Wenke
Lee
Professor and John P. Imlay Jr. Chair
School of Cybersecurity and Privacy
School of Computer Science
College of Computing
The Georgia Institute of Technology
266 Ferst Drive
Atlanta, GA 30332-0280 |
(404) 385-2879 (phone)
(404) 385-2295 (fax)
wenke@cc.gatech.edu
http://wenke.gtisc.gatech.edu/ |
Research Interests
Systems and Network Security, Applied Cryptography, and
Machine Learning
Education
Ph.D. in Computer Science, Columbia University,
New York, NY. 1994-1999.
Dissertation: A Data Mining Framework for Constructing
Features and Models for Intrusion Detection Systems.
Advisor: Salvatore J. Stolfo.
M.S. in Computer Science, The City College of New York,
New York, NY. 1988-1990.
B.S. in Computer Science, SUN YAT-SEN University,
Guangzhou, China. 1984-1988.
Professional Experience
John P. Imlay Jr. Chair, College of Computing, Georgia Institute of Technology,
Atlanta, GA. 3/2016 - present.
Director, Institute for Information Security &
Privacy (IISP) at Georgia Tech. 7/2015 - 2021.
Director, Georgia Tech Information Security Center
(GTISC). 8/2012 - 6/2015.
Professor, College of Computing, Georgia Institute of Technology, Atlanta,
GA. 2/2009 - present.
Associate Professor, College of Computing, Georgia Institute of Technology, Atlanta,
GA. 3/2005 - 2/2009.
Assistant Professor, College of Computing, Georgia Institute of Technology, Atlanta,
GA. 8/2001 - 3/2005.
Assistant Professor, Department of Computer Science, North Carolina State University, Raleigh,
NC. 7/1999 - 8/2001.
Summer Research Staff Member, IBM T.J. Watson Research Center,
Hawthorn, NY. 5/1997 - 8/1997.
Summer Member of Technical Staff, AT&T Labs - Research, Murray
Hill, NJ. 5/1996 - 8/1996.
Senior Software Analyst, Intergraph Corporation, Huntsville,
AL. 4/1991 - 8/1994.
Software Analyst, Intergraph Corporation, Huntsville,
AL. 4/1990 - 4/1991.
Awards and Honors
Distinguished Service Award, IEEE Technical
Committee on Security and Privacy, 2022.
IEEE Fellow, 2021.
Keynote at the ACM Conference on Computer and Communications
Security (CCS), 2020.
ACM SIGSAC (Special Interest Group on Security, Audit
and Control) Outstanding Innovation Award for "pioneering contributions to
network and systems security, in particular, machine-learning based
approaches to security analytics, including tackling intrusion and
botnet detection", 2019.
CCS Test of Time Award, The 25th ACM Conference on Computer and
Communications Security (CCS), for the paper "Artem Dinaburg, Paul
Royal, Monirul Sharif, and Wenke Lee. Ether: Malware Analysis via
Hardware Virtualization Extensions" published in CCS 2008 that
have had the greatest impact on security research and practice over the
past decade, 2018.
ACM Fellow, 2017.
Distinguished Practical Paper Award, for the paper: "Yanick
Fratantonio, Chenxiong Qian, Pak Chung, and Wenke Lee. Cloak and
Dagger: From Two Permissions to Complete Control of the UI Feedback
Loop" in Proceedings of The 2017 IEEE Symposium on Security and
Privacy, 2017.
Internet Defense Prize, awarded by Facebook and USENIX, for
the paper: "Byoungyoung Lee, Chengyu Song, Taesoo Kim, and Wenke
Lee. Type Casting Verification: Stopping an Emerging Attack Vector"
in Proceedings Proceedings of The 24th USENIX Security Symposium,
2015.
Cyber Is A Global Sport Award (awarded to David Dagon and
Wenke Lee), Department of Homeland Security, Science and Technology
Directorate, Cyber Security Division, 2015.
Outstanding Achievement in Research Program Development
Award, (awarded to Mustaque Ahamad, Wenke Lee, Paul Royal, and David
Dagon), Georgia Institute of Technology, 2015.
Outstanding Community Service Award, IEEE Technical
Committee on Security and Privacy, 2013.
Outstanding Faculty Leadership for the Development of GRAs
Award, Georgia Institute of Technology, 2012.
Sigma Xi Faculty Best Paper Award, Georgia Institute of
Technology, 2010.
Best Student Paper Award, IEEE Symposium on Security and
Privacy, for the paper: "Monirul Sharif, Andrea Lanzi, Jon Giffin, and Wenke
Lee. Automatic Reverse Engineering of Malware Emulators", 2009.
Outstanding Senior Faculty Research Award, College of Computing,
Georgia Institute of Technology, 2009.
Raytheon Faculty Fellowship Award, College of Computing,
Georgia Institute of Technology, 2005.
NSF CAREER Award, 2002.
Best Paper Award, Applied Research Category, the 5th ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining
(KDD '99), August 1999 (with Kui Mok and Sal Stolfo).
Honorable mention (runner-up) for Best Paper Award,
Applied Research Category, the 4th International Conference on
Knowledge Discovery and Data Mining (KDD '98), August 1998.
Honorable mention (runner-up) for Best Paper Award,
Applied Research Category, the 3rd International Conference on
Knowledge Discovery and Data Mining (KDD '97), August 1997.
Publications
Articles in Refereed Journals
- Yisroel Mirsky and Wenke Lee. The Creation and Detection of
Deepfakes: A Survey. ACM Computing Surveys. (to
appear)
- Kangjie Lu, Meng Xu, Chengyu Song, Taesoo Kim, and Wenke
Lee. Stopping Memory Disclosures via Diversification and Replicated
Execution. IEEE Transactions on Dependable and Secure Computing
(TDSC). 18(1), 2021.
- Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark,
Linda Bushnell, Wenke Lee, and Radha Poovendran. A Game-Theoretic
Approach for Dynamic Information Flow Tracking to Detect Multistage
Advanced Persistent Threats. IEEE Transactions on Automatic
Control. 65(12): 5248-5263, 2020.
- Junjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz, and
Xiapu Luo. Building a Scalable System for Stealthy P2P-Botnet
Detection. IEEE Transactions on Information Forensics and
Security, 9(1), January 2014.
- Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto,
and Wenke Lee. McPAD: A Multiple Classifier System for Accurate
Payload-Based Anomaly Detection. Computer Networks, 53(6),
2009.
- Roberto Perdisci, Andrea Lanzi, and Wenke Lee. Classification
of Packed Executables for Accurate Computer Virus Detection.
Pattern Recognition Letters, 29(14), October 2008.
- Prahlad Fogla and Wenke Lee. q-Gram Matching Using Tree
Models. IEEE Transactions on Knowledge and Data
Engineering, 18(4), April 2006.
- W. Fan, M. Miller, S. Stolfo, W. Lee, and P. Chan. Using
Artificial Anomalies to Detect Unknown and Known Network
Intrusions. Knowledge and Information Systems, Springer, 6(5),
September 2004.
- Yongguang Zhang, Wenke Lee, and Yian Huang. Intrusion Detection Techniques for Mobile
Wireless Networks. ACM/Kluwer Wireless Networks Journal (ACM
WINET), 9(5), September 2003.
- Joao B. D. Cabrera, Lundy Lewis, Xinzhou Qin, Wenke Lee, and
Raman K. Mehra. Proactive Intrusion Detection and Distributed Denial
of Service Attacks - A Case Study in Security Management. Journal
of Network and Systems Management, 10(2), June 2002.
- Wenke Lee, Wei Fan, Matt Miller, Sal Stolfo, and Erez
Zadok. Toward Cost-Sensitive Modeling for
Intrusion Detection and Response. Journal of Computer
Security, 10(1,2), 2002.
- Wenke Lee and Sal Stolfo. A
Framework for Constructing Features and Models for Intrusion Detection
Systems. ACM Transactions on Information and System
Security, 3(4), November 2000.
- Wenke Lee, Sal Stolfo, and Kui Mok. Adaptive
Intrusion Detection: A Data Mining Approach. Artificial
Intelligence Review, Kluwer Academic Publishers, 14(6):533-567,
December 2000.
- Wenke Lee and Gail E. Kaiser. Interfacing
Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with
a Standard Object Management System. Journal of Systems
Integration, Kluwer Academic Publishers, 9(4):329-358, December
1999.
Refereed Book Chapters
- Xinzhou Qin and Wenke Lee. Discovering Novel Attack
Strategies from INFOSEC Alerts. Data Warehousing and Data
Mining Techniques for Cyber Security. Anoop Singhal (eds),
Springer, 2007.
- Yongguang Zhang and Wenke Lee. Security in Mobile Ad-Hoc
Networks. Ad Hoc Networks: Technologies and
Protocols. P. Mohapatra and S. Krishnamurthy (eds), Springer,
2004.
- Xinzhou Qin, Wenke Lee, Lundy Lewis, Joao B. Cabrera. Using MIB
II Variables for Network Intrusion Detection. Applications of
Data Mining in Computer Security. D. Barbara and S. Jajodia
(eds), Kluwer Academic Publishers, May 2002.
