Publications

2018
Preetam Dutta, Gabriel Ryan, Aleksander Zieba and Salvatore Stolfo; "Simulated User Bots: Real Time Testing of Insider Threat Detection Systems;" Workshop on Research for Insider Threats; May 2018; 2018/5/24.

Jonathan Voris, Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore Stolfo; "Active Authentication using File System Decoys and User Behavior Modeling: Results of a Large Scale Study;" Computers & Security; Feb 2018; 2018/2/7. PDF

2017
Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo; "CLKscrew: Exposing the Perils of Security-Oblivious Energy Management;" Black Hat Europe 2017; Dec 2017; 2017/12/06. Whitepaper  Slides

Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo; "CLKscrew: Exposing the Perils of Security-Oblivious Energy Management;" 26th USENIX Security Symposium (USENIX Security); Aug 2017; 2017/08/16. PDF  Presentation
(Distinguished Paper Award)

Theofilos Petsios, Adrian Tang, Salvatore Stolfo, Angelos D. Keromytis, Suman Jana; "NEZHA: Efficient Domain-Independent Differential Testing;" In Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P); May 2017; 2017/05/22. PDF

2016
Yuan Kang, Baishakhi Ray, Suman Jana; "APEx: Automated Inference of Error Specifications for C APIs;" International Conference on Automated Software Engineering (ASE); 2016; 2016/09/06. PDF

Suman Jana, Yuan Kang, Samuel Roth, Baishakhi Ray; "Automatically Detecting Error Handling Bugs using Error Specifications;" USENIX Security Symposium (USENIX); 2016; 2016/08/11. PDF

2015
Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo; "Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads;" Proceedings of 22nd ACM Conference on Computer and Communications Security; CCS 2015; 2015/10/12. PDF

Adrian Tang, John Demme, Simha Sethumadhavan, Salvatore J. Stolfo; "Anti-Virus in Silicon;" Hot Chips (Best Poster) 2015; HC 2015; 2015/08/23. PDF
Demo Video
Poster

Jill Jermyn, Salvatore J. Stolfo, Roger Piqueras Jover, Ilona Murynets, Mikhail Isotomin; "Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks;" World of Wireless, Mobile and Multimedia Networks (WoWMoM); 2015

Jonathan Voris, Jill Jermyn, Nathaniel Boggs, Salvatore J. Stolfo; "Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment;" European Workshop on System Security (EuroSec); 2015. PDF

2014
Sean Whalen, Nathaniel Boggs, Salvatore J. Stolfo; "Model Aggregation for Distributed Content Anomaly Detection;" Workshop on Artificial Intelligence and Security (AISec); ACM; 2014/11/07. PDF

Nathaniel Boggs, Senyao Du (Peter), Salvatore J. Stolfo; "Measuring Drive-by Download Defense in Depth;" 17th International Symposium on Research in Attacks, Intrusions and Defenses; RAID 2014; 2014/09/17. PDF
Watch the Presentation

Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo; "Unsupervised Anomaly-based Malware Detection using Hardware Features;" 17th International Symposium on Research in Attacks, Intrusions and Defenses; RAID 2014; 2014/09/17. PDF
Watch the Presentation

Nathaniel Boggs, Hang Zhao, Senyao Du (Peter), Salvatore J. Stolfo; "Synthetic Data Generation and Defense in Depth Measurement of Web Applications;" 17th International Symposium on Research in Attacks, Intrusions and Defenses; RAID 2014; 2014/09/17. PDF
Watch the Presentation

David Tagatac, Salvatore J. Stolfo; "Poster: Time Randomization to Thwart Concurrency Bug Exploitation;" IEEE Symposium on Security and Privacy 2014; 2014/05/19. PDF

Jill Jermyn, Salvatore J. Stolfo, Jinho Hwang, Kun Bai, Maja Vukovic, Nikos Anerousis; "Improving readiness for enterprise migration to the cloud;" ACM Middleware; 2014

