaheim, CA, August 9-11, 2023. (Spring 2022 Project)
  • Yichao Xu, “An improvement for the DCC in ITS-G5 to alleviate the influences of DoS attack,” ISI TR-01, April 2023.
  • V. Manoj, S. Wenda, N. Sihan, C. Rouff, Lanier Watkins, and A. Rubin, “Explainable Autonomic Cybersecurity For Industrial Control Systems,” In IEEE Computing and Communication Workshop and Conference (CCWC), March 2023.
  • Matthew Shonman, Xiaoyu Shi, Mingqing Kang, Zuo Wang, Xiangyang Li, and Anton Dahbura, “Using a Computational Cognitive Model to Understand Phishing Classification Decisions,” The 35th International BCS Human-Computer Interaction Conference (British HCI-2022), Keele University, Keele, Staffordshire, UK, July 11-13, 2022. (Spring-Fall 2019 Project)
  • Qi Cheng, Anyi Xu, Xiangyang Li, and Leah Ding, “Adversarial Email Generation against Spam Detection Models through Feature Perturbation,” The 2022 IEEE International Conference on Assured Autonomy (ICAA’22), Virtual Event, March 22-23, 2022. (Fall 2021 Project)
  • Hedin Beattie, Lanier Watkins, William H. Robinson, Avi Rubin, and Shari Watkins, “Measuring and Mitigating Bias in AI-Chatbots,” In IEEE International Conference on Assured Autonomy, March 2022.
  • Chenran Wang, Danyi Zhang, Suye Huang, Xiangyang Li, and Leah Ding, “Crafting Adversarial Email Content against Machine Learning Based Spam Email Detection,” In Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems (ASSS ’21) with AsiaCCS 2021, Hong Kong, June 7, 2021. (Fall 2020 Project)
  • Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Neil Zhenqiang Gong, and Yinzhi Cao, “Practical Blind Membership Inference Attack via Differential Comparisons,” The Network and Distributed System Security Symposium (NDSS), February 2021. (Fall 2020 Project)
  • Lanier Watkins, James Ballard, Kevin Hamilton, Jay Chow, Avi Rubin, William H. Robinson, and Cleon Davis, “Bio-Inspired, Host-based Firewall,” In IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), December 2020.
  • Lanier Watkins, Kevin D. Fairbanks, Chengyu Li, Mengdi Yang, William H. Robinson, and Aviel Rubin, “A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy”, In IEEE Information Technology, Electronics and Mobile Communication Conference (IEMCON), October, 2020.
  • Lanier Watkins, Yue Yu, Sifan Li, William H. Robinson, and Aviel Rubin, “Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks”, In IEEE Information Technology, Electronics and Mobile Communication Conference (IEMCON), October, 2020.
  • Honghao GuoZuo WangBenfang Wang, Xiangyang Li, and Devu Shila, “Fooling A Deep-Learning Based Gait Behavioral Biometric System,” The Workshop on Assured Autonomous Systems (WAAS) with the IEEE Symposium on Security and Privacy (SP), May 21, 2020. (Fall 2019 Project)
  • Zachary Birnbaum, Matthew Davis, Salman Salman, James Schaffter, Lanier Watkins, Saikiran Yamajala, and Shruti Paul, “Cyber Resilient SCADA Systems via Secure State Restoration”, In International Conference on Critical Infrastructure Protection, March 2020.
  • Shane Sartalamacchia, Richard Bradt, Karan Dhareshwar, Harsimar Bagga, William H. Robinson, Lanier Watkins, and Aviel Rubin, “Defending Against Consumer Drone Privacy Attacks: A Blueprint For A Counter Autonomous Drone Tool”, NDSS Workshop on Decentralized IoT Systems and Security (DISS 2020), February 2020.
  • Jingchi ZhangYu-Tsern Jou, and Xiangyang Li, “Cross-Site Scripting (XSS) Detection Integrating Evidences in Multiple Stages,” Hawaii International Conference on System Sciences (HICSS-52), Grand Wailea, Hawaii, January 8-11, 2019. (Spring 2018 Project)
  • Haoruo Zhang, Digvijay Singh, and Xiangyang Li, “Augmenting Authentication with Context-Specific Behavioral Biometrics,” Hawaii International Conference on System Sciences (HICSS-52), Grand Wailea, Hawaii, January 8-11, 2019. (Fall 2017 Project)
  • Lanier Watkins, Juan Ramos, Gaetano Snow, Jessica Vallejo, William H. Robinson, Aviel D. Rubin, Joshua Ciocco, Felix Jedrzejewski, Jinglun Liu, and Chengyu Li, “Exploiting Multi-Vendor Vulnerabilities as Back-Doors to Counter the Threat of Rogue Small Unmanned Aerial Systems,” In ACM Proceedings of the MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy, June 26, 2018.
  • Cherita Corbett, Jimmy Alexis, and Lanier Watkins, “Who’s Driving You?” In IEEE Annual Consumer Communications & Networking Conference (CCNC), January, 2018.
  • Lanier Watkins, Amritha L. Kalathummarath, and William Robinson, “Network-based Detection of Mobile Malware Exhibiting Obfuscated Or Silent Network Behavior”, In IEEE Annual Consumer Communications & Networking Conference (CCNC), January, 2018.