- Joao B.D. Cabrera, Lundy Lewis, Xinzhou Qin, Wenke Lee, Raman
K. Mehra. Proactive Intrusion Detection - A Study on Temporal Data
Mining. Applications of Data Mining in Computer
Security. D. Barbara and S. Jajodia (eds), Kluwer Academic
Publishers, May 2002
- Wenke Lee, Sal Stolfo, and Kui Mok.
Algorithms for Mining System Audit Data. Data Mining, Rough
Sets, and Granular Computing, T. Y. Lin Y. Y. Yao, and
L. A. Zadeh (eds), Physica-Verlag, 2002.
- Wenke Lee and Naser Barghouti. Jadve: An
Extensible Data Visualization Environment. Object-Oriented
Applications Frameworks, M. Fayad, D. Schmidt, and R. Johnson
(eds), John Wiley & Sons, 1999.
Edited Proceedings
- Proceedings of the Second ACM Conference on Wireless
Network Security (WISEC 2009), David A. Basin, Srdjan Capkun,
Wenke Lee (Eds.), Zurich, Switzerland, March 16-19, 2009, ACM, 2009.
- Botnet Detection: Countering the Largest Security Threat
(Advances in Information Security), Wenke Lee, Cliff Wang, and
David Dagon (Eds.), Springer, 2007.
- Proceedings of the 4th International Symposium on Recent
Advances in Intrusion Detection (RAID 2001), Wenke Lee,
Ludovic Me, and Andreas Wespi (Eds.), Lecture Notes in Computer
Science, Vol. 2212, Springer, 2001.
Papers in Refereed Conferences
- Carter Yagemann, Simon Chung, Brendan Saltaformaggio,
and Wenke Lee. Automated Bug Hunting With Data-Driven Symbolic Root Cause
Analysis. In Proceedings of the ACM SIGSAC Conference
on Computer and Communications Security (CCS). 2021.
- Carter Yagemann, Mohammad Noureddine, Wajih Hassan, Simon
Chung, Adam Bates, and Wenke Lee. Validating the Integrity of Audit
Logs Against Execution Repartitioning Attacks. In Proceedings of
the ACM SIGSAC Conference on Computer and Communications Security
(CCS). 2021.
- Erkam Uzun, Simon P. Chung, Vladimir Kolesnikov, Alexandra
Boldyreva, and Wenke Lee. Fuzzy Labeled Private Set Intersection
with Applications to Private Real-Time Biometric Search. In
Proceedings of the 2021 USENIX Security Symposium. 2021.
- Evan Downing, Kyuhong Park, Yisroel Mirsky, and Wenke
Lee. DeepReflect: Discovering Malicious Functionality through Binary
Reconstruction. In Proceedings of the 2021 USENIX Security
Symposium. 2021.
- Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon
Bittick, Brendan Saltaformaggio, and Wenke Lee. ARCUS: Symbolic Root
Cause Analysis of Exploits in Production Systems. In
Proceedings of the 2021 USENIX Security Symposium. 2021.
- Feng Xiao, Jianwei Huang, Yichang Xiong, Guangliang Yang, Hong
Hu, Guofei Gu, and Wenke Lee. Abusing Hidden Properties to Attack
the Node.js Ecosystem. In Proceedings of the 2021 USENIX
Security Symposium. 2021.
- Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan
Downing, Hong Hu, and Wenke Lee. Identifying Behavior Dispatchers
for Malware Analysis. In Proceedings of the 16th ACM ASIA
Conference on Computer and Communications Security (ACM AsiaCCS
2021).
- Erkam Uzun, Carter Yagemann, Simon P. Chung, Vladimir
Kolesnikov, and Wenke Lee. Cryptographic Key Derivation from
Biometric Inferences for Remote Authentication. In Proceedings
of the 16th ACM ASIA Conference on Computer and Communications
Security (ACM AsiaCCS 2021).
- Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu
Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou,
Wenke Lee, and Wenchang Shi. SEPAL: Towards a Large-scale Analysis
of SEAndroid Policy Customization. In Proceedings of The Web
Conference 2021 (WWW 2021).
- Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang,
Dinghao Wu, and Wenke Lee. One Engine to Fuzz 'em All: Generic
Language Processor Testing with Semantic Validation. In
Proceedings of the 41st IEEE Symposium on Security and Privacy
(Oakland). 2021.
- Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder,
Brendan Saltaformaggio, and Wenke Lee. Towards Measuring Supply
Chain Attacks on Package Managers for Interpreted Languages. In
Proceedings of the Network and Distributed System Security Symposium
(NDSS). 2021.
- Carter Yagemann, Simon P. Chung, Erkam Uzun, Sai Ragam,
Brendan Saltaformaggio, and Wenke Lee. On the Feasibility of
Automating Stock Market Manipulation. In Proceedings of the
Annual Computer Security Applications Conference (ACSAC). 2020.
- Chenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, and
Wenke Lee. Slimium: Debloating the Chromium Browser with Feature
Subsetting. In Proceedings of the ACM SIGSAC Conference on
Computer and Communications Security (CCS). 2020.
- Joey Allen, Zheng Yang, Matthew Landen, Raghav Bhat, Harsh
Grover, Andrew Chang, Yang Ji, Roberto Perdisci, and Wenke
Lee. Mnemosyne: An Effective and Efficient Postmortem Watering Hole
Attack Investigation System. In Proceedings of the ACM SIGSAC
Conference on Computer and Communications Security
(CCS). 2020.
- Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee,
and Dinghao Wu. SQUIRREL: Testing Database Management Systems with
Language Validity and Coverage Feedback. In Proceedings of the
ACM SIGSAC Conference on Computer and Communications Security
(CCS). 2020.
- Dinuka Sahabandu, Joey Allen, Shana Moothedath, Linda
Bushnell, Wenke Lee, and Radha Poovendran. Quickest Detection of
Advanced Persistent Threats: A Semi-Markov Game Approach. In
Proceedings of the ACM/IEEE International Conference on
Cyber-Physical Systems (ICCPS). 2020.
- D. Sahabandu, S. Moothedath, J. Allen, A. Clark, L. Bushnell,
Wenke Lee, and R. Poovendran. Dynamic Information Flow Tracking
Games for Simultaneous Detection of Multiple Attackers. In
Proceedings of the IEEE Conference on Decision and Control
(CDC). Nice, France, December 2019.
- S. Misra, S. Moothedath, H. Hosseini, J. Allen, L. Bushnell,
Wenke Lee, and R. Poovendran. Learning Equilibria in Stochastic
Information Flow Tracking Games with Partial Knowledge. In
Proceedings of the IEEE Conference on Decision and Control
(CDC). Nice, France, December 2019.
- Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda
Bushnell, Wenke Lee, and Radha Poovendran. Stochastic Dynamic
Information Flow Tracking Game with Reinforcement Learning. In
Proceedings of the 2019 Conference on Decision and Game Theory for
Security. Stockholm, Sweden, October 2019.
- Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung,
Taesoo Kim, and Wenke Lee. RAZOR: A Framework for Post-deployment
Software Debloating. In Proceedings of the 28th USENIX Security
Symposium. Santa Clara, CA, August 2019.
- Dinuka Sahabandu, Shana Moothedath, Linda Bushnell, Radha
Poovendran, Joey Aller, Wenke Lee, and Andrew Clark. A Game
Theoretic Approach for Dynamic Information Flow Tracking with
Conditional Branching. In Proceedings of the 2019 American
Control Conference (ACC). Philadelphia, PA, July 2019.
- Carter Yagemann, Salmin Sultana, Li Chen, and Wenke
Lee. Barnum: Detecting Document Malware via Control Flow Anomalies
in Hardware Traces. In Proceedings of the International
Conference on Information Security (ISC). 2019.
- Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan
Xiong, Moses Ike, Brendan Saltaformaggio, and Wenke Lee. Automating
Patching of Vulnerable Open-Source Software Versions in Application
Binaries. In Proceedings of the 2019 Network and Distributed
System Security Symposium (NDSS). San Diego, CA, February 2019.
- Joey Allen, Matthew Landen, Sanya Chaba, Yang Ji, Simon Pak Ho
Chung, and Wenke Lee. Improving Accuracy of Android Malware
Detection with Lightweight Contextual Awareness. In Proceedings
of the 34th Annual Computer Security Applications Conference
(ACSAC). December, 2018.
- Dinuka Sahabandu, Baicen Xiao, Andrew Clark, Sangho Lee, Wenke
Lee, and Radha Poovendran. DIFT Games: Dynamic Information Flow
Tracking Games for Advanced Persistent Threats. In Proceedings
of The 57th IEEE Conference on Decision and Control
(CDC). Miami Beach, FL, December 2018.
- Shana Moothedath, Dinuka Sahabandu, Andrew Clark, Sangho Lee,
Wenke Lee, and Radha Poovendran. Multi-Stage Dynamic Information
Flow Tracking Game. In Proceedings of The 9th Conference on
Decision and Game Theory for Security (GameSec). Seattle, WA,
October 2018.
- Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung,
Bill Harris, Taesoo Kim, and Wenke Lee. Enforcing Unique Code Target
Property for Control-Flow Integrity. In Proceedings of The 25th
ACM Conference on Computer and Communications Security (CCS
2018). Toronto, Canada, October 2018.
- Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke
Lee, and Yanick Fratantonio. Checking Open-Source License Violation
and 1-day Security Risk at Large Scale. In Proceedings of The
25th ACM Conference on Computer and Communications Security (CCS
2018). Toronto, Canada, October 2018.
- Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing,
Taesoo Kim, Alessandro Orso, and Wenke Lee. Enabling Refinable
Cross-Host Attack Investigation with Efficient Data Flow Tagging and
Tracking. In Proceedings of the 27th USENIX Security
Symposium. Baltimore, MD, August 2018
- Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni
Vigna, and Christopher Kruegel, and Wenke Lee. Rampart: Protecting
Web Applications from CPU-Exhaustion Denial-of-Service Attacks. In
Proceedings of the 27th USENIX Security Symposium. Baltimore,
MD, August 2018
- Erkam Uzun, Simon Pak Ho Chung, Irfan Essa, and Wenke
Lee. rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection
System. In Proceedings of The 2018 Network and Distributed
System Security Symposium (NDSS). San Diego, CA, February 2018.
- Antonio Bianchi, Yanick Fratantonio, Aravind Machiry,
Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, and Wenke
Lee. Broken Fingers: On the Usage of the Fingerprint API in
Android. In Proceedings of The 2018 Network and Distributed
System Security Symposium (NDSS). San Diego, CA, February 2018.
- Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, and Wenke
Lee. Checking Open-Source License Violation and 1-day Security Risk
at Large Scale. In Proceedings of The 24th ACM Conference on
Computer and Communications Security (CCS 2017). Dallas, Texas,
October 2017.
- Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia
Fazzini, Taesoo Kim, Alessandro Orso, and Wenke Lee. RAIN: Refinable
Attack Investigation with On-demand Inter-Process Information Flow
Tracking. In Proceedings of The 24th ACM Conference on Computer
and Communications Security (CCS 2017). Dallas, Texas, October
2017.
- Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo
Kim, and Wenke Lee. Efficient Protection of Path-Sensitive Control
Security. In Proceedings of the 26th USENIX Security
Symposium. Vancouver, BC, Canada, August 2017.
- Meng Xu, Kangjie Lu, Taesoo Kim, and Wenke Lee. Bunshin:
Compositing Security Mechanisms through Diversification. In
Proceedings of the 2017 USENIX Annual Technical Conference.
Santa Clara, CA, July 2017.
- Yanick Fratantonio, Chenxiong Qian, Pak Chung, and Wenke
Lee. Cloak and Dagger: From Two Permissions to Complete Control of
the UI Feedback Loop. In Proceedings of The 2017 IEEE Symposium
on Security and Privacy. San Jose, CA, May 2017
(Distinguished Practical Paper Award).
- Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan
Nuernberger, Wenke Lee, and Michael Backes. Unleashing
Use-Before-Initialization Vulnerabilities in the Linux Kernel Using
Targeted Stack Spraying. In Proceedings of The 2017 Network and
Distributed System Security Symposium (NDSS). San Diego, CA,
February 2017.
- Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing
Huang, Peng Liu, and Wenke Lee. From Physical to Cyber: Escalating
Protection for Personalized Auto Insurance. In Proceedings of
The 14th ACM Conference on Embedded Networked Sensor Systems
(SenSys 2016). Stanford, CA, November 2016.
- Kangjie Lu, Chengyu Song, Taesoo Kim, and Wenke Lee. UniSan:
Proactive Kernel Memory Initialization to Eliminate Data
Leakages. In Proceedings of The 23rd ACM Conference on Computer
and Communications Security (CCS 2016). Vienna, Austria, October 2016.
- Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin
Nadji, David Dagon, Wenke Lee, and Michael Farrell. Financial Lower
Bounds of Online Advertising Abuse - A Four Year Case Study of the
TDSS/TDL4 Botnet. In Proceedings of The 13th Conference on
Detection of Intrusions and Malware & Vulnerability Assessment
(DIMVA 2016). Sebastian, Spain, July 2016.
- Chengyu Song, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung
Lee, Taesoo Kim, Wenke Lee, and Yunheung Paek. HDFI:
Hardware-Assisted Data-flow Isolation. In Proceedings of The
37th IEEE Symposium on Security and Privacy, San Jose, CA, May
2016. (to appear)
- Wei Meng, Byoungyoung Lee, Xinyu Xing, and Wenke
Lee. TrackMeOrNot: Enable Flexible Control on Web Tracking. In
Proceedings of The 25th International World Wide Web
Conference (WWW), Montreal, Canada, April 2016. (to
appear)
- Wei Meng, Ren Ding, Simon P. Chung, Steven Han, and Wenke
Lee. The Price of Free: Privacy Leakage in Personalized Mobile
In-Apps Ads. In Proceedings of The 2016 Network and Distributed
System Security Symposium (NDSS), San Diego, CA, February,
2016.
- Kangjie Lu, Wenke Lee, Stefan Nurnberger, and Michael
Backes. How to Make ASLR Win the Clone Wars: Runtime
Re-Randomization. In Proceedings of The 2016 Network and
Distributed System Security Symposium (NDSS), San Diego, CA,
February, 2016.
- Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris,
Taesoo Kim and Wenke Lee. Enforcing Kernel Security Invariants with
Data Flow Integrity. In Proceedings of The 2016
Network and Distributed System Security Symposium
(NDSS), San Diego, CA, February, 2016.
- Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, and Wenke
Lee. UCognito: Private Browsing without Tears. In
Proceedings of The 22nd ACM Conference on Computer and
Communications Security (CCS), Denver, CO, October
2015.
- Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung,
Taesoo Kim, and Wenke Lee. ASLR-Guard: Stopping Address Space
Leakage for Code Reuse Attacks. In Proceedings of The 22nd ACM
Conference on Computer and Communications Security (CCS),
Denver, CO, October 2015.
- Byoungyoung Lee, Chengyu Song, Taesoo Kim, and Wenke Lee. Type
Casting Verification: Stopping an Emerging Attack Vector. In
Proceedings of The 24th USENIX Security Symposium, Washington,
D.C., August 2015. (Awarded the Internet Defense Prize
by Facebook and USENIX)
- Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol
Sheth, Roberto Perdisci, and Wenke Lee. Unraveling the Relationship
Between Ad-Injecting Browser Extensions and Malvertising. In
Proceedings of The 24th International World Wide Web Conference
(WWW), Florence, Italy, May 2015.
- Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, and David
Melski. Exploiting and Protecting Dynamic Code Generation. In
Proceedings of The 2015 Network and Distributed System Security
Symposium (NDSS), San Diego, CA, February 2015.
- Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang,
Taesoo Kim, Long Lu, and Wenke Lee. Preventing Use-after-free with
Dangling Pointers Nullification. In Proceedings of The 2015
Network and Distributed System Security Symposium (NDSS), San
Diego, CA, February 2015.
- Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long
Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, and Guofei
Jiang. Checking More and Alerting Less: Detecting
Privacy Leakages via Enhanced Data-flow Analysis and
Peer Voting. In Proceedings of The 2015 Network and
Distributed System Security Symposium (NDSS), San
Diego, CA, February 2015.
- Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, and
Wenke Lee. A11y Attacks: Exploiting Accessibility in Operating
Systems. In Proceedings of The 21st ACM Conference on Computer
and Communications Security (CCS), Scottsdale, Arizona,
November 2014.
- Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, and Wenke
Lee. Your Online Interests - Pwned! A Pollution Attack Against
Targeted Advertising. In Proceedings of The 21st ACM Conference
on Computer and Communications Security (CCS), Scottsdale,
Arizona, November 2014.
- Billy Lau, Pak Ho Chung, Chengyu Song, Yeongjin Jang, Wenke
Lee, and Alexandra Boldyreva. Mimesis Aegis: A Mimicry Privacy
Shield - A System's Approach to Data Privacy on Public Cloud. In
Proceedings of The 23rd USENIX Security Symposium, San
Diego, CA, August 2014.
- Tielei Wang, Yeongjin Jang, Yizheng Chen, Pak Ho Chung, Billy
Lau, and Wenke Lee. On the Feasibility of Large-Scale Infections of
iOS Devices. In Proceedings of The 23rd USENIX Security
Symposium, San Diego, CA, August 2014.
- Tielei Wang, Chengyu Song, and Wenke Lee. Diagnosis and
Emergency Patch Generation for Integer Overflow Exploits. In
Proceedings of The 11th Conference on Detection of Intrusions and
Malware & Vulnerability Assessment (DIMVA 2014), Egham, UK, July
2014.
- Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji,
David Dagon, and Wenke Lee. DNS Noise: Measuring the Pervasiveness of
Disposable Domains in Modern DNS Traffic. In Proceedings of The
44th Annual IEEE/IFIP International Conference on Dependable Systems
and Networks (DSN 2014), Atlanta, GA, June 2014.
- Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, and Wenke
Lee. From Zygote to Morula: Fortifying Weakened ASLR on Android. In
Proceedings of The 2014 IEEE Symposium on Security and
Privacy, San Jose, CA, May 2014.
- Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, and
Alex C. Snoeren. Exposing Inconsistent Web Search Results with
Bobble. In Proceedings of The 2014 Passive and Active
Measurement Conference (PAM), Los Angeles, CA, March 2014.