Jill Jermyn, Gabriel Salles-Loustau, Saman Zonouz; "An Analysis of DoS Attack Strategies Against the LTE RAN;" Journal of Cyber Security and Mobility; 2014

Jill Jermyn, Salvatore J. Stolfo, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin; "Firecycle: A scalable test bed for large-scale LTE security research;" IEEE International Conference on Communications (ICC); 2014

2013
Ang Cui, Jatin Kataria, Salvatore J. Stolfo; "Revisiting the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design;" Information Management & Computer Security; Volume 21 issue 2; 2013/6
Abstract

Jonathan Voris, Jill Jermyn, Angelos D. Keromytis, Salvatore J. Stolfo; "Bait and Snitch: Defending Computer Systems with Decoys;" Cyber Infrastructure Protection Conference ; Strategic Studies Institute; 2013/09/01. PDF

John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Adam Waksman, Simha Sethumadhavan, Salvatore J. Stolfo; "On the Feasibility of Online Malware Detection with Performance Counters;" Proceedings of the 40th International Symposium on Computer Architecture, Tel Aviv, Israel; 2013/06/01. PDF

Ang Cui, Michael Costello, Salvatore J. Stolfo; "When Firmware Modifications Attack: A Case Study of Embedded Exploitation;" NDSS 2013; 2013/02/24. PDF

2012
Ang Cui, Michael Costello, Salvatore J. Stolfo; "Hacking Cisco Phones: Just because you are paranoid doesn't mean your phone isn't listening to everything you say;" The 29th Chaos Communication Congress; 2012/12/27
Watch Our Presentation

Junfeng Yang, Ang Cui, Salvatore J. Stolfo, Simha Sethumadhavan; "Concurrency Attacks;" the Fourth USENIX Workshop on Hot Topics in Parallelism; 2012/06/07. PDF

Jonathan Voris, Nathaniel Boggs, Salvatore J. Stolfo; "Lost in Translation: Improving Decoy Documents via Automated Translation;" Workshop on Research for Insider Threat (WRIT); 2012/05/25. PDF

Salvatore J. Stolfo, Malek ben Salem, Angelos D. Keromytis; "Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud;" Workshop on Research for Insider Threat (WRIT); 2012/05/25. PDF

Salvatore J. Stolfo; "Software Decoys for Insider Threat;" ASIACCS 2012; 2012/05/02. PDF

2011
Salvatore J. Stolfo, Steven M. Bellovin, David Evans; "Measuring security;" IEEE Security & Privacy (2011); PDF

Ang Cui, Salvatore J. Stolfo; "Symbiotes and Defensive Mutualism: Moving Target Defense;" Moving Target Defense, Creating Asymmetric Uncertainty for Cyber Threats, (Jajodia, Ed.); ISBN: 978-1-4614-0976-2,Springer, 2011; 2011/8/26. PDF

Ang Cui, Salvatore J. Stolfo; "Print Me If You Dare: Firmware Modification Attacks and the Rise of Printer Malware;" The 28th Chaos Communication Congress; 2011/12/27. PDF
Watch My Presentation

Nathaniel Boggs, Salvatore J. Stolfo; "ALDR: A New Metric for Measuring Effective Layering of Defenses;" Layered Assurance Workshop; 2011/12/06. PDF

Ang Cui, Jatin Kataria, Salvatore J. Stolfo; "From Prey To Hunter: Transforming Legacy Embedded Devices Into Exploitation Sensor Grids;" The 27th Annual Computer Security Applications Conference (ACSAC); 2011/12/05. PDF

Brian Bowen, Ramaswamy Devarajan, Salvatore J. Stolfo; "Measuring the Human Factor of Cyber Security;" IEEE Homeland Security Technology Conference; 2011/11/16. PDF

Yingbo Song, Salvatore J. Stolfo, Tony Jebara; "Behavior-Based Network Traffic Synthesis;" Homeland Security Technologies Conference (HST); IEEE; 2011/11/15. PDF

