Publications

Refereed Conference Papers

    November 1, 2006 - October 31, 2007

  1. Richard Ta-Min, Lionel Litty, David Lie, Splitting Interface: Making Trust Between Applications and Operating Systems Configurable, In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2006), November 2006. pdf
  2. D. Whyte, P.C. van Oorschot, E. Kranakis, Addressing SMTP-based Mass-Mailing Activity Within Enterprise Networks, Annual Computer Security Applications Conference (2006 ACSAC), Miami Beach, Florida, December 2006.
  3. November 1, 2005 - October 31, 2006

  4. M. Al-Subaie, M. Zulkernine, Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection, Proc. of the 30th Annual International Computer Software and Applications Conference (COMPSAC), Chicago, USA, September 2006.
  5. Kurniadi Asrigo, Lionel Litty and David Lie, Using VMM-Based Sensors to Monitor Honeypots, In Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE 2006), June 2006.
  6. M. Chechik, T. Hart, Arie Gurfinkel, K. Ku, David Lie, A. Solnchev, Ou Wei, Finding Security Vulnerabilities with Software Model-Checker Yasm, In Technology Showcase, CASCON, October 2006.
  7. A. Gurfinkel, O. Wei, M. Chechik, YASM: A Software Model-Checker for Verification and Refutation, In Proceedings of 18th International Conference on Computer-Aided Verification (CAV'06), Seattle, WA, August 2006.
  8. A. Gurfinkel, M. Chechik, Why Waste a Perfectly Good Abstraction? In Proceedings of 12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'06), Vienna, Austria, April 2006.
  9. A. Gurfinkel, O. Wei, M. Chechik, Systematic Construction of Abstractions for Model-Checking, In Proceedings of 7th International Conference on Verification, Model-Checking, and Abstract Interpretation (VMCAI'06), Charleston, SC, Janurary 2006.
  10. Evan Hughes, Anil Somayaji, Towards Network Awareness, 19th Large Installation System Administration (LISA) Conference, December 4 2005.
  11. Yiru Li, Anil Somayaji, Securing Email Archives through User Modeling, 21st Annual Computer Security Applications Conference (ACSAC), December 5-9, 2005, Tucson, Arizona.
  12. Lionel Litty, David Lie, Manitou: A Layer-Below Approach to Fighting Malware, In Proceedings of the Workshop on Architectural and System Support for Improving Software Dependability (ASID), held in conjunction with ASPLOS 2006, October 2006. pdf
  13. M. Mannan, P. C. van Oorschot, A Protocol for Secure Public Instant Messaging, Financial Cryptography and Data Security (FC'06), February 2006.
  14. M. Mannan, P.C. van Oorschot, Instant Messaging Worms, Analysis and Countermeasures, WORM 2005 (ACM Workshop on Rapid Malcode), Fairfax, VA, November 2005. pdf.
  15. Sylvain Marquis, T.R. Dean, S. Knight, Packet Decoding using Context Sensitive Parsing, Proc. CASCON 06, 16th IBM Centre for Advanced Studies Conference, Toronto, Canada, October 2006.
  16. Tao Wan, P.C. van Oorschot, Analysis of BGP Prefix Origins During Google's May 2005 Outage, 2nd International Workshop on Security in Systems and Networks (SSN2006), Rhode Island, Greece, April 25 2006. pdf.
  17. D. Whyte, P.C. van Oorschot, E. Kranakis, Exposure Maps: Removing Reliance on Attribution During Scan Detection, 1st Workshop on Hot Topics in Security (HotSec'06), July 2006.
  18. D. Whyte, P.C. van Oorschot, E. Kranakis, Detecting Intra-Enterprise Scanning Worms Based on Address Resolution, 21st Annual Computer Security Applications Conference (2005 ACSAC), Tucson, Arizona, December 5-9, 2005. pdf.
  19. J. Zhang, M. Zulkernine, Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection, Symposium on Network Security and Information Assurance - Proc. of the IEEE International Conference on Communications (ICC), Istanbul, Turkey, June 2006. pdf.
  20. Songtao Zhang, T.R. Dean, S. Knight, A Lightweight Approach To State Based Security Testing, Proc. CASCON 06, 16th IBM Centre for Advanced Studies Conference, Toronto, Canada, October 2006.
  21. November 1, 2004 - October 31, 2005