- Yeongjin Jang, Simon P. Chung, Bryan D. Payne, and Wenke
Lee. Gyrus: A Framework for User-Intent Monitoring of Text-Based
Networked Applications. In Proceedings of The 21st Annual
Network and Distributed System Security Symposium (NDSS), San
Diego, CA, February 2014.
- Yacin Nadji, Manos Antonakakis, Roberto Perdisci, and Wenke
Lee. Beheading Hydras: Performing Effective Botnet Takedowns. In
Proceedings of the 20th ACM Conference on Computer
and Communications Security (CCS), Berlin, Germany, November 2013.
- Brendan Dolan-Gavitt, Tim Leek, Josh Hodosh, and Wenke
Lee. Tappan Zee (North) Bridge: Mining Memory Accesses for
Introspection. In Proceedings of the 20th ACM Conference on Computer
and Communications Security (CCS), Berlin, Germany, November 2013.
- Yacin Nadji, Manos Antonakakis, Roberto Perdisci, and Wenke
Lee. Connected Colors: Unveiling the Structure of Criminal
Networks. In Proceedings of the 16th International Symposium on
Research in Attacks, Intrusions and Defenses (RAID), St. Lucia,
October 2013.
- Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick
Feamster, and Wenke Lee. Take
this Personally: Pollution Attacks on Personalized Services. In
Proceedings of the 22nd USENIX Security Symposium,
Washington, D.C., August 2013.
- Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke
Lee. Jekyll on iOS: When
Benign Apps Become Evil. In Proceedings of the 22nd USENIX
Security Symposium, Washington, D.C., August 2013.
- Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, and Wenke
Lee. Intention and Origination: An Inside Look at Large-Scale Bot
Queries. In Proceedings of The 20th Annual Network and
Distributed System Security Symposium (NDSS), San Diego, CA,
February 2013.
- Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick
Traynor and Wenke Lee. The Core of
the Matter: Analyzing Malicious Traffic in Cellular Carriers. In
Proceedings of The 20th Annual Network and Distributed System
Security Symposium (NDSS), San Diego, CA, February 2013.
- Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, and Guofei
Jiang. CHEX: Statically Vetting Android Apps for Component Hijacking
Vulnerabilities. In Proceedings of The 19th ACM Conference on
Computer and Communications Security (CCS), Raleigh,
NC. October 2012.
- Martim Carbone, Matthew Conover, Bruce Montague, and Wenke
Lee. Secure and Robust Monitoring of Virtual Machines through
Guest-Assisted Introspection. In Proceedings of The 15th
International Symposium on Research in Attacks, Intrusions, and
Defenses (RAID). Amsterdam, The Netherlands. September, 2012.
- Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos
Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, and David Dagon. From
Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based
Malware. In Proceedings of The 21st USENIX Security
Symposium. Bellevue, WA. August 2012.
- Kapil Singh, Helen Wang, Alexander Moshchuk, Collin Jackson,
and Wenke Lee. Practical End-to-End Web Content Integrity. In
Proceedings of The 21st International World Wide Web Conference
(WWW), Lyon, France, April 2012.
- Xiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke
Lee, and Rocky K.C. Chang. Exposing Invisible Timing-Based Traffic
Watermarks with BACKLIT. In Proceedings of The 27th Annual
Computer Security Applications Conference (ACSAC 2011), Orlando,
FL, December 2011.
- Yacin Nadji, Manos Antonakakis, Roberto Perdisci, and Wenke
Lee. Understanding the Prevalence and Use of Alternative Plans in
Malware with Network Games. In Proceedings of The 27th Annual
Computer Security Applications Conference (ACSAC 2011), Orlando,
FL, December 2011.
- Long Lu, Roberto Perdisci, and Wenke Lee. SURF: Detecting and
Measuring Search Poisoning. In Proceedings of The 18th ACM
Conference on Computer and Communications Security
(CCS). Chicago, IL, October 2011.
- Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos
Vasiloglou II, and David Dagon. Detecting Malware Domains at the Upper
DNS Hierarchy. In Proceedings of The 20th USENIX Security
Symposium. San Francisco, August 2011.
- Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, and
Wenke Lee. A Combinatorial Approach to Network Covert Communications
with Applications in Web Leaks. In Proceedings of The 41st Annual
IEEE/IFIP International Conference on Dependable Systems and Networks
(DSN). Hong Kong, China, June 2011.
- Junjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz, and
Xiapu Luo. Detecting Stealthy P2P Botnets Using Statistical Traffic
Fingerprints. In Proceedings of The 41st Annual IEEE/IFIP
International Conference on Dependable Systems and Networks
(DSN). Hong Kong, China, June 2011.
- Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon
Giffin, and Wenke Lee. Virtuoso: Narrowing the Semantic Gap in Virtual
Machine Introspection. In Proceedings of The 2011 IEEE Symposium
on Security and Privacy. Oakland, CA, May 2011.
- Junjie Zhang, Jay Stokes, Christian Seifert, and Wenke
Lee. ARROW: Generating Signatures to Detect Drive-By Downloads. In
Proceedings of The 20th International World Wide Web Conference
(WWW), Hyderabad, India, March 2011.
- Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke
Lee, and Nick Feamster. Boosting the Scalability of Botnet Detection
Using Adaptive Traffic Sampling. In Proceedings of The 6th ACM
Symposium on Information, Computer and Communications Security
(ASIACCS), Hong Kong, March 2011.
- Xiapu Luo, Peng Zhou, Edmond W.W. Chan, Wenke Lee, Rocky
K. C. Chang, and Roberto Perdisci. HTTPOS: Sealing Information Leaks
with Browser-side Obfuscation of Encrypted Flows. In Proceedings
of The 18th Annual Network and Distributed System Security Symposium
(NDSS), San Diego, CA, February 2011.
- Qing Hui, Xiapu Luo, and Wenke Lee. Control of Low-Rate
Denial-of-Service Attacks on Web Servers and TCP Flows. In
Proceedings of The 49th IEEE Conference on Decision and Control
(CDC), Atlanta, GA, December 2010.
- Xiapu Luo, Junjie Zhang, Roberto Perdisci, and Wenke Lee. On
the Secrecy of Spread-Spectrum Flow Watermarks. In Proceedings of
The 15th European Symposium on Research in Computer Security
(ESORICS), Athens, Greece, September 2010.
- Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci,
and Wenke Lee. A Centralized Monitoring Infrastructure for Improving
DNS Security. In Proceedings of The 13th International Symposium
on Recent Advances in Intrusion Detection (RAID), Ottawa,
Ontario, Canada, September 2010.
- Long Lu, Vinod Yegneswaran, Phil Porras, and
Wenke Lee. BLADE: An Attack-Agnostic Approach for Preventing Drive-By
Malware Infections. In Proceedings of The 17th ACM
Conference on Computer and Communications Security
(CCS), Chicago, IL, October 2010.
- Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee,
and Nick Feamster. Building a Dynamic Reputation System for DNS. In
Proceedings of The 19th USENIX Security Symposium,
Washington, DC, August 2010.
- Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, and
Wenke Lee. Evaluating Bluetooth as a Medium for Botnet Command and
Control.In Proceedings of The 7th Conference on Detection of
Intrusions and Malware Vulnerability Assessment (DIMVA), Bonn,
Germany, July 2010.
- Kapil Singh, Alexander Moshchuk, Helen J. Wang, and Wenke
Lee. On the Incoherencies in Web Browser Access Control Policies. In
Proceedings of The 2010 IEEE Symposium on Security and
Privacy, Oakland, CA, May 2010.
- Roberto Perdisci, Wenke Lee, and Nick Feamster. Behavioral
Clustering of HTTP-based Malware and Signature Generation using
Malicious Network Traces. In Proceedings of The 7th USENIX
Symposium on Networked Systems Design and Implementation (NSDI),
San Jose, CA, April 2010.
- Roberto Perdisci, Igino Corona, David Dagon, and Wenke
Lee. Detecting Malicious Flux Service Networks through Passive
Analysis of Recursive DNS Traces. In Proceedings of The 25th
Annual Computer Security Applications Conference (ACSAC 2009),
Honolulu, HI, December 2009.
- Guofei Gu, Vinod Yegneswaran, Phillip Porras, Jennifer Stoll,
and Wenke Lee. Active Botnet Probing to Identify Obscure Command and
Control Channels. In Proceedings of The 25th Annual Computer
Security Applications Conference (ACSAC 2009), Honolulu, HI,
December 2009.
- Monirul Sharif, Wenke Lee, Weidong Cui, and Andrea
Lanzi. Secure In-VM Monitoring Using Hardware Virtualization. In
Proceedings of The 16th ACM Conference on Computer and Communications
Security (CCS 2009), Chicago, IL, November, 2009.
- Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus
Peinado, and Xuxian Jiang. Mapping Kernel Objects to Enable Systematic
Integrity Checking. In Proceedings of The 16th ACM Conference on
Computer and Communications Security (CCS 2009), Chicago, IL,
November, 2009.
- Kapil Singh, Sumeer Bhola, and Wenke Lee. xBook: Redesigning
Privacy Control in Social Networking Platforms. In Proceedings of
The 18th USENIX Security Symposium, Montreal, Canada, August,
2009.
