13 May, 2018
Our paper, "A Provenance Model for the European Union General Data Protection Regulation," will appear during "Provenance Week 2018" at the 7th International Provenance and Annotation Workshop (IPAW'18).
2 May, 2018
Two of our papers have been accepted for publication at the 2018 USENIX Security Symposium:
1 April, 2018
- Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?
- Skill Squatting Attacks on Amazon Alexa
Very excited to announce that I have been awarded an NSF CAREER Award to investigate the design of scalable provenance-based monitoring and enforcement mechanisms! (link)28 March, 2018
Our paper, "AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance," has been accepted at the 38th IEEE International Conference on Distributed Computing Systems (ICDCS'18).2 February, 2018
I have been invited to serve on the program committee for the 2019 IEEE Symposium on Security and Privacy.24 January, 2018
Our paper, "SoK: 'Plug & Pray' Today – Understanding USB Insecurity in Versions 1 through C," has been accepted at the 39th IEEE Symposium on Security and Privacy (Oakland'18)!17 January, 2018
I have been invited to serve on the program committee for the 2018 ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'18).2 November, 2017I am honored to have been recognized as runner up for the 2017 ACM SIGSAC Doctoral Dissertation Award!26 October, 2017
Two of our papers have been accepted for publication at the 2018 ISOC Network and Distributed System Security Symposium (NDSS'18):
12 October, 2017
- Towards Scalable Cluster Auditing through Grammatical Inference
over Provenance Graphs
- Fear and Logging in the Internet of Things
I have been invited to serve on the program committee for the 2018 USENIX Security Symposium.2 June, 2017
I have been invited to serve on the program committee for the 2018 ISOC Network and Distributed System Security Symposium (NDSS'18).22 February, 2017
I have received an NSF Research Initiation Initiative award as the principal investigator of the proposal "Transparent Capture and Aggregation of Secure Data Provenance for Smart Devices."1 February, 2017
I have been invited to serve on the Program Committee for 2017 USENIX Annual Technical Conference (ATC'17).26 January, 2017
I have been invited to serve on the Program Committee for the 33nd Annual Computer Security Applications Conference (ACSAC'17).18 January, 2017
I have been invited to serve on the Program Committee for the 24th ACM Conference on Computer and Communications Security (CCS'17).19 December, 2016
Our paper, "Transparent Web Service Auditing via Network Provenance Functions," has been accepted at the 26th World Wide Web Conference (WWW'17).19 October, 2016
I have been invited to serve as the Program Committee Co-Chair for the 2017 USENIX Workshop on the Theory and Practice of Provenance (TaPP).3 August, 2016
Our paper, "Leveraging Data Provenance to Enhance Cyber Resilience," has been accepted to the 1st IEEE Cybersecurity Development Conference (SecDev '16).22 July, 2016
Our paper, "ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices," has been accepted to the 23rd ACM Conference on Computer and Communications Security (CCS'16).13 May, 2016
Our paper, "Making USB Great Again with USBFILTER," has been conditionally accepted by the 2016 USENIX Security Symposium.11 May, 2016
I have been invited to serve as the Publicity Chair for the 2016 IEEE Symposium on Security & Privacy5 May, 2016
I have been invited to serve on the program committee for the 2017 ISOC Network and Distributed System Security Symposium.2 May, 2016
Today I successfully defended my dissertation, Designing and Leveraging Trustworthy Provenance-Aware Architectures
. Many thanks to my committee and the rest of FICS for their advice and support!15 April, 2016I'm very excited to announce that I will be joining the faculty at the University of Illinois at Urbana-Champaign's Computer Science Department as an Assistant Professor this coming fall.10 February, 2016
Congratulations to my co-authors, Dave (Jing) Tian and Brad Reaves, for winning poster awards in the software and network security categories at the 1st Annual FICS Conference. The poster competition showcased 38 posters in the areas of hardware, software, and network security, and was judged by an independent committee of industry representatives.1 December, 2015
Next week, I will be chairing the "Web Security" and "Potpourri (Part 2)" sessions at ACSAC 2015 in Los Angeles, CA.21 October, 2015
On November 18th, I will be giving a talk at the Pennsylvania State University on our investigation of secure provenance-aware systems, titled "Designing and Leveraging Trustworthy Provenance-Aware Architectures."12 August, 2015
Source code for the Linux Provenance Modules project is now available:
11 August, 2015
- The Red Hat Kernel source code is available here.
- The user space utilities needed by LPM are available here.
- LPM support for the mainline Linux kernel is currently being finalized, and will be released shortly.
Our paper, "GoodUSB -or- How I Learned To Stop Worrying and Love the Rubber Duck," has been conditionally accepted 31st Annual Computer Security Applications Conference (ACSAC'15).11 August, 2015
Wall Street Journal reporter Jennifer Valentino-DeVries has written a piece on our analysis of branchless banking applications. It is available here
.5 June, 2015
Our paper, "Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs," has been accepted at the 7th International Workshop on Theory and Practice of Provenance.19 May, 2015
I have been invited to serve as the Web Chair on the Organizing Committee for the 2016 IEEE Symposium on Security & Privacy12 May, 2015
Three of our papers have been accepted for publication at the 2015 USENIX Security Symposium:
23 April, 2015
- Trustworthy Whole-System Provenance for the Linux Kernel
- Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World
- Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge.
I have successfully proposed my dissertation, titled "Designing and Leveraging a Trustworthy Provenance Stack." It has been accepted by my committee and I have advanced to candidacy.3 February, 2015
I have accepted a summer internship offer to return to MIT Lincoln Laboratory, where we will be continuing to collaborate on building secure provenance-aware systems.23 December, 2014
On January 9th, I will be giving a talk at Carleton University on our work on SSL security, titled "Practical Trust Advancements in the SSL/TLS Ecosystem."