  22. S. Marquis, T. Dean S. Knight, SCL: A Language for Security Testing of Network Applications, Proc. CASCON 05, 15th IBM Centers for Advanced Studies Conference, Toronto, Canada, October 2005.
  23. A. Matrawy, P.C. van Oorschot, A. Somayaji, Mitigating Network Denial of Service through Diversity-Based Traffic Management, Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, June 7-10, 2005. pdf. Proceedings, Springer LNCS 3531, pp.104-121, 2005.
  24. T. Wan, E. Kranakis, P.C. van Oorschot, Pretty Secure BGP, Network and Distributed System Security Symposium (NDSS'05), San Diego, CA, February 2005. pdf, ps.
  25. D. Whyte, E. Kranakis, P.C. van Oorschot, DNS-based Detection of Scanning Worms in an Enterprise Network, Network and Distributed System Security Symposium (NDSS'05), San Diego, CA, February 2005. pdf.

Journal Papers

    November 1, 2006 - October 31, 2007

    November 1, 2005 - October 31, 2006

  1. P.C. van Oorschot, J.M. Robert, M. Vargas Martin, A Monitoring System for Detecting Repeated Packets with Applications to Computer Worms. Springer International Journal of Information Security, vol.9 no.1, pp.186-199, February 2006. pdf.
  2. November 1, 2004 - October 31, 2005

  3. P.C. van Oorschot, A. Somayaji, G. Wurster, Hardware-assisted circumvention of self-hashing software tamper resistance, IEEE Transactions on Dependable and Secure Computing, vol.2 no.2, June 2005. pdf (C) IEEE.

Technical Reports, Other Unrefereed Papers, Posters, etc.

    November 1, 2006 - October 31, 2007

    November 1, 2005 - October 31, 2006

  1. J.A. Muir, P.C. van Oorschot, Internet Geolocation and Evasion, Carleton University, School of Computer Science, Technical Report TR-06-05 April 2006.
  2. Z. Zhu, M. Zulkernine, Intrusion Detection Using Aspects, Poster, MITACS 7th Annual Conference, Toronto, Canada, June 2006.
  3. November 1, 2004 - October 31, 2005

  4. E. Kranakis, P.C. van Oorschot, Tao Wan, On Inter-domain Routing Security and Pretty Secure BGP (psBGP), Carleton University, School of Computer Science, Technical Report TR-05-08, September 20 2005.
  5. Tao Wan, P.C. van Oorschot, E. Kranakis, A Selective Introduction to Border Gateway Protocol (BGP) Security Issues, Carleton University, School of Computer Science, Technical Report TR-05-07 August 2005. Also in: Proc. of NATO Advanced Studies Institute on Network Security and Intrusion Detection, Nork, Yerevan, Armenia, Oct. 1-12 2005, IOS Press (to appear, 2006).
  6. D. Whyte, P.C. van Oorschot, E. Kranakis, Addressing SMTP-based Mass-Mailing Activity Within an Enterprise Network, Carleton University, School of Computer Science, Technical Report TR-05-06 May 2005.
  7. J. Zhang, M. Zulkernine, Data Mining Meets Intrusion Detection, Poster, MITACS 6th Annual Conference, Calgary, Canada, May 2005.

Theses

  1. Tim Furlong, Tools, Data, and Flow Attributes for Understanding Network Traffic without Payload, M.C.S. Thesis. Carleton University, December 2006.
  2. Evan Hughes, Parsing Streaming Network Protocols, M.C.S. Thesis. Carleton University, September 2006.
  3. Richard Ta-Min, Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable, Master's thesis (ECE), University of Toronto, September 2006.
  4. James Kelly, An Examination of Pattern Matching Algorithms for Intrusion Detection Systems, M.C.S. Thesis. Carleton University, August 2006.
  5. Tao Wan, Securing Routing Protocols Through Information Corroboration, Ph.D. Thesis. Carleton University, January 2006.
  6. Jiong Zhang, Network Intrusion Detection Systems Using Random Forests, MSc Thesis, School of Computing, Queen's University, Kingston, Canada, December 2005.
  7. Yiru Li, Email archives Intrusion Detection, M.C.S. Thesis. Carleton University, Fall 2005.

Related Work

Marsha Chechik http://www.cs.toronto.edu/~chechik/publications.html
Scott Knight http://tarpit.rmc.ca/knight/Publications.html
David Lie http://www.eecg.toronto.edu/~lie/pubs.htm
Paul van Oorschot http://www.scs.carleton.ca/~paulv/papers/pubs.html
Anil Somayaji http://www.scs.carleton.ca/~soma/publications.html
Mohammad Zulkernine http://www.cs.queensu.ca/~qrst/pub.htm