- Roberto Perdisci, Manos Antonakakis, Xiapu Luo, and Wenke
Lee. WSEC DNS: Protecting Recursive DNS Resolvers from Poisoning
Attacks. In Proceedings of The 39th Annual IEEE/IFIP
International Conference on Dependable Systems and Networks (DSN
2009), Lisbon, Portugal, June 2009.
- Monirul Sharif, Andrea Lanzi, Jon Giffin, and Wenke
Lee. Automatic Reverse Engineering of Malware Emulators. In
Proceedings of The 2009 IEEE Symposium on Security and Privacy,
Oakland, CA, May 2009. (Best Student Paper Award)
- Andrea Lanzi, Monirul Sharif, and Wenke Lee. K-Tracer: A System
for Extracting Kernel Malware Behavior. In Proceedings of The
16th Annual Network and Distributed System Security Symposium (NDSS
2009), San Diego, CA, February 2009.
- David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo,
Christopher P. Lee, and Wenke Lee. Recursive DNS Architectures and
Vulnerability Implications. In Proceedings of The 16th Annual
Network and Distributed System Security Symposium (NDSS 2009),
San Diego, CA, February 2009.
- Roberto Perdisci, Andrea Lanzi, and Wenke Lee. McBoost:
Boosting Scalability in Malware Collection and Analysis Using
Statistical Classification of Executables. In Proceedings of The
24th Annual Computer Security Applications Conference (ACSAC
2008), Anaheim, CA, December 2008.
- Artem Dinaburg, Paul Royal, Monirul Sharif, and Wenke Lee.
Ether: Malware Analysis via Hardware Virtualization Extensions. In
Proceedings of the 15th ACM Conference on Computer and
Communications Security (CCS 2008), Alexandria, VA, October
2008.
- David Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, and
Wenke Lee. Increased DNS Forgery Resistance Through 0x20-Bit
Encoding. In Proceedings of the 15th ACM Conference on Computer
and Communications Security (CCS 2008), Alexandria, VA, October
2008.
- Monirul Sharif, Vinod Yegneswaran, Hassen Saidi, Phillip
Porras, and Wenke Lee. Eureka: A Framework for Enabling Static Malware
Analysis. In Proceedings of the 13th European Symposium on
Research in Computer Security (ESORICS), Malaga, Spain, October
2008.
- Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke
Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol-
and Structure-Independent Botnet Detection. In Proceedings of
The 17th USENIX Security Symposium (Security'08), San Jose, CA,
July 2008.
- Kapil Singh, Abhinav Srivastava, Jon Giffin, and Wenke
Lee. Evaluating Email's Feasibility for Botnet Command and
Control. In Proceedings of the 38th Annual IEEE/IFIP
International Conference on Dependable Systems and Networks (DSN
2008), Anchorage, Alaska, June 2008.
- Bryan D. Payne, Martim Carbone, Monirul Sharif, and Wenke
Lee. Lares: An Architecture for Secure Active Monitoring Using
Virtualization. In Proceedings of the 2008 IEEE Symposium on
Security and Privacy, Oakland, CA, May 2008.
- Guofei Gu, Alvaro A. Cardenas, and Wenke Lee. Principled
Reasoning and Practical Applications of Alert Fusion in Intrusion
Detection Systems. In Proceedings of the ACM Symposium on
InformAction, Computer and Communications Security
(ASIACCS'08), Tokyo, Japan, March 2008.
- David Dagon, Niels Provos, Chris Lee, and Wenke Lee. Corrupted
DNS Resolution Paths: The Rise of a Malicious Resolution
Authority. In Proceedings of The 15th Annual Network and
Distributed System Security Symposium (NDSS 2008), San Diego,
CA, February 2008.
- Guofei Gu, Junjie Zhang, and Wenke Lee. BotSniffer: Detecting
Botnet Command and Control Channels in Network Traffic. In
Proceedings of The 15th Annual Network and Distributed System
Security Symposium (NDSS 2008), San Diego, CA, February 2008.
- Monirul Sharif, Andrea Lanzi, Jonathon Giffin, and Wenke
Lee. Impeding Malware Analysis using Conditional Code
Obfuscation. In Proceedings of The 15th Annual Network and
Distributed System Security Symposium (NDSS 2008), San Diego,
CA, February 2008.
- Bryan D. Payne, Martim Carbone, and Wenke Lee. Secure and
Flexible Monitoring of Virtual Machines. In Proceedings of The
23rd Annual Computer Security Applications Conference (ACSAC
2007), Miami Beach, FL, December 2007.
- David Dagon, Guofei Gu, Chris Lee and Wenke Lee. A Taxonomy
of Botnet Structures. In Proceedings of The 23rd Annual
Computer Security Applications Conference (ACSAC 2007), Miami
Beach, FL, December 2007.
- Guofei Gu, Zesheng Chen, Phillip Porras and Wenke Lee.
Misleading and Defeating Importance-Scanning Malware Propagation.
In Proceedings of The 3rd International Conference on Security
and Privacy in Communication Networks (SecureComm'07), Nice,
France, September 2007.
- Takehiro Takahashi and Wenke Lee. An Assessment of VoIP
Covert Channel Threats. In Proceedings of The 3rd
International Conference on Security and Privacy in Communication
Networks (SecureComm'07), Nice, France, September 2007.
- Monirul Sharif, Kapil Singh, Jonathon Giffin and Wenke Lee.
Understanding Precision in Host Based Intrusion Detection: Formal
Analysis and Practical Models. In Proceedings of The 10th
International Symposium on Recent Advances in Intrusion Detection
(RAID), Surfers Paradise, Australia, September 2007.
- Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong,
Wenke Lee. BotHunter: Detecting Malware Infection Through
IDS-Driven Dialog Correlation. In Proceedings of The 16th
USENIX Security Symposium (Security'07), Boston, MA, August
2007.
- David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard
Lipton, and Shabsi Walfish. Intrusion-Resilient Key Exchange in the
Bounded Retrieval Model. In Proceedings of The Fourth IACR
Theory of Cryptography Conference (TCC 2007), Amsterdam, The
Netherlands, February 2007.
- Roberto Perdisci, Guofei Gu, and Wenke Lee. Using an Ensemble
of One-Class SVM Classifiers to Harden Payload-based Anomaly
Detection Systems. In Proceedings of The 2006 IEEE
International Conference on Data Mining (ICDM '06), Hong Kong,
China, December 2006.
- Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, and
Wenke Lee. PolyUnpack: Automating the Hidden-Code Extraction of
Unpack-Executing Malware. In Proceedings of The 22nd Annual
Computer Security Applications Conference (ACSAC 2006), Miami
Beach, FL, December 2006.
- Prahlad Fogla and Wenke Lee. Evading Network Anomaly Detection
Systems: Formal Reasoning and Practical Techniques. In
Proceedings of The 13th ACM Conference on Computer and
Communications Security (CCS 2006), Alexandria, VA, October
2006.
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, and Boris
Skoric. Towards an Information-Theoretic Framework for Analyzing
Intrusion Detection Systems. In Proceedings of The 11th European
Symposium Research Computer Security (ESORICS 2006), Hamburg,
Germany, September 2006.
- Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg
Kolesnikov, and Wenke Lee. Polymorphic Blending Attacks. In
Proceedings of The 15th USENIX Security Symposium (SECURITY
'06), Vancouver, B.C., Canada, August 2006.
- Collin Mulliner, Giovanni Vigna, David Dagon, and Wenke
Lee. Using Labeling to Prevent Cross-Service Attacks Against Smart
Phones. In Proceedings of The 3rd Conference on Detection of
Intrusions and Malware, and Vulnerability Assessment (DIMVA
2006), Berlin, Germany, July 2006.
- Hongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy,
and Wenke Lee. Agent-Based Cooperative Anomaly Detection for
Wireless Ad Hoc Networks. In Proceedings of The 12th
International Conference on Parallel and Distributed Systems (ICPADS
2006), Minneapolis, Minnesota, July 2006.
- Guofei Gu, Prahlad Fogla, Wenke Lee, and Douglas Blough. DSO:
Dependable Signing Overlay. In Proceedings of The 4th
International Conference on Applied Cryptography and Network
Security (ACNS '06), Singapore, June 2006.
- Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, and
Monirul Sharif. Misleading Worm Signature Generators Using
Deliberate Noise Injection (full paper). In Proceedings
of the 2006 IEEE Symposium on Security and Privacy,
Oakland, CA, May 2006.
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, and Boris
Skoric. Measuring Intrusion Detection Capability: An
Information-Theoretic Approach. In Proceedings of ACM
Symposium on InformAction, Computer and Communications Security
(ASIACCS '06), Taipei, Taiwan, March 2006.
- David Dagon, Cliff Zou, and Wenke Lee. Modeling Botnet
Propagation Using Time Zones. In Proceedings of The 13th
Annual Network and Distributed System Security Symposium (NDSS
2006), San Diego, CA, February 2006.
- Yongguang Zhang, Yi-an Huang, and Wenke
Lee. An Extensible Environment for
Evaluating Secure MANET. In Proceedings of The 1st
International Conference on Security and Privacy for Emerging Areas in
Communication Networks (SecureComm 2005), Athens, Greece,
September 2005.
