What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Salvatore J. Stolfo
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2019
journals/compsec
Active authentication using file system decoys and user behavior modeling: results of a large scale study.
Jonathan Voris
Yingbo Song
Malek Ben Salem
Shlomo Hershkop
Salvatore J. Stolfo
2018
conf/sp
Simulated User Bots: Real Time Testing of Insider Threat Detection Systems.
Preetam Dutta
Gabriel Ryan
Aleksander Zieba
Salvatore J. Stolfo
2017
conf/uss
CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management.
Adrian Tang
Simha Sethumadhavan
Salvatore J. Stolfo
2017
conf/sp
NEZHA: Efficient Domain-Independent Differential Testing.
Theofilos Petsios
Adrian Tang
Salvatore J. Stolfo
Angelos D. Keromytis
Suman Jana
2015
conf/ccs
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads.
Adrian Tang
Simha Sethumadhavan
Salvatore J. Stolfo
2014
conf/ccs
Model Aggregation for Distributed Content Anomaly Detection.
Sean Whalen
Nathaniel Boggs
Salvatore J. Stolfo
2013
conf/sp
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models.
Yingbo Song
Malek Ben Salem
Shlomo Hershkop
Salvatore J. Stolfo
2013
conf/ndss
When Firmware Modifications Attack: A Case Study of Embedded Exploitation.
Ang Cui
Michael Costello
Salvatore J. Stolfo
2012
conf/ccs
Software decoys for insider threat.
Young Hee Park
Salvatore J. Stolfo
2012
conf/sp
Lost in Translation: Improving Decoy Documents via Automated Translation.
Jonathan Voris
Nathaniel Boggs
Salvatore J. Stolfo
2012
conf/sp
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud.
Salvatore J. Stolfo
Malek Ben Salem
Angelos D. Keromytis
2011
conf/uss
Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design.
Ang Cui
Jatin Kataria
Salvatore J. Stolfo
2011
conf/uss
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned.
Malek Ben Salem
Salvatore J. Stolfo
2011
conf/acsac
From prey to hunter: transforming legacy embedded devices into exploitation sensor grids.
Ang Cui
Jatin Kataria
Salvatore J. Stolfo
2010
conf/acsac
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan.
Ang Cui
Salvatore J. Stolfo
2010
conf/wisec
Automating the injection of believable decoys to detect snooping.
Brian M. Bowen
Vasileios P. Kemerlis
Pratap V. Prabhu
Angelos D. Keromytis
Salvatore J. Stolfo
2009
conf/ccs
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes.
Angelos Stavrou
Gabriela F. Cretu-Ciocarlie
Michael E. Locasto
Salvatore J. Stolfo
2009
conf/iciss
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs.
Vanessa Frías-Martínez
Salvatore J. Stolfo
Angelos D. Keromytis
2009
conf/ndss
Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic.
Yingbo Song
Angelos D. Keromytis
Salvatore J. Stolfo
2009
conf/acsac
A Network Access Control Mechanism Based on Behavior Profiles.
Vanessa Frías-Martínez
Joseph Sherrick
Salvatore J. Stolfo
Angelos D. Keromytis
2008
conf/sp
Casting out Demons: Sanitizing Training Data for Anomaly Sensors.
Gabriela F. Cretu
Angelos Stavrou
Michael E. Locasto
Salvatore J. Stolfo
Angelos D. Keromytis
2008
conf/iwsec
Return Value Predictability Profiles for Self-healing.
Michael E. Locasto
Angelos Stavrou
Gabriela F. Cretu
Angelos D. Keromytis
Salvatore J. Stolfo
2008
conf/acsac
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors.
Vanessa Frías-Martínez
Salvatore J. Stolfo
Angelos D. Keromytis
2007
conf/ccs
On the infeasibility of modeling polymorphic shellcode.
Yingbo Song
Michael E. Locasto
Angelos Stavrou
Angelos D. Keromytis
Salvatore J. Stolfo
2003
conf/ccs
A holistic approach to service survivability.
Angelos D. Keromytis
Janak J. Parekh
Philip Gross
Gail E. Kaiser
Vishal Misra
Jason Nieh
Dan Rubenstein
Salvatore J. Stolfo
2001
conf/sp
Data Mining Methods for Detection of New Malicious Executables.
Matthew G. Schultz
Eleazar Eskin
Erez Zadok
Salvatore J. Stolfo
1999
conf/sp
A Data Mining Framework for Building Intrusion Detection Models.
Wenke Lee
Salvatore J. Stolfo
Kui W. Mok
1998
conf/uss
Data Mining Approaches for Intrusion Detection.
Wenke Lee
Salvatore J. Stolfo
Coauthors
Adrian Tang
(3)
Aleksander Zieba
(1)
Ang Cui
(4)
Angelos D. Keromytis
(11)
Angelos Stavrou
(4)
Brian M. Bowen
(1)
Dan Rubenstein
(1)
Eleazar Eskin
(1)
Erez Zadok
(1)
Gabriel Ryan
(1)
Gabriela F. Cretu
(2)
Gabriela F. Cretu-Ciocarlie
(1)
Gail E. Kaiser
(1)
Janak J. Parekh
(1)
Jason Nieh
(1)
Jatin Kataria
(2)
Jonathan Voris
(2)
Joseph Sherrick
(1)
Kui W. Mok
(1)
Malek Ben Salem
(4)
Matthew G. Schultz
(1)
Michael Costello
(1)
Michael E. Locasto
(4)
Nathaniel Boggs
(2)
Philip Gross
(1)
Pratap V. Prabhu
(1)
Preetam Dutta
(1)
Salvatore J. Stolfo
(28)
Sean Whalen
(1)
Shlomo Hershkop
(2)
Simha Sethumadhavan
(2)
Suman Jana
(1)
Theofilos Petsios
(1)
Vanessa Frías-Martínez
(3)
Vasileios P. Kemerlis
(1)
Vishal Misra
(1)
Wenke Lee
(2)
Yingbo Song
(4)
Young Hee Park
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to