WISCONSIN~

Vinod Yegneswaran , Paul Barford , Johannes Ullrich

2002
WAIL Internet Sinks

Dave Plonka , Paul Barford , Vinod Yegneswaran

Augmenting rule-based dns censorship detection at scale with machine learning

Jacob Brown , Xi Jiang , Van Tran , Arjun Nitin Bhagoji
3750 -3761

3
2023
GFWeb: Measuring the Great Firewall’s Web Censorship at Scale

Nguyen Phong Hoang , Jakub Dalek , Masashi Crete-Nishihata , Nicolas Christin

BLADE

Long Lu , Vinod Yegneswaran , Phillip Porras , Wenke Lee
Proceedings of the 17th ACM conference on Computer and communications security

2010
Reexamining DNS From a Global Recursive Resolver Perspective

Hongyu Gao , Vinod Yegneswaran , Jian Jiang , Yan Chen
IEEE/ACM Transactions on Networking

53
2014
autoMPI: automated multiple perspective attack investigation with semantics aware execution partitioning

Mohannad Alhanahnah , Shiqing Ma , Ashish Gehani , Gabriela F Ciocarlie
IEEE Transactions on Software Engineering 49 ( 4) 2761 -2775

2022
Poster: a path-cutting approach to blocking XSS worms in social web networks

Yinzhi Cao , Vinod Yegneswaran , Phillip Porras , Yan Chen
745 -748

7
2011
{CLARION}: Sound and clear provenance tracking for microservice deployments

Xutong Chen , Hassaan Irshad , Yan Chen , Ashish Gehani
30th USENIX Security Symposium (USENIX Security 21) 3989 -4006

19
2021
Using provenance patterns to vet sensitive behaviors in Android apps

Chao Yang , Guangliang Yang , Ashish Gehani , Vinod Yegneswaran
Security and Privacy in Communication Networks: 11th EAI International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Proceedings 11 58 -77

30
2015
Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective

Jinwoo Kim , Minjae Seo , Seungsoo Lee , Jaehyun Nam
Computer Networks 110203 -110203

2
2024
On the privacy and integrity risks of contact-tracing applications

Jianwei Huang , Vinod Yegneswaran , Phillip Porras , Guofei Gu
arXiv preprint arXiv:2012.03283

2
2020
Systematizing Attacks and Defenses in Software-Defined Networking: A Survey

Jinwoo Kim , Minjae Seo , Seungsoo Lee , Jaehyun Nam
Authorea Preprints

1
2023
A Security Enforcement Kernel for OpenFlow Networks HotSDN 2012

Phillip Porras , Vinod Yegneswaran , Seungwon Shin , Guofei Gu
Google Scholar Google Scholar Digital Library Digital Library

1
A multi-perspective analysis of the storm (peacomm) worm

Phillip Porras , Hassen Saidi , Vinod Yegneswaran
Technical report, Computer Science Laboratory, SRI International

206
2007
Eureka: A framework for enabling static analysis on malware

Vinod Yegneswaran , Hassen Saidi , Phillip Porras , Monirul Sharif
ESORICS’08 Proceedings of the 13th European Symposium on Research in Computer Security 481 -500

204
2008
Security mediation for dynamically programmable network

Phillip A Porras , Martin W Fong , Vinod Yegneswaran

139
2016
Conficker C analysis

Phillip Porras , Hassen Saidi , Vinod Yegneswaran
SRI International 1 1 -1

92
2009
Conficker C P2P protocol and implementation

Phillip Porras , Hassen Saidi , Vinod Yegneswaran
SRI International, Menlo Park, CA, Tech. Rep

38
2009