Publications

Sections Bottom

Publications by year

2016

State-aware Network Access Management for Software-Defined Networks
Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupe, Gail-Joon Ahn, Kuang-Ching Wang and Juan Deng ACM Symposium on Access Control Models And Technologies (SACMAT), Shanghai, China, 2016 (to appear)

Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin
Kevin Liao, Ziming Zhao, Adam Doupe, and Gail-Joon Ahn
APWG Symposium on Electronic Crime Research (eCrime), 2016 (to appear)

Checking Intent-based Communication in Android with Intent Space Analysis
Yiming Jing, Gail-Joon Ahn, Adam Doupe and Jeong Hyun Yi
ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2016 (to appear)

Target Fragmentation in Android Apps
Patrick Mutchler, Yeganeh Safaei, Adam Doupe, John Mitchell
IEEE Computer Society and Privacy Workshops on Mobile Security Technologies (MoST), 2016 (to appear)

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephony Spam
Huahong Tu, Adam Doupe, Ziming Zhao, and Gail-Joon Ahn
Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland), 2016 (to appear)

TRIPLEMON: A Multi-layer Security Framework for Mediating Inter-Process Communication on Android
Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, and Ziming Zhao
Journal of Computer Security (JCS), IOS Press, May 2016 (to appear)

Towards a Moving Target Defense Approach for Attribute-based Access Control (PDF) (BibTex)
Carlos E. Rubio-Medrano, Josephine Lamp, Marthony Taguinod, Adam Doupé, Ziming Zhao and Gail-J. Ahn
1st ACM Workshop on Attribute-based Access Control (ABAC), 2016

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy (PDF) (BibTex)
Vitor Afonso, Antonio Bianchi, Yanick Fratantonio, Adam Doupé, Mario Polino, Paulo de Geus, Christopher Kruegel, and Giovanni Vigna
Proceedings of the Symposium on Network and Distributed System Security (NDSS), 2016

HoneyMix: Toward SDN-based Intelligent Honeynet (PDF) (BibTex)
Wonkyu Han, Ziming Zhao, Adam Doupé, and Gail-Joon Ahn
ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Sec), 2016

2015

VNGuard: An NFV/SDN Combination Framework for Provisioning and Managing Virtual Firewalls
Juan Deng, Hongxin Hu, Hongda Li, Zhizhong Pan, Kuang-Ching Wang, Gail-J. Ahn, Jun Bi and Younghee Park
IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2015

AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing
Khaled Riad, Yan Zhu, Hongxin Hu and Gail-J. Ahn
1st IEEE International Conference on Collaboration and Internet Computing (CIC), 2015

ACTRA – A Case Study for Threat Information Sharing
Jon Haass, Gail-J. Ahn and Frank Grimmelmann
2nd ACM Workshop on Information Sharing and Collaborative Security (WISCS), 2015

Achieving Security Assurance with Assertion-based Application Construction (PDF) (Bib)
Carlos E. Rubio-Medrano, Gail-J. Ahn and Karsten Sohr
EAI Endorsed Transactions (EAI), 2015

Mules, Seals, and Attacking Tools: Analyzing Twelve Online Marketplaces
Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn, Thomas J. Holt, Yiming Jing and Hongxin Hu
IEEE Security & Privacy Magazine, 2015

Toward a Moving Target Defense for Web Applications (PDF) (Bib)
Marthony Taguinod, Adam Doupé, Ziming Zhao and Gail-Joon Ahn
16th IEEE International Conference on Information Reuse and Integration (IRI), 2015

Federated Access Management for Collaborative Network Environments: Framework and Case Study (PDF) (BibTex)
Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, and Gail-J. Ahn
ACM Symposium on Access Control Models And Technologies (SACMAT), Vienna, Austria, June 1-3, 2015

A Large-Scale Study of Mobile Web App Security (PDF)
Patrick Mutchler, Adam Doupé, John Mitchell, Chris Kruegel and Giovanni Vigna
IEEE Computer Society Security and Privacy Workshops on Mobile Security Technologies (MoST), San Jose, CA, USA, May 21, 2015 Best Paper Award

Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation (PDF) (BibTex)
Ziming Zhao, Gail-J. Ahn, and Hongxin Hu
ACM Transactions on Information and System Security (TISSEC), April 2015