- Tao Zhang, Xiaotong Zhuang, Santosh Pande, and Wenke
Lee. Anomalous Path Detection with Hardware Support. In
Proceedings of The 2005 International Conference on Compilers,
Architecture, and Synthesis for Embedded Systems (CASES 2005),
San Francisco, CA, September 2005.
- Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, and
Barton P. Miller. Environment-Sensitive
Intrusion Detection. In Proceedings of The 8th International
Symposium on Recent Advances in Intrusion Detection (RAID 2005),
Seattle, WA, September 2005.
- David Dagon, Wenke Lee, and Richard Lipton. Protecting Secret
Data from Insider Attacks. In Proceedings of Ninth International
Conference on Financial Cryptography and Data Security, Roseau,
Dominica, Feb. 2005.
- Guofei Gu, David Dagon, Xinzhou Qin, Monirul I. Sharif, Wenke
Lee, and George F. Riley. Worm Detection, Early Warning,
and Response Based on Local Victim Information. In
Proceedings of The 20th Annual Computer Security Applications
Conference (ACSAC 2004), Tucson, Arizona, December 2004.
- Xinzhou Qin and Wenke Lee. Attack Plan Recognition and Prediction
Using Causal Networks. In Proceedings of The 20th Annual
Computer Security Applications Conference (ACSAC 2004), Tucson,
Arizona, December 2004.
- Joao B.D. Cabrera, Jaykumar Gosar, Wenke Lee, and Raman K.
Mehra. On the Statistical Distribution of
Processing Times in Network Intrusion Detection. In
Proceedings of The 43rd IEEE Conference on Decision and
Control (CDC 2004), Bahamas, December 2004.
- George F. Riley, Monirul I. Sharif, and Wenke Lee. Simulating Internet Worms. In
Proceedings of The 12th Annual Meeting of the IEEE/ACM
International Symposium on Modeling, Analysis, and Simulation of
Computer and Telecommunication Systems (MASCOTS),
Volendam, The Netherlands, October 2004.
- Yian Huang and Wenke Lee. Attack
Analysis and Detection for Ad Hoc Routing
Protocols. Proceedings of the 7th International Symposium on
Recent Advances in Intrusion Detection (RAID 2004), Sophia
Antipolis, France, September 2004.
- David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian
Grizzard, John Levin, and Henry Owen. HoneyStat: Local Worm Detection Using
Honeypots. Proceedings of the 7th International Symposium on
Recent Advances in Intrusion Detection (RAID 2004), Sophia
Antipolis, France, September 2004.
- Xinzhou Qin and Wenke Lee. Discovering Novel Attack
Strategies from INFOSEC Alerts. Proceedings of the 9th
European Symposium on Research in Computer Security (ESORICS 2004)
, Sophia Antipolis, France, September 2004.
- Henry H. Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha,
Wenke Lee, and Barton P. Miller. Formalizing Sensitivity in Static Analysis
for Intrusion Detection. In Proceedings of the 2004 IEEE
Symposium on Security and Privacy, Oakland, CA, May 2004.
- Xinzhou Qin and Wenke Lee. Statistical Causality Analysis of INFOSEC
Alert Data. In Proceedings of The 6th International Symposium
on Recent Advances in Intrusion Detection (RAID 2003),
Pittsburgh, PA, September 2003.
- Henry H. Feng, Oleg Kolesnikov, Prahlad Fogla, Wenke Lee, and
Weibo Gong. Anomaly Detection Using Call
Stack Information. In
Proceedings of the 2003 IEEE Symposium on Security and
Privacy, Oakland, CA, May 2003.
- Yi-an Huang, Wei Fan, Wenke Lee, and Philip S. Yu. Cross-Feature Analysis for Detecting Ad-Hoc
Routing Anomalies. In Proceedings of the 23rd International
Conference on Distributed Computing Systems (ICDCS), Providence,
RI, May 2003.
- Wenke Lee, Joao B. D. Cabrera, Ashley Thomas, Niranjan
Balwalli, Sunmeet Saluja, and Yi Zhang. Performance Adaptation in Real-Time Intrusion
Detection Systems. In Proceedings of the 5th International
Symposium on Recent Advances in Intrusion Detection (RAID 2002),
Zurich, Switzerland, October 2002.
- Xinzhou Qin, Wenke Lee, Lundy Lewis, and Joao
B. D. Cabrera. Integrating Intrusion Detection and Network
Management. In Proceedings of the IEEE/IFIP Network Operations
and Management Symposium (NOMS 2002), Florence, Italy, May 2002.
- Wei Fan, Matt Miller, Sal Stolfo, Wenke Lee, and Phil Chan. Using Artificial Anomalies to
Detect Unknown and Known Network Intrusions. In Proceedings
of The First IEEE International Conference on Data
Mining, San Jose, CA, November 2001.
- Yongguang Zhang, Harrick Vin, Lorenzo Alvisi, Wenke Lee, and
Son K. Dao. Heterogeneous Networking: A
New Survivability Paradigm. In Proceedings of the 2001 New
Security Paradigms Workshop, Cloudcroft, New Mexico, September
2001.
- Wenke Lee, Sal Stolfo, Phil Chan, Eleazar Eskin, Wei Fan, Matt
Miller, Shlomo Hershkop, and Junxin Zhang. Real Time Data Mining-based Intrusion
Detection. In Proceedings of the 2001 DARPA Information
Survivability Conference and Exposition (DISCEX II) (selected for
presentation), Anaheim, CA, June 2001.
- Wenke Lee and Dong Xiang.
Information-Theoretic Measures for Anomaly Detection. In
Proceedings of The 2001 IEEE Symposium on Security and
Privacy, Oakland, CA, May 2001.
- J. B. D. Cabrera, L. Lewis, X. Qin, Wenke Lee, Ravi Prasanth,
B. Ravichandran, and Raman Mehra. Proactive
Detection of Distributed Denial of Service Attacks Using MIB Traffic
Variables - A Feasibility Study. In Proceedings of The Seventh
IFIP/IEEE International Symposium on Integrated Network Management (IM
2001), Seattle, WA, May 2001.
- Yongguang Zhang and Wenke Lee. Intrusion
Detection in Wireless Ad-Hoc Networks. Proceedings of The
Sixth International Conference on Mobile Computing and Networking
(MobiCom 2000), Boston, MA, August 2000.
- Wei Fan, Wenke Lee, Sal Stolfo, and Matt Miller. A Multiple
Model Cost-Sensitive Approach for Intrusion
Detection. Proceedings of The Eleventh European Conference on
Machine Learning (ECML 2000), LNAI 1810, Barcelona, Spain, May
2000.
- Sal Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, and Phil
Chan. Cost-based
Modeling for Fraud and Intrusion Detection: Results from the JAM
Project. Proceedings of the 2000 DARPA Information
Survivability Conference and Exposition (DISCEX '00) (selected
for presentation), Hilton Head, SC, January 2000.
- Wenke Lee, Sal Stolfo, and Kui Mok. Mining in a
Data-flow Environment: Experience in Network Intrusion Detection
(Best Paper Award in Applied Research Category). Proceedings of
the 5th ACM SIGKDD International Conference on Knowledge Discovery &
Data Mining (KDD '99), San Diego, CA, August 1999.
- Wenke Lee, Sal Stolfo, and Kui Mok. A
Data Mining Framework for Building Intrusion Detection
Models. Proceedings of the 1999 IEEE Symposium on Security and
Privacy, Oakland, CA, May 1999.
- Wenke Lee, Sal Stolfo, and Kui Mok. Mining
Audit Data to Build Intrusion Detection Models (Honorable mention
(runner-up) for Best Paper Award in Applied Research
Category). Proceedings of the Fourth International Conference on
Knowledge Discovery and Data Mining (KDD '98), New York, NY,
August 1998.
- Wenke Lee and Sal Stolfo. Data
Mining Approaches for Intrusion Detection. Proceedings of the
Seventh USENIX Security Symposium (SECURITY '98), San Antonio,
TX, January 1998.
- Sal Stolfo, Andreas Prodromidis, Shelley Tselepis, Wenke Lee,
Wei Fan, and Phil Chan. JAM:
Java Agents for Meta-learning over Distributed Databases
(Honorable mention (runner-up) for Best Paper Award in Applied
Research Category). Proceedings of the Third International
Conference on Knowledge Discovery and Data Mining (KDD '97),
Newport Beach, CA, August 1997.
- Naser S. Barghouti, John Mocenigo, and Wenke Lee. Grappa:
A GRAPh PAckage in Java. Proceedings of the Fifth Annual
Symposium on Graph Drawing (Graph Drawing '97), Rome, Italy,
September 1997.
- Wenke Lee, Gail Kaiser, Paul Clayton, and Eric Sherman. OzCare:
A Workflow Automation System for Care Plans. Proceedings of
the American Medical Informatics Association Annual Fall
Symposium, Washington DC, October 1996.
Papers in Workshops
- Yi-an Huang and Wenke
Lee. Hotspot-Based Traceback for Mobile Ad
Hoc Networks. In Proceedings of The ACM Workshop on Wireless
Security (WiSe 2005), Cologne, Germany, September 2005.