Malek ben Salem, Salvatore J. Stolfo; "Modeling User Search Behavior for Masquerade Detection;" Proceedings of the Fourteenth Symposium on Recent Advances in Intrusion Detection, RAID 2011, Menlo Park, California.; 2011/09/21. PDF

Ang Cui, Salvatore J. Stolfo; "Defending Legacy Embedded Systems with Software Symbiotes;" The 14th International Symposium on Recent Advances in Intrusion Detection (RAID); 2011/09/20. PDF

Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo; "Cross-domain Collaborative Anomaly Detection: So Far Yet So Close;" Proceedings of 14th International Symposium on Recent Advances in Intrusion Detection (RAID); 2011/09. PDF

Malek ben Salem, Salvatore J. Stolfo; "On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned;" Proceedings of the Fourth Workshop on Cyber Security Experimentation and Test, CSET’11, San Francisco, California.; 2011/08/08. PDF

Ang Cui, Salvatore J. Stolfo, Jatin Kataria; "Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS;" 5th USENIX Workshop on Offensive Technologies (WOOT); 2011/08/08. PDF

Ang Cui, Salvatore J. Stolfo, Jatin Katarai; "Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS;" BlackHat Briefings USA 2011; 2011/08/03. PDF

Malek ben Salem, Salvatore J. Stolfo; "Decoy Document Deployment for Effective Masquerade Attack Detection;" Proceedings of the Eighth Conference on Detection of Intrusions and Malware & Vulnerability Assessment; 2011/07/07. PDF

Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven Bellovin, Salvatore J. Stolfo; "Usable Secure Private Search;" IEEE Security and Privacy; 2011/07/01. PDF

Simha Sethumadhavan, Salvatore J. Stolfo, David August, Angelos D. Keromytis, Junfeng Yang; "The SPARCHS Project: Hardware Support for Software Security;" In Proceedings of the 1st Workshop on Systems Security (SysSec); Amsterdam, Netherlands; 2011/07/01. PDF

Malek ben Salem, Salvatore J. Stolfo; "A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques for Masquerade Detection;" Journal of Security and Communications Networks, Vol. 4; Wiley InterScience; 2011/03/04. PDF

Ang Cui, Salvatore J. Stolfo; "Reflections on the Engineering and Operation of a Large-scale Embedded Device Vulnerability Scanner;" Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) 2011; 2011/01/12. PDF

Salvatore J. Stolfo, Brian Bowen, Malek ben Salem; "Insider Threat Defense;" Encyclopedia of Cryptography and Security (2nd Ed.); Springer; 2011

2010
Ang Cui, Salvatore J. Stolfo; "A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan;" Proccedings of Annual Computer Security Applications Conference (ACSAC) [BEST PAPER AWARD]; Best Paper Award; 2010/12/15. PDF

Nathaniel Boggs, Salvatore J. Stolfo, Sharath Hiremagalore, Angelos Stavrou; "Experimental Results of Cross-Site Exchange of Web Content Anomaly Detector Alerts;" IEEE International Conference on Technologies for Homeland Security; 2010/11. PDF

Brian Bowen, Malek ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo; "Monitoring Technologies for Mitigating Insider Threats;" Insider Threats in Cyber Security and Beyond; Springer; 2010/09/29. PDF

Brian Bowen, Pratap Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo; "BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection;" 13th International Symposium on Recent Advances in Intrusion Detection (RAID); 2010/09/01. PDF

Brian Bowen, Pratap Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo; "BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection;" Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID); 2010/09. PDF

A. Matwyshyn, Ang Cui, Angelos D. Keromytis; "Ethics in Security Vulnerability Research;" IEEE Security and Privacy, Basic Training; R. Ford and D. Frincke, Eds.; 2010/06/01. PDF

Malek ben Salem, Salvatore J. Stolfo; "Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques;" Proceedings of the Second International Workshop on Managing Insider Security Threats, MIST'10; Morioka, Iwate, Japan (Best Paper Award); 2010/06. PDF