Towards Automated Risk Assessment and Mitigation of Mobile Applications (PDF) (BibTex)
Yiming Jing, Gail-Joon Ahn, Ziming Zhao and Hongxin Hu
IEEE Transactions on Dependable and Secure Computing (TDSC), February 2015

Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis (PDF) (BibTex)
Napoleon C. Paxton, Dae-il Jang, Stephen Russel, Gail-J. Ahn, Ira S. Moskowitz and Paul Hyden
48th Annual Hawaii International Conference on System Sciences (HICSS), Hawaii, USA, January 5-8, 2015

2014

Morpheus: Automatically Generating Heuristics to Detect Android Emulators (PDF) (BibTex)
Yiming Jing, Ziming Zhao, Gail-J. Ahn and Hongxin Hu
Annual Computer Security Applications Conference (ACSAC), New Orleans, Louisiana, USA, December 8, 2014

Discovering and Analyzing Deviant Communities: Methods and Experiments (PDF) (BibTex)
Napoleon C. Paxton, Dae-il Jang, Ira S. Moskowitz, Gail-J. Ahn, Stephen Russell and Myong Kang
IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Miami, FL, USA, October 22–25, 2014

Achieving Security Assurance with Assertion-based Application Construction (PDF) (BibTex)
Carlos E. Rubio-Medrano, Gail-J. Ahn and Karsten Sohr
IEEE International Workshop on Trusted Collaboration (TrustCol) In conjuction with IEEE CollaborateCom, Miami, FL, USA, October 22, 2014

FlowGuard: Building Robust Firewalls for Software-Defined Networks (PDF) (BibTex)
Hongxin Hu, Wonkyu Han, Gail-J. Ahn and Ziming Zhao
ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Chicago, IL, USA, August 22, 2014

Ten Years of iCTF: The Good, The Bad, and The Ugly (PDF) (BibTex)
Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupé, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, and Yan Shoshitaishvili
USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE), August 18, 2014

Policy-driven security management for fog computing: Preliminary framework and a case study (PDF) (BibTex)
Clinton Dsouza, Gail-J. Ahn and Marthony Taguinod
IEEE International Conference on Information Reuse and Integration (IRI), Redwood City, CA, USA, August 13, 2014

LPM: Layered Policy Management for Software-Defined Networks (PDF) (BibTex)
Wonkyu Han, Hongxin Hu and Gail-J. Ahn
IFIP WG 11.3 Working Conference on Database and Application Security (DBSec), Vienna, Austria. July 14-16, 2014

Game Theoretic Analysis of Multiparty Access Control in Online Social Networks (PDF) (BibTex)
Hongxin Hu, Gail-J. Ahn, Ziming Zhao and Dejun Yang
ACM Symposium on Access Control Models And Technologies (SACMAT), London, Ontario, Canada, June 25-27, 2014

Do You Feel Lucky? A Large-Scale Analysis of Risk-Rewards Trade-Offs in Cyber Security (PDF) (BibTex)
Yan Shoshitaishvili, Luca Invernizzi, Adam Doupé, and Giovanni Vigna
ACM Symposium on Applied Computing (SAC), March 24, 2014

Towards a Reliable SDN Firewall (PDF) (BibTex)
Hongxin Hu, Gail-J. Ahn, Wonkyu Han and Ziming Zhao
Open Networking Summit (ONS) Research Track, Santa Clara, CA, USA, March 3-5, 2014

RiskMon: Continuous and Automated Risk Assessment of Mobile Applications (PDF) (BibTex)
Yiming Jing, Gail-J. Ahn, Ziming Zhao, and Hongxin Hu
ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, USA, March 3-5, 2014

Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results (PDF) (BibTex)
Wonkyu Han, Mike Mabey, Gail-J. Ahn, and Tae Sung Kim
Advances in Intelligent and Soft Computing Series (AISC), Book Chapter, Springer, 2014

2013

Extensible Policy Framework for Heterogeneous Network Environments (PDF) (BibTex)
L. Teo, and Gail-J. Ahn
International Journal of Information and Computer Security, Vol. 5, No. 4, December 2013

Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy (PDF) (BibTex)
Yan Zhu, Gail-J. Ahn, Hongxin Hu, Di Ma and Shanbiao Wang
IEEE Transactions on Information Forensics & Security (TIFS), 2013

deDacota: Toward Preventing Server-Side XSS via Automatic Code and Data Separation (PDF) (BibTex)
Adam Doupé, Weidong Cui, Mariusz H. Jakubowski, Marcus Peinado, Christopher Kruegel, and Giovanni Vigna
ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 4-8, 2013