- Monirul Sharif, George Riley, and Wenke Lee. Comparative Study
between Analytical Models and Packet-Level Worm
Simulations. In Proceedings of The 19th Workshop on Parallel
and Distributed Simulation (PADS 2005), Monterey, CA, June
2005.
- Chris Clark, Wenke Lee, David Schimmel, Didier Contis, Mohamed
Kone, Ashley Thomas, and Craig Wampler. A
Hardware Platform for Network Intrusion Detection and
Prevention. In
Proceedings of The 3rd Workshop on Network Processors and
Applications (NP3), Madrid, Spain, February 2004.
- Yian Huang and Wenke Lee. A
Cooperative Intrusion Detection System for Ad Hoc Networks. In
Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor
Networks (SASN '03), Fairfax VA, October 2003.
- Mustaque Ahamad, Wenke Lee, Ling Liu, Leo Mark, Edward
Omicienski, Calton Pu, and Andre dos Santos. Guarding the Next
Internet Frontier: Countering Denial of Information Attacks.
Proceedings of the 2002 New Security Paradigms Workshop, Virginia
Beach, Virginia, September 2002.
- Xinzhou Qin, Wenke Lee, Lundy Lewis, and Joao
B. D. Cabrera. Using MIB II Variables for Network Anomaly Detection -
A Feasibility Study. ACM Workshop on Data Mining for Security
Applications, Philadelphia, PA, November 2001.
- Wenke Lee, Rahul Nimbalkar, Kam Yee, Sunil Patil, Pragnesh
Desai, Thuan Tran, and Sal Stolfo. A
Data Mining and CIDF Based Approach for Detecting Novel and
Distributed Intrusions. Proceedings of The Third
International Workshop on Recent Advances in Intrusion Detection (RAID
2000), LNCS 1907, Toulouse, France, October 2000.
- Wenke Lee, Wei Fan, Matt Miller, Sal Stolfo, and Erez Zadok.
Toward Cost-Sensitive Modeling for Intrusion Detection and
Response. ACM Workshop on Intrusion Detection Systems,
Athens, Greece, November 2000.
- Wenke Lee, Chris Park, and Sal Stolfo. Towards Automatic
Intrusion Detection using NFR. 1st USENIX Workshop on Intrusion
Detection and Network Monitoring, April 1999.
- Wenke Lee, Sal Stolfo, and Phil Chan. Learning
Patterns from Unix Process Execution Traces for Intrusion
Detection. AAAI Workshop: AI Approaches to Fraud
Detection and Risk Management, July 1997.
- Sal Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, and Phil
Chan. Credit
Card Fraud Detection Using Meta-Learning: Issues and Initial
Results. AAAI Workshop: AI Approaches to Fraud Detection and
Risk Management, July 1997.
- Gail Kaiser and Wenke Lee. Pay No Attention to the Man Behind
the Curtain. NSF Workshop on Workflow and Process
Automation, May 1996.
- Wenke Lee. Data Modeling and Management for Large Spatial
Databases. The Third International Workshop in Geographic
Information Systems, Beijing, China, August 1993.
Others
- Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan
Smith, Angelos Keromytis, and Wenke Lee. Dynamic Trust
Management. In IEEE Computer, February 2009.
- Martim Carbone, Diego Zamboni, and Wenke Lee. Taming
Virtualization. In IEEE Security & Privacy, 6(1),
January/February 2008.
- Bryan D. Payne, Reiner Sailer, Ramon Caceres, Ronald Perez,
and Wenke Lee. A Layered Approach to Simplified Access Control in
Virtualized Systems. In ACM SIGOPS Operating Systems
Review, 4(2), July 2007.
- Wenke Lee. Applying Data Mining to Intrusion Detection: The
Quest for Automation, Efficiency, and Credibility. SIGKDD
Explorations, 4(2), December 2002.
- Wenke Lee and Wei Fan. Mining System Audit Data: Opportunities
and Challenges. SIGMOD Record, 30(4), December 2001.
- Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, and
Eleazar Eskin. 2001. Data Mining-Based Intrusion Detectors: An
Overview of the Columbia IDS Project. SIGMOD Record,
30(4), December 2001.
Thesis Advising
Graduated PhDs:
- Xinzhou Qin, 2005, Senior Engineering Manager, Alibaba Cloud
- Yi-An Huang, 2006, Senior Engineering Manager, LinkedIn
- Prahlad Fogla, 2007, Software Engineer, Google
- Guofei Gu, 2008, Professor (with tenure) in the
Department of Computer Science, Texas A&M University
- Bryan Payne, 2010, Chief Information Security Officier, BetterUp
- Monirul Sharif, 2010, Director of Engineering, Google
- Kapil Singh, 2011, Principal Research Staff Member, IBM
T.J. Watson Research Center
- Martim Carbone, 2012, Systems Software Engineer, VMware
- Manos Antonakakis, 2012, Associate Professor (with tenure) in
the School of Electrical and Computer Engineering, Georgia
Institute of Technology
- Junjie Zhang, 2012, Associate Professor (with tenure) in the
Department of Computer Science, Wright State University
- Long Lu, 2013, Chief Scientist & Global Head of Digital Safety &
Security at NIO, Associate Professor (with tenure) in the
College of Computer and Information Science, Northeastern
University
- Brendan Dolan-Gavitt, 2014, Tenure-track Assistant Professor
in the Department of Computer Science & Engineering, NYU Polytechnic
School of Engineering
- Xinyu Xing, 2015, Tenure-track Associate Professor of
Computer Science, Northwestern University
- Yacin Nadji, 2015, Senior Security Researcher, Corelight
- Chengyu Song, 2016, Associate Professor (with tenure) in the
Department of Computer Science and Engineering, UC Riverside
- Byoungyoung Lee, 2016, Tenure-track Assistant Professor, Seoul
National University
- Yeongjin Jang, 2017, Tenure-track Assistant Professor in the
Department of Electrical Engineering and Computer Science, Oregon
State University
- Kangjie Lu, 2017, Tenure-track Assistant Professor in the
Department of Computer Science and Engineering, University of
Minnesota
- Wei Meng, 2017, Tenure-track Assistant Professor in the Department
of Computer Science and Engineering, Chinese University of
Hong Kong
- Yizheng Chen, 2017, PostDoc, UC Berkeley
- Yang Ji, 2019, Staff Security Researcher, Palo Alto Networks
- Ruian Duan, 2019, Staff Security Researcher, Palo Alto Networks
- Erkam Uzun, 2021, Software Engineer, ByteDance/TikTok
- Chenxiong Qian, 2021, Tenure-track
Assistant Professor in the Department of Computer Science, The
University of Hong Kong
- Carter Yagemann, 2022, Tenure-track Assistant Professor in
the Department of Computer Science and Engineering, The Ohio State
University
PostDoc Supervising
- Yisroel Mirsky, 2019-2021, Tenure-track Lecturer in the
Department of Software and Information Systems Engineering,
Ben-Gurion University of the Negev, Israel
- Guanliang Yang, 2019-2021, Assistant Professor in the
Department of Computer Science, Fudan University, Shanghai, China
- Hong Hu, 2017-2019, Tenure-track Assistant Professor at Penn
State University
- Sangho Lee, 2015-2018, Researcher at Microsoft Research
(MSR) Redmond
- Roberto Perdisci, 2009-2010, Professor (with
tenure) in the Department of Computer Science, The University of
Georgia
- Daniel Xiapu Luo, 2008-2010, Associate Professor (with tenure)
in the Department of Computing, The Hong Kong Polytechnic University
- Tielei Wang, 2012-2013; Research Scientist, Georgia Tech,
2013-2015; Researcher in Shanghai, China 2015-
- Simon Chung, 2011-2013; Research Scientist, Georgia Tech,
2013-
Patents
Simon Chung, Wenke Lee, and Yeongjin
Jang. Systems and methods for using video for user and message
authentication, U.S. Patent Number: 10,476,888, November 2019.
Manos Antonakakis, Roberto Perdisci, Wenke Lee, and Gunter
Ollmann. Method and System for Detecting Malware,
U.S. Patent Number: 10,257,212, April 2019.
David Dagon, Nick Feamster, Wenke Lee, Robert Edmonds, Richard
Lipton, and Anirudh Ramachandran. Methods and systems for
detecting compromised computers, U.S. Patent Number:
10,044,748, August 2018.
Roberto Perdisci, Wenke Lee, and Gunter Ollmann. Method
and system for detecting malicious and/or botnet-related domain
names, U.S. Patent Number: 10,027,688, July 2018.
Roberto Perdisci and Wenke Lee. Method and system for
network-based detecting of malware from behavioral clustering,
U.S. Patent Number: 9,948,671, April 2018.
Manos Antonakakis, Roberto Perdisci, Wenke Lee, and Nikolaos
Vasiloglou. Method and system for detecting DGA-based
malware, U.S. Patent Number: 9,922,190, March 2018.
Manos Antonakakis, Roberto Perdisci, Wenke Lee, and Nikolaos
Vasiloglou. Method and system for detecting malicious domain
names at an upper DNS hierarchy, U.S. Patent Number: 9,686,291,
June 2017.
Wenke Lee, Sasha Boldyreva, Simon Chung, Billy Lau, and
Chengyu Song. Systems and methods of safeguarding user
information while interacting with online service providers,
U.S. Patent Number: 9,659,189, May 2017.
