Jelena Mirkovic
Jelena Mirkovic

homepage
mirkovicatisi.edu

  Affiliation history
Bibliometrics: publication history
Average citations per article12.30
Citation Count566
Publication count46
Publication years2002-2017
Available for download18
Average downloads per article1,050.78
Downloads (cumulative)18,914
Downloads (12 Months)1,723
Downloads (6 Weeks)189
SEARCH
ROLE
Arrow RightAuthor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


46 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 46
Result page: 1 2 3

Sort by:

1 published by ACM
December 2017 ACM Transactions on Privacy and Security (TOPS): Volume 21 Issue 1, January 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 28,   Downloads (12 Months): 44,   Downloads (Overall): 44

Full text available: PDFPDF
Malware analysis relies heavily on the use of virtual machines (VMs) for functionality and safety. There are subtle differences in operation between virtual and physical machines. Contemporary malware checks for these differences and changes its behavior when it detects a VM presence. These anti-VM techniques hinder malware analysis. Existing research ...
Keywords: assembly, virtual machine testing, reverse engineering, System security

2 published by ACM
December 2017 ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 43,   Downloads (12 Months): 60,   Downloads (Overall): 60

Full text available: PDFPDF
Differential privacy has emerged as a promising mechanism for privacy-safe data mining. One popular differential privacy mechanism allows researchers to pose queries over a dataset, and adds random noise to all output points to protect privacy. While differential privacy produces useful data in many scenarios, added noise may jeopardize utility ...
Keywords: privacy, network traces, data sharing

3 published by ACM
December 2017 ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 32,   Downloads (12 Months): 57,   Downloads (Overall): 57

Full text available: PDFPDF
IP spoofing has been a persistent Internet security threat for decades. While research solutions exist that can help an edge network detect spoofed and reflected traffic, the sheer volume of such traffic requires handling further upstream. We propose RESECT---a self-learning spoofed packet filter that detects spoofed traffic upstream from the ...
Keywords: traffic filtering, DDoS defense, IP spoofing

4 published by ACM
April 2017 SAC '17: Proceedings of the Symposium on Applied Computing
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 41,   Downloads (Overall): 41

Full text available: PDFPDF
Malware analysis uses debuggers to understand and manipulate the behaviors of stripped binaries. To circumvent analysis, malware applies a variety of anti-debugging techniques, such as self-modifying, checking for or removing breakpoints, hijacking keyboard and mouse events, escaping the debugger, etc. Most state-of-the-art debuggers are vulnerable to these anti-debugging techniques. In ...
Keywords: malware analysis, anti-debugging

5 published by ACM
December 2016 ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 104,   Downloads (Overall): 125

Full text available: PDFPDF
Passwords are widely used for user authentication, but they are often difficult for a user to recall, easily cracked by automated programs and heavily reused. Security questions are also used for secondary authentication. They are more memorable than passwords, but are very easily guessed. We propose a new authentication mechanism, ...

6
June 2015 ICDCSW '15: Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In this paper we demonstrate the ease of generating and modifying background traffic in testbed experiments through the traffic generation framework we developed, called LegoTG. LegoTG is a modular framework for composing custom traffic generation. It makes it easy to combine different traffic generators and traffic modulators (e.g., Delay models), ...
Keywords: traffic generation, testbeds, experiment orchestration, traffic generation

7 published by ACM
November 2014 WISCS '14: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 18,   Downloads (Overall): 101

Full text available: PDFPDF
Access to current application and network data is vital to cybersecurity and networking research. Intrusion detection, steganography, traffic camouflaging, traffic classification and modeling all benefit from real-world data. Such data provides training, testing, and evaluation as well as furthers efforts to reach ground truth. Currently available network data--especially data with ...
Keywords: cybersecurity, network traces, content-rich, k-anonymity, network behavior, data collection, end-user data

8
August 2014 SEC'14: Proceedings of the 23rd USENIX conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 1

Malware analysis relies heavily on the use of virtual machines for functionality and safety. There are subtle differences in operation between virtual machines and physical machines. Contemporary malware checks for these differences to detect that it is being run in a virtual machine, and modifies its behavior to thwart being ...

9
August 2014 CSET'14: Proceedings of the 7th USENIX conference on Cyber Security Experimentation and Test
Publisher: USENIX Association
Bibliometrics:
Citation Count: 2

In this paper, we advocate for publicly accessible live malware experimentation testbeds. We introduce new advancements for high-fidelity transparent emulation and fine-grain automatic containment that make such experimentation safe and useful to researchers, and we propose a complete, extensible live-malware experimentation framework. Our framework, aided by our new technologies, facilitates ...