Discovery and Resolution of Anomalies in Web Access Control Policies? (PDF) (BibTex)
Hongxin Hu, Gail-J. Ahn and Ketan Kulkarni
IEEE Transactions on Dependable and Secure Computing (TDSC), October 2013

Writing Groups in Computer Science Research Labs (PDF) (BibTex)
Adam Doupé and Janet L. Kayfetz
Frontiers in Education Conference (FIE), Oklahoma city, OK, USA, October 23-26, 2013

Supporting secure collaborations with attribute-based access control (PDF) (BibTex)
Carlos E. Rubio-Medrano, Clinton D'Souza and Gail-J. Ahn
IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Austin, TX, USA, October 20-23, 2013

Towards Comprehensive and Collaborative Forensics on Email Evidence (PDF) (BibTex)
Justin Paglierani, Mike Mabey and Gail-J. Ahn
IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Austin, TX, USA, October 20-23, 2013

Using Instruction Sequence Abstraction for Shellcode Detection and Attribution (PDF) (BibTex)
Ziming Zhao and Gail-J. Ahn
IEEE Conference on Communications and Network Security (CNS), WA, D.C, USA, October 14-16, 2013

ACaaS: Access Control as a Service for IaaS Cloud (PDF) (BibTex)
Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haying Xi
IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT), WA, D.C, USA, September 08-14, 2013

Simulation-Based Validation for Smart Grid Environments (PDF) (BibTex)
Wonkyu Han, Mike Mabey and Gail-J. Ahn
IEEE International Conference on Information Reuse and Integration (IRI), San Francisco, CA, USA, August 14-16, 2013

On the Security of Picture Gesture Authentication (PDF) (BibTex)
Ziming Zhao, Gail-J. Ahn, Jeong-Jin Seo and Hongxin Hu
USENIX Security Symposium (SECURITY), WA, D.C, USA, August 14-16, 2013

Verifying Access Control Properties with Design by Contract (PDF) (BibTex)
Carlos Rubio-Medrano, Gail-J. Ahn and Karsten Sohr
IEEE International Computer Software and Applications Conference (COMPSAC), Kyoto, Japan, July 22-26, 2013

Examining Social Dynamics and Malware Secrets to Mitigate Net-centric Attacks
Ziming Zhao and Gail-Joon Ahn
Hackers and Hacking: A Reference Handbook, ABC-CLIO. July 19, 2013

Visualization-based policy analysis for SELinux: framework and user study (PDF) (BibTex)
Wenjuan Xu, Mohamed Shehab and Gail-J. Ahn
International Journal of Information Security, June 2013

Dynamic Audit Services for Outsourced Storages in Clouds (PDF) (BibTex)
Yan Zhu, Gail-J. Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, Changjun Hu
IEEE Transactions on Services Computing (TSC), March 2013

Multiparty Access Control for Online Social Networks: Model and Mechanisms (PDF) (BibTex)
Hongxin Hu, Gail-J. Ahn and Jan Jorgensen
IEEE Transactions on Knowledge and Data Engineering (TKDE), March 2013

EARs in the Wild: Large-Scale Analysis of Execution After Redirect Vulnerabilities (PDF) (BibTex)
Pierre Payet, Adam Doupé, Christopher Kruegel, and Giovanni Vigna
ACM Symposium on Applied Computing (SAC), Coimbra, Portugal, March 18-22, 2013

Towards Collaborative Forensics (PDF) (BibTex)
Mike Mabey and Gail-Joon Ahn
Information Reuse and Integration in Academia and Industry, 2013

Collaboration in Multi-Cloud Applications: Framework and Security Issues (PDF) (BibTex)
Mukesh Singhal, Santosh Chandrasekhar, Ge Tingjian, Ravi Sandhu, Ram Krishnan, Gail-J. Ahn and Elisa Bertino
IEEE Computer, 2013

Design and Implementation of Access Control as a Service for IaaS Cloud (PDF) (BibTex)
Ruoyu Wu, Xinwen Zhang, Gail-J. Ahn and Hongxin Hu
ASE SCIENCE Journal, 2013

2012

Enabling Collaborative Data Sharing in Google+ (PDF) (BibTex)
Hongxin Hu, Gail-J. Ahn and Jan Jorgensen
IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, December 3-7, 2012

Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices (PDF) (BibTex)
Yan Zhu, Shanbiao Wang, Di Ma, Hongxin Hu and Gail-J. Ahn
IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, December 3-7, 2012

Comprehensive Two-Level Analysis of Role-Based Delegation and Revocation Policies with UML and OCL (PDF) (BibTex)
Karsten Sohr, Mirco Kuhlmann, Martin Gogolla, Hongxin Hu and Gail-Joon Ahn
Information and Software Technology, Elsevier, December 2012

Model-based Conformance Testing for Android (PDF) (BibTex) Yiming Jing, Gail-J. Ahn and Hongxin Hu
International Workshop on Security (IWSEC), Fukuoka, Japan, November 7-9, 2012

Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage (PDF) (BibTex)
Yan Zhu, Hongxin Hu, Gail-J. Ahn, Mengyang Yu and Shimin Chen
IEEE Transactions on Parallel and Distributed Systems (TPDS), October 2012

SocialImpact: Systematic Analysis of Underground Social Dynamics (PDF) (BibTex)
Ziming Zhao, Gail-J. Ahn, Hongxin Hu and Deepinder Mahi
European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 10-14, 2012

Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner (PDF) (BibTex)
Adam Doupé, Ludovico Cavedon, Christopher Kruegel, and Giovanni Vigna
USENIX Security Symposium (SECURITY), Bellevue, WA, USA, August 8-10, 2012 Outstanding Publication Award in Computer Science, UC Santa Barbara

Towards Temporal Access Control in Cloud Computing (PDF) (BibTex)
Yan Zhu, Hongxin Hu, Gail-J. Ahn, Dijiang Huang and Shanbiao Wang
IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, USA, March 25-30, 2012

Access Control for Online Social Networks Third Party Applications (PDF) (BibTex)
Mohamed Shehab, Anna Squicciarini, Gail-J. Ahn and Irini Kokkinou
Computers & Security (COSE), Elsevier Science, March 2012

Detecting and Resolving Firewall Policy Anomalies (PDF) (BibTex)
Hongxin Hu, Gail-J. Ahn and Ketan Kulkarni
IEEE Transactions on Dependable and Secure Computing (TDSC), March 2012

Remote Attestation with Domain-based Integrity Model and Policy Analysis (PDF) (BibTex)
Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-J. Ahn and Jean-Pierre Seifert
IEEE Transactions on Dependable and Secure Computing (TDSC), March 2012

Policy-driven role-based access management for ad-hoc collaboration (PDF) (BibTex)
Gail-J. Ahn, Jing Jin, Mohamed Shehab
Journal of Computer Security (JCS), IOS Press, March 2012

Efficient Audit Service Outsourcing for Data Integrity in Clouds (PDF) (BibTex)
Yan Zhu, Hongxin Hu, Gail-J. Ahn and Stephen S. Yau
Journal of Systems and Software), Elsevier, March 2012

Comparison-Based Encryption for Fine-grained Access Control in Clouds (PDF) (BibTex)
Yan Zhu, Hongxin Hu, Gail-J. Ahn and Mengyan Yu
ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, USA, February 7-9, 2012

Towards HIPAA-Compliant Healthcare Systems in Cloud Computing (PDF) (BibTex)
Ruoy Wu, Gail-J. Ahn and Hongxin Hu
International Journal of Computational Models and Algorithms in Medicine, Vol. 3, No. 2, IGI Global, January 2012

Towards HIPAA-compliant Healthcare Systems (PDF) (BibTex)
Ruoyu Wu, Gail-J. Ahn and Hongxin Hu
ACM SIGHIT International Health Informatics Symposium (IHI), Miami, FL, USA, January 28-30, 2012

Risk-Aware Mitigation for MANET Routing Attacks (PDF) (BibTex)
Ziming Zhao, Hongxin Hu, Gail-J. Ahn and Ruoyu Wu
IEEE Transactions on Dependable and Secure Computing (TDSC), January 2012

Secure Collaborative Integrity Verification for Hybrid Cloud Environments (PDF) (BibTex)
Yan Zhu, Shanbiao Wang, Hongxin Hu, Gail-J. Ahn and Di Ma
International Journal of Cooperative Information Systems, Vol. 21, No. 3, World Scientific Publishing, 2012

Archived Calendar Years

Archived calendar years