Manos Antonakakis, Roberto Perdisci, Wenke Lee, and Gunter
Ollmann. Method and System for Detecting Malware,
U.S. Patent Number: 9,525,699, December 2016.
Manos Antonakakis, Roberto Perdisci, David Dagon, and Wenke
Lee. Method and system for determining whether domain names are
legitimate or malicious, U.S. Patent Number: 9,516,058,
December 2016.
David Dagon, Nick Feamster, Wenke Lee, Robert Edmonds, Richard
Lipton, and Anirudh Ramachandran. Method and systems for
detecting compromised networks and/or computers, U.S. Patent
Number: 9,306,969, April 2016.
Monirul Sharif and Wenke Lee. Systems and methods for
secure in-VM monitoring, U.S. Patent Number: 9,129,106,
September 2015.
Roberto Perdisci, Wenke Lee, and Gunter Ollmann. Method and
system for network-based detecting of malware from behavioral
clustering, U.S. Patent Number: 8,826,438, September 2014.
Manos Antonakakis, Roberto Perdisci, Wenke Lee, and Nikolaos
Vasiloglou. Method and system for detecting malicious domain
names at an upper DNS hierarchy, U.S. Patent Number: 8,631,489,
January 2014.
Manos Antonakakis, Roberto Perdisci, Wenke Lee, and Gunter
Ollmann. Method and System for Detecting Malware, U.S. Patent Number: 8,578,497, November 2013.
David Dagon, Nick Feamster, Wenke Lee, Robert Edmonds, Richard
Lipton, and Anirudh Ramachandran. Method and System for
Detecting and Responding to Attacking Networks, U.S. Patent
Number: 8,566,928, October 2013.
Wei Fan, Wenke Lee, Matt, Miller, and Sal Stolfo. Methods
for Cost-Sensitive Modeling for Intrusion Detection and
Response, U.S. Patent Number: 7,818,797, October 2010.
Dan Schutzer, Will Foster, Huanrui Hu, Wenke Lee, Sal Stolfo,
and Wei Fan. Method and System for Using Intelligent Agents for
Financial Transactions, Services, Accounting, and Advice, U.S. Patent Number: 5,920,848, July 1999.
Editorial Boards and Program Committees
The 2021 USENIX Security Symposium
The 2020 ACM Conference on Computer and Communications Security
The 2020 IEEE Symposium on Security & Privacy.
The 2019 ACM Conference on Computer and Communications
Security
The 2019 IEEE Symposium on Security & Privacy.
The 2018 ACM Conference on Computer and Communications Security.
The 2018 IEEE Symposium on Security & Privacy.
The 2018 IEEE European Symposium on Security & Privacy.
The 2017 ACM Conference on Computer and Communications Security.
The 26th USENIX Security Symposium (Security '17).
Co-chair, Security and Privacy Track, WWW 2017.
Annual Network and Distributed System Security Symposium
(NDSS) 2017.
The 25th USENIX Security Symposium (Security '16).
The 23rd ACM Conference on Computer and Communications Security
(CCS 2016).
The 2016 IEEE European Symposium on Security & Privacy.
Annual Network and Distributed System Security Symposium
(NDSS) 2016.
The 22nd ACM Conference on Computer and Communications Security (CCS 2015).
Co-chair, Security and Privacy Track, WWW 2015.
Annual Network and Distributed System Security Symposium
(NDSS) 2015.
European Symposium on Research in Computer
Security (ESORICS) 2014.
The 44th Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (DSN 2014).
Security and Privacy Track, WWW 2014.
PC Chair, The 2013 IEEE Symposium on Security and
Privacy.
The 10th USENIX Symposium on Networked Systems Design and
Implementation (NSDI 2013).
The 20th ACM Conference on Computer and Communications Security
(CCS 2013).
The 16th International Symposium on Recent Advances in
Intrusion Detection (RAID 2013).
The 19th ACM Conference on Computer and Communications Security
(CCS 2012).
The 9th Conference on Detection of Intrusions and Malware &
Vulnerability Assessment (DMIVA 2012).
The 7th USENIX Workshop on Hot Topics in Security (HotSec '12).
PC co-Chair, The 2012 IEEE Symposium on Security and Privacy.
Financial Cryptography and Data Security (FC 2012).
The 19th Annual Network and Distributed System Security
Symposium (NDSS 2012).
IEEE Transactions on Dependable and Secure Computing
(TDSC) 2010 - 2011.
ACM Transactions on Information and System Security
(TISSEC) 2005 - 2011.
The 8th Conference on Detection of Intrusions and Malware
& Vulnerability Assessment (DIMVA 2011).
The 41st Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (DSN 2011).
The 20th USENIX Security Symposium (Security '11).
The 6th USENIX Workshop on Hot Topics in Security (HotSec '11).
The 2011 IEEE Symposium on Security and Privacy.
The 13th International Symposium on Recent Advances in
Intrusion Detection (RAID 2010).
The 15th European Symposium on Research in Computer
Security (ESORICS 2010).
The 7th Conference on Detection of Intrusions and Malware
& Vulnerability Assessment (DIMVA 2010).
Security and Privacy Track, ICDCS 2010.
The 40th Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (DSN 2010).
Security and Privacy Track, WWW 2010.
PC Chair, The 17th Annual Network and Distributed
System Security Symposium (NDSS 2010).
The 18th USENIX Security Symposium (Security '09).
PC Chair, The Second USENIX Workshop on Large-Scale
Exploits and Emergent Threats (LEET), 2009.
PC Co-Chair, The Second ACM Conference on Wireless
Network Security (WiSec), 2009.
The 2009 IEEE Symposium on Security and Privacy.
The 16th Annual Network and Distributed System Security
Symposium (NDSS 2009).
The 24th Annual Computer Security Applications Conference
(ACSAC 2008).
Internet Measurement Conference (IMC), 2008
13th European Symposium on Research in Computer Security
(ESORICS 2008).
The 15th ACM Conference on Computer and Communications Security
(CCS 2008).
The 17th USENIX Security Symposium (Security '08).
3rd USENIX Workshop on Hot Topics in Security (HotSec
'08).
The 2008 IEEE Symposium on Security and Privacy.
The 15th Annual Network and Distributed System Security
Symposium (NDSS 2008).
The 23rd Annual Computer Security Applications Conference
(ACSAC 2007).
The 14th ACM Conference on Computer and Communications Security
(CCS 2007).
The 10th International Symposium on Recent Advances in
Intrusion Detection (RAID 2007).
The 16th USENIX Security Symposium (Security '07).
The 2007 IEEE Symposium on Security and Privacy.
The 14th Annual Network and Distributed System Security
Symposium (NDSS 2007).
The 2nd International Conference on Security and Privacy for
Emerging Areas in Communication Networks (SecureComm 2006).
The 15th USENIX Security Symposium (Security '06).
The 13th Annual Network and Distributed System Security
Symposium (NDSS 2006).
The 1st International Conference on Security and Privacy for
Emerging Areas in Communication Networks (SecureComm 2005).
The 2005 ACM Workshop on Wireless Security (WiSe 2005).
The 2005 IEEE International Conference on Data Mining (ICDM
2005).
The 2005 IEEE Symposium on Security and Privacy.
The Fourteenth International World Wide Web Conference
(WWW2005).
The 2005 International Conference on Distributed Computing
Systems (ICDCS).
The 2004 ACM Workshop on Visualization and Data Mining for
Computer Security (VizSEC/DMSEC 2004).
The 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks
(SASN 2004).
The 2004 ACM Workshop on Wireless Security (WiSe 2004).
Steering Committee and Program Committee, 7th
International Symposium on Recent Advances in Intrusion Detection
(RAID 2004).
10th ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining, 2004.
The 2004 SIAM International Conference on Data Mining,
2004.
The 2004 IEEE International Conference on Data Mining (ICDM
2004).
5th Annual IEEE Information Assurance Workshop, 2003.
PC Co-Chair, ICDM Workshop on Data Mining for Computer
Security (DMSEC 2003).
The 2003 IEEE International Conference on Data Mining,
2003.
The 2003 ACM Workshop on Wireless Security (WiSe 2003).
4th Annual IEEE Information Assurance Workshop, 2003.
6th International Symposium on Recent Advances in Intrusion
Detection (RAID 2003).
9th ACM SIGKDD International Conference on Knowledge Discovery
& Data Mining, 2003.
The 2002 New Security Paradigms Workshop.
The 2002 IEEE Symposium on Security and Privacy.
PC Co-Chair, 4th International Symposium on Recent
Advances in Intrusion Detection (RAID 2001), 2001.
Program Committee and Organizational Committee, 6th ACM
SIGKDD International Conference on Knowledge Discovery & Data
Mining, 2000.
Professional Activities
Other Services
Advisory Board of the NUS-Singtel Cyber Security Research &
Development Laboratory, National University of Singapore. 2019-2021.
Secure, Accessible & Fair Elections (SAFE) Commission, State of
Georgia, 2018-2019
Advisory Board of the Faculty of Engineering, The Chinese
University of Hong Kong. 2017-
Board of Trustees, Pace Academy. 2017-