10 published by ACM
August 2014 SIGCOMM '14: Proceedings of the 2014 ACM conference on SIGCOMM
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 93,   Downloads (Overall): 604

Full text available: PDFPDF
We propose a new software-defined security service -- SENSS -- that enables a victim network to request services from remote ISPs for traffic that carries source IPs or destination IPs from this network's address space. These services range from statistics gathering, to filtering or quality of service guarantees, to route ...
Keywords: design, privacy, security, SDN, management
Also published in:
February 2015  ACM SIGCOMM Computer Communication Review - SIGCOMM'14: Volume 44 Issue 4, October 2014

11
April 2013 Journal of Computing Sciences in Colleges: Volume 28 Issue 4, April 2013
Publisher: Consortium for Computing Sciences in Colleges
Bibliometrics:
Citation Count: 0

This tutorial will introduce the participants to the DeterLab testbed and demonstrate how to use it in research and in education. DeterLab is publicly available and free network testbed hosted by USC/ISI and UC Berkeley that is geared towards security experimentation. It has 500+ nodes, 3,000+ users and is extensively ...

12 published by ACM
November 2012 IMC '12: Proceedings of the 2012 Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 10,   Downloads (Overall): 127

Full text available: PDFPDF
Network testbeds have become widely used in computer science, both for evaluation of research technologies and for hands-on teaching. This can naturally lead to oversubscription and resource allocation failures, as limited testbed resources cannot meet the increasing demand. This paper examines the causes of resource allocation failures on DeterLab testbed ...
Keywords: resource allocation, emulab, network testbeds

13
August 2012 CSET'12: Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

Many network testbeds today allow users to create their own disk images as a way of saving experimental state between allocations. We examine the effect of this practice on testbed operations. We find that disk imaging is very popular among both research and class users. Excessive disk image creation makes ...

14
January 2012 IEEE Security and Privacy: Volume 10 Issue 1, January 2012
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 5

The DETER project aims to advance cybersecurity research and education. Over the past seven years, the project has focused on improving and redefining the methods, technology, and infrastructure for developing cyberdefense technology. The project's research results are put into practice by DeterLab, a public, free-for-use experimental facility available to researchers ...
Keywords: DETER project, DeterLab, computer security, cybersecurity, computer science education, computer security education

15
March 2011 NSDI'11: Proceedings of the 8th USENIX conference on Networked systems design and implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 3

Effective analysis of raw data from networked systems requires bridging the semantic gap between the data and the user's high-level understanding of the system. The raw data represents facts about the system state and analysis involves identifying a set of semantically relevant behaviors, which represent "interesting" relationships between these facts. ...

16
March 2011 IEEE Transactions on Dependable and Secure Computing: Volume 8 Issue 2, March 2011
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 5

IP spoofing exacerbates many security threats, and reducing it would greatly enhance Internet security. Seven defenses that filter spoofed traffic have been proposed to date; three are designed for end-network deployment, while four assume some collaboration with core routers for packet marking or filtering. Because each defense has been evaluated ...
Keywords: packet filtering, IP spoofing, packet filtering, spoofing defense evaluation., spoofing defense evaluation., IP spoofing

17
July 2010 International Journal of Communication Networks and Distributed Systems: Volume 5 Issue 1/2, July 2010
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 0

Worm experimentation is challenging for researchers today because of the lack of standardised tools to simulate and emulate worm spreads in a realistic setting. We have developed two tools for the DETER testbed to aid in worm experimentation: the PAWS simulator for internet-wide worm propagation studies and the WE emulator ...
Keywords: distributed systems, emulation, network testbeds, worm spread, communication networks, internet worms, local area networks, worm defence, LANs, malware, simulation, worm experimentation, worm propagation

18
July 2010 International Journal of Communication Networks and Distributed Systems: Volume 5 Issue 1/2, July 2010
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 0

Worm experimentation is challenging for researchers today because of the lack of standardised tools to simulate and emulate worm spreads in a realistic setting. We have developed two tools for the DETER testbed to aid in worm experimentation: the PAWS simulator for internet-wide worm propagation studies and the WE emulator ...
Keywords: distributed systems, emulation, network testbeds, worm spread, communication networks, internet worms, local area networks, worm defence, LANs, malware, simulation, worm experimentation, worm propagation

19
December 2009 ACSAC '09: Proceedings of the 2009 Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

Reflector attacks are a variant of denial-of-service attacks that use unwitting, legitimate servers to flood a target. The attacker spoofs the target's address in legitimate service requests, such as TCP SYN packets. The servers, called "reflectors,'' reply to these requests, flooding the target. RAD is a novel defense against reflector ...
Keywords: RAD, Reflector Attack, DoS, MAC, IP Spoofing

20
June 2009 ICC'09: Proceedings of the 2009 IEEE international conference on Communications
Publisher: IEEE Press
Bibliometrics:
Citation Count: 9

Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests are identical in content to those generated by legitimate, human users, and bots send at a low rate to appear non-aggressive -- these features ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us