Brian Bowen, Vasileios P. Kemerlis, Pratap Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo; "Automating the Injection of Believable Decoys to Detect Snooping (Short Paper);" Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec); 2010/03. PDF

2009
Vanessa Frias-Martinez, Joseph Sherrick, Angelos D. Keromytis, Salvatore J. Stolfo; "A Network Access Control Mechanism Based on Behavior Profiles;" Annual Computer Security Applications Conference; 2009/12. PDF

Shari Lawrence-Pfleeger, Salvatore J. Stolfo; "Addressing the Insider Threat;" IEEE Security and Privacy Magazine; 2009/12. PDF

Brian Bowen, Malek ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo; "Designing Host and Network Sensors to Mitigate the Insider Threat;" IEEE Security & Privacy Magazine, Special Issue on Insider Threat; 2009/11. PDF

Ang Cui, Yingbo Song, Pratap Prabhu, Salvatore J. Stolfo; "Brave New World: Pervasive Insecurity of Embedded Network Devices;" Poster in the 12th Annual International Symposium on Advances in Intrusion Detection (RAID); Saint-Malo, Brittany, France; 2009/09/15. PDF

Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo; "Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating;" Proceedings of 12th International Symposium on Recent Advances in Intrusion Detection (RAID); Saint-Malo, Brittany, France; 2009/09. PDF

Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo; "Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic;" Proceedings of the 16th Annual Network & Distributed System Security Symposium (NDSS); San Diego, CA, USA; 2009/02. PDF

Angelos Stavrou, Gabriela F. Cretu, Michael E. Locasto, Salvatore J. Stolfo; "Keep Your Friends Close: The Necessity for Updating an Anomaly Sensor with Legitimate Environment Changes;" Proceedings of ACM/CCS AISec Workshop; 2009. PDF

Vanessa Frias-Martinez, Joseph Sherrick, Angelos D. Keromytis, Salvatore J. Stolfo; "A Network Access Control Mechanism Based on Behavior Profiles;" Proceedings of the Annual Computer Security Applications Conference (ACSAC); 2009. PDF

Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo; "On the Infeasibility of Modeling Polymorphic Shellcode: Re-thinking the Role of Learning in Intrusion Detection Systems;" Machine Learning Journal. Special issue on adversarial learning; 2009. PDF

Brian Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo; "Baiting Inside Attackers Using Decoy Documents;" Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks; SecureComm; 2009. PDF

2008
Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo; "Return Value Predictability for Self-Healing;" Proceedings of the 3rd International Workshop on Security (IWSEC); Kagawa, Japan; 2008/11. PDF

Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis; "Casting out Demons: Sanitizing Training Data for Anomaly Sensors;" Proceedings of the IEEE Symposium on Security & Privacy; Oakland, CA; 2008/05. PDF

Salvatore J. Stolfo, Germán Creamer; "A link mining algorithm for earnings forecast and trading;" International Conference on Knowledge Discovery and Data Mining (KDD 2006); 2008. PDF

Vanessa Frias-Martinez, Salvatore J. Stolfo, Angelos D. Keromytis; "Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors;" Proceedings of the Annual Computer Security Applications Conference (ACSAC); 2008. PDF

Vanessa Frias-Martinez, Salvatore J. Stolfo, Angelos D. Keromytis; "Behavior-Based Network Access Control: A Proof-of-Concept;" Proceedings of the 11th Information Security Conference (ISC); 2008. PDF

Shlomo Hershkop, Salvatore J. Stolfo, German Creamer, Ryan Rowe; "Segmentation and Automated Social Hierarchy Detection through Email Network Analysis;" Zhang et al. eds. Advances in Web Mining and Web Usage Analysis 9th WEBKDD and 1st SNA-KDD Workshop at KDD 2007; Lecture Notes in Computer Science, Springer-Verlag, 2008; 2008. PDF

2007
Yingbo Song, Tony Jebara, Kapil Thadani; "Density Estimation under Independent Similarly Distributed Sampling Assumptions;" Proceedings of the 21st Conference on Neural Information Processing Systems (NIPS); 2007/12/04. PDF

Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo; "Extended Abstract: Online Training and Sanitization of AD Systems;" NIPS Workshop on Machine Learning in Adversarial Environments for Computer Security; Vancouver, BC, CA; 2007/12. PDF

Yingbo Song, Tony Jebara, Kapil Thadani; "Independent Similarly Distributed Sampling Assumptions for Semi-parametric Density Estimation;" 2nd New York Academy of Sciences Symposium on Machine Learning; 2007/10/12

Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo; "On the Infeasibility of Modeling Polymorphic Shellcode;" Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS); Alexandria, Virginia, USA; 2007/10. PDF

Yingbo Song, Tony Jebara, Kapil Thadani; "Spectral Clustering and Embedding with Hidden Markov Models;" Proceedings of the 18th European Conference on Machine Learning (ECML); 2007/09/01. PDF

Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis; "A Study of Malcode-Bearing Documents;" Proceedings of 4th GI International Conference on Detection of Intrusions & Malware and Vulnerability Assessment; Lucerne, Switzerland; 2007/07. PDF

Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis; "From STEM to SEAD: Speculative Execution for Automated Defense;" Proceedings of the USENIX Annual Technical Conference; Santa Clara, CA; 2007/06. PDF

Gabriela F. Cretu, Angelos Stavrou, Salvatore J. Stolfo, Angelos D. Keromytis; "Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems;" Proceedings of the Third Workshop on Hot Topics in System Dependability; Edinburgh, UK; 2007/06. PDF

2006
Salvatore J. Stolfo, Shlomo Hershkop, Germán Creamer; "A Temporal Based Forensic Analysis of Electronic Communication;" National Conference on Digital Government Research; 2006/05/24. PDF

Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang; "Behavior-based Modeling and its Application to Email Analysis;" ACM Transactions on Internet Technology (TOIT); 2006/02. PDF

Gabriela F. Cretu, Janak J. Parekh, Ke Wang, Salvatore J. Stolfo; "Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks;" Proceddings of IEEE Consumer Communications and Networking Conference; 2006/01. PDF

V. Kapoor, S.K. Gupta, J. Bhattacharya, R. Dass; "Utilizing Network Features for Privacy Violation Detection;" First International Conference on Communication Systems Software and Middleware (COMSWARE); 2006. PDF

Janak J. Parekh, Ke Wang, Salvatore J. Stolfo, Janak J. Parekh, Ke Wang; "Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection;" SIGCOMM Workshop on Large Scale Attack Defence; 2006. PDF

V. Kapoor, P. Poncelet, M. Teisseire, F. Trousset; "Privacy preserving sequential pattern mining in distributed databases;" ACM Fifteenth Conference on Information and Knowledge Management; 2006. PDF

Ke Wang, Janak J. Parekh, Salvatore J. Stolfo; "Anagram: A Content Anomaly Detector Resistant To Mimicry Attack;" Proceedings of the Nineth International Symposium on Recent Advances in Intrusion Detection(RAID); 2006. PDF

2005
Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo; "FLIPS: Hybrid Adaptive Intrusion Prevention;" Recent Advance in Intrusion Detection (RAID); 2005/09. PDF

Michael E. Locasto, Janak J. Parekh, Angelos D. Keromytis, Salvatore J. Stolfo; "Towards Collaborative Security and P2P Intrusion Detection;" Proceedings of the 2005 IEEE Workshop on Information Assurance and Security; 2005/06. PDF

Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, Krysta Svore; "A comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection;" Journal of Computer Security, Vol 13, No. 4; 2005. PDF

Salvatore J. Stolfo, Ke Wang; "Anomalous Payload-based Worm Detection and Signature Generation;" Proceedings of the Eighth International Symposium on Recent Advances in Intrusion Detection(RAID); 2005. PDF

Wei-Jen Li, Ke Wang, Salvatore J. Stolfo; "Fileprints: Identifying File Types by n-gram Analysis;" IEEE Information Assurance Workshop; 2005. PDF