  • Forest Mead, Jeffrey Zielinski, Lanier Watkins, and William H. Robinson, “A Mobile Two-Way Wireless Covert Timing Channel Suitable for Peer-to-Peer Malware”, In the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), October 2017.
  • Chanyang Shin,  Prerit Chandok,  Ran Liu,  Seth Nielson, Timothy Leschke, “iThings-154,” The 10th IEEE International Conference on Internet of Things (iThings-2017), Exeter, England, UK, June 21-23, 2017. (Spring 2017 Project)
  • Supriya Muthal, Sen Li, Yuan Huang, Xiangyang Li, Nathan Bos, Anton Dahbura, and Kylie Molinaro, A Phishing Study of User Behavior with Incentive and Informed intervention, National Cyber Summit’17, Huntsville, Alabama, June 7-8, 2017. (Fall 2016-Spring 2017 Project)
  • Nikunj Malik, Jayanarayan Chandramouli,  Prahlad Suresh, Kevin D. Fairbanks, Lanier Watkins, and William H. Robinson, “Using Network Traffic To Verify Mobile Device Forensic Artifacts,” The IEEE Consumer Communications & Networking Conference, January 2017. (Spring 2017 Project)
  • Jayanarayan Chandramouli,  Juan Ramos, Lakshmi Srinivasan, Prahlad Suresh, Garth V. Crosby, and Lanier Watkins, “Using Network Traffic to Infer Compromised Neighbors in Wireless Sensor Nodes,” The IEEE Consumer Communications & Networking Conference Workshop, January 2017. (Spring 2017 Project)
  • Lanier Watkins, Sean Beck, Jared Zook, Anna Buczak, Jeffery Chavis, William H. Robinson, Jose A. Morales, and Sameul Mishra, “Using Semi-supervised Machine Learning to Address the Big Data Problem in DNS Networks,” The IEEE Computing and Communication Workshop and Conference, January 2017. (Spring 2017 Project)
  • Rahul Nair, Chinmohan Nayak, Kashif Memon, Lanier Watkins, Kevin Fairbanks, and William H. Robinson, “The Resource Usage Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System”, Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, (edited by Lane Thames and Dirk Schafer), Springer, 2017. (Spring 2016 Project)
  • Michael Hooper , Yifan Tian, Runzuan Zhou, Bin Cao, Adrian P. Lauf, Lanier Watkins, William H. Robinson, Wlajimir Alexis, “Securing Commercial WiFi-Based UAVs From Common Security Attacks,” MilCom 2016, Baltimore, MD, November 1-3, 2016. (Fall 2015 Project)
  • Heng Song and Xiangyang Li, “Collaborative Detection of Covert Storage Channels,” MilCom 2016, Baltimore, MD, November 1-3, 2016. (Fall 2014 Project)
  • Rahul Nair, Chinmohan Nayak, Kashif Memon, Lanier Watkins, Kevin Fairbanks, and William H. Robinson,”An Inference-Based Industrial Control System (ICS) Intrusion Detection Prototype”,Malware Technical Exchange Meeting (MTEM), June 2016.  (Spring 2016 Project)
  • Lanier Watkins, John Hurley, Shuang Xie, and Tianning Yang, “Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications”, Journal of Information Warfare (JIW), October 2016. (Fall 2016 Project)
  • Yiyuan Hu, Xiangyang Li, and Xenia Mountrouidou, Improving Covert Storage Channel Analysis with SDN and Experimentation on GENI, National Cyber Summit’16, Huntsville, Alabama, June 7-9, 2016. (Fall 2015 Project)
  • Lanier Watkins, Kurt Silberberg, Jose A Morales, and William H. Robinson, “Using Inherent Command and Control Vulnerabilities To Halt DDoS Attacks,” In IEEE Proceedings of the International Conference on Malicious and Unwanted Software (MALCON), October 2015. (Spring 2015 Project)
  • Georgios Lontorfos, Kevin D Fairbanks, Lanier Watkins, and William H. Robinson, “Remotely Inferring Device Manipulation of Industrial Control Systems Via Network Behavior,” In Proceedings of IEEE Workshop on Network Measurements (WNM), October 2015. (Fall 2014 Project)
  • Fangyue Chen, Yunke Wang, Heng Song, and Xiangyang Li, “A Statistical Study of Covert Timing Channels Using Network Packet Frequency,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2015), Baltimore, May 2015. (Spring 2014 Project)
  • Matthew Brocker and Steve Checkoway, “iSeeYou: Disabling the MacBook Webcam Indicator LED,” In K. Fu, ed. Proceedings of USENIX Security 2014. USENIX, August 2014. (Spring 2013 Project)
  • Christina Kawka, Benjamin Schmidt, Lanier Watkins, Cherita Corbett, and Kevin Fairbanks, “Fighting Banking Trojans: The Offensive Tactical Reconnaissance (OTR) Platform,” Malware Technical Exchange Meeting (MTEM) 2014, July 2014. (Spring 2014 Project)
  • Mengchao Yue, William H. Robinson, Lanier Watkins, and Cherita Corbett, “Constructing Timing-Based Covert Channels in Mobile Networks by Adjusting CPU Frequency,” Hardware and Architectural Support for Security and Privacy (HASP 2014) / The 41st International Symposium on Computer Architecture (ISCA 2014), June 2014. (Fall 2013 Project)

JHU Information Security Institute