Salvatore J. Stolfo, L. Bui, Shlomo Hershkop; "Unsupervised Anomaly Detection in Computer Security and an Application to File System Access;" Proceedings of the ISMIS; 2005. PDF

2004
Salvatore J. Stolfo; "Worm and attack early warning: piercing stealthy reconnaissance;" IEEE Security and Privacy; 2004. Link

Salvatore J. Stolfo, Ke Wang, Gabriela F. Cretu; "Anomalous Payload-based Network Intrusion Detection;" RAID; 2004/09. PDF

Shlomo Hershkop, Ryan Ferster, L. Bui, Ke Wang, Salvatore J. Stolfo; "Host-based Anomaly Detection Using Wrapping File Systems;" CU Tech Report; 2004/04. PDF

Salvatore J. Stolfo, Steve Ulfelder; "Spam-busters;" Network World; 2004/03/22

Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, Krysta Svore; "A comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection;" CU Tech Report; 2004/02/23. PDF

Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo; "Email Archive Analysis Through Graphical Visualization;" ACM CCS VizSEC/DMSEC'04; 2004. PDF

Michael E. Locasto, Janak J. Parekh, Salvatore J. Stolfo, Angelos D. Keromytis, Tal Malkin, Vishal Misra, Michael E. Locasto, Janak K. Parekh, Angelos D. Keromytis, Tal Malkin, Vishal Misra; "Collaborative Distributive Intrusion Detection;" CU Tech Report CUCS-012-04; 2004. PDF

2003
Katherine Heller, Krysta Svore, Angelos D. Keromytis, Salvatore J. Stolfo; "One Class Support Vector Machines for Detecting Anomalous Window Registry Accesses;" 3rd IEEE Conference Data Mining Workshop on Data Mining for Computer Security; Florida; 2003/11/19. PDF

Ke Wang, Salvatore J. Stolfo; "One Class Training for Masquerade Detection;" 3rd IEEE Conf Data Mining Workshop on Data Mining for Computer Security; Florida; 2003/11/19. PDF

Salvatore J. Stolfo, Eric Roston; "The Code Warriors;" Time Magazine; Vol. 162, Iss. 19; pg. S2; 2003/11/03

Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu; "A Behavior-based Approach to Securing Email Systems;" Mathematical Methods, Models and Architectures for Computer Networks Security; Springer Verlag; 2003/09. PDF

Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu; "Behavior Profiling of Email;" 1st NSF/NIJ Symposium on Intelligence & Security Informatics(ISI 2003); Tuscon, AZ, USA; 2003/06/02. PDF

Seth Robertson, Eric V. Siegel, Matt Miller, Salvatore J. Stolfo; "Surveillance Detection in High Bandwidth Environments;" Proceedings of the 2003 DARPA DISCEX III Conference; 2003/04. PDF

Salvatore J. Stolfo, Chia Wen-Hu, Wei-Jen Li, Shlomo Hershkop, Ke Wang, Olivier Nimeskern; "Combining Behavior Models to Secure Email Systems;" CU Tech Report; 2003/04. PDF

Salvatore J. Stolfo, Eric Johnson, Tomislav Pavlicic, Stephen Jan; "Citizen's Attitudes about Privacy While Accessing Government Websites: Results of an Online Study;" Web; 2003. PDF

Salvatore J. Stolfo, Wei-Jen Li, Shlomo Hershkop, Ke Wang, Chia-Wei Hu, Olivier Nimeskern; "Detecting Viral Propagations Using Email Behavior Profiles;" CU Tech Report; 2003. PDF

2002
Frank Apap, Shlomo Hershkop, Andrew Honig, Eleazar Eskin, Salvatore J. Stolfo; "Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses;" Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002); Zurich, Switzerland; 2002/10/16. PDF

Manasi Bhattacharyya, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo; "MET: An Experimental System for Malicious Email Tracking;" Proceedings of the 2002 New Security Paradigms Workshop (NSPW-2002); Virginia Beach, VA, USA; 2002/09/23. PDF

Suhail Mohiuddin, Shlomo Hershkop, Rahul Bhan, Salvatore J. Stolfo; "Defending against a large Scale Denial of Service Attack;" Proceedings of the 3rd Annual IEEE Information Assurance Workshop; United States Military Academy West Point, New York; 2002/06/17. PDF

Eleazar Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, Salvatore J. Stolfo; "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data;" Data Mining for Security Applications; Kluwer; 2002. PDF

Andrew Honig, Andrew Howard, Eleazar Eskin, Salvatore J. Stolfo; "Adaptive Model Generation: An Architecture for the Deployment of Data Mining-based Intrusion Detection Systems;" Data Mining for Security Applications; Kluwer; 2002. PDF

2001
Leonid Portnoy, Eleazar Eskin, Salvatore J. Stolfo; "Intrusion detection with unlabeled data using clustering;" Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001); Philadelphia, PA, USA; 2001/11/05. PDF

Matthew G. Schultz, Eleazar Eskin, Salvatore J. Stolfo; "Malicious Email Filter - A UNIX Mail Filter that Detects Malicious Windows Executables;" Proceedings of USENIX Annual Technical Conference; Boston, MA (Best Student Paper Award); 2001/06. PDF

Wenke Lee, Salvatore J. Stolfo, Philip K. Chan, Eleazar Eskin, Wei Fan, Matt Miller, Shlomo Hershkop, Junxin Zhang; "Real Time Data Mining-based Intrusion Detection;" Proceedings of DISCEX II; 2001/06. PDF

Eleazar Eskin, Wenke Lee, Salvatore J. Stolfo; "Modeling System Calls for Intrusion Detection with Dynamic Window Sizes;" Proceedings of DISCEX II; 2001/06. PDF

Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo; "Data Mining Methods for Detection of New Malicious Executables;" Proceedings of IEEE Symposium on Security and Privacy; Oakland, CA; 2001/05. PDF

"Model Generation for an Intrusion Detection System Using Genetic Algorithms;" High School Honors Thesis; 2001. PDF

Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin; "Data mining-based intrusion detectors: an overview of the columbia IDS project;" ACM Portal; 2001. PDF

Salvatore J. Stolfo, Wei Fan, Matthew Miller, Wenke Le, Philip K. Chan; "Using Artificial Anomalies to Detect Known and Unknown Network Intrusions;" IEEE 1st International Conference on Data Mining; 2001. PDF

2000
Eleazar Eskin, Matt Miller, Zhi-Da Zhong, George Yi, Wei-Ang Lee, Salvatore J. Stolfo; "Adaptive Model Generation for Intrusion Detection Systems;" Workshop on Intrusion Detection and Prevention, 7th ACM Conference on Computer Security; Athens, GA, USA; 2000/11. PDF

Wenke Lee, Wei Fan, Matt Miller, Erez Zadok, Salvatore J. Stolfo; "Toward Cost-Sensitive Modeling for Intrusion Detection and Response;" Workshop on Intrusion Detection and Prevention, 7th ACM Conference on Computer Security; Athens, GA, USA; 2000/11. PDF

Eleazar Eskin, Salvatore J. Stolfo; "Anomaly Detection over Noisy Data using Learned Probability Distributions;" ICML00; Palo Alto, CA, USA; 2000/07. PDF

Wenke Lee, Matt Miller, Salvatore J. Stolfo, Kahil Jallad, Christoper Park, Erez Zadok, Vijay Prabhakar; "Toward Cost-Sensitive Modeling for Intrusion Detection;" Columbia University Computer Science Technical Report CUCS-002-00; 2000. PDF

Matt Miller, Salvatore J. Stolfo; "Learning Cost-Sensitive Classification Rules for Network Intrusion Detection using RIPPER;" Columbia University Computer Science Technical Report CUCS-035-1999; 2000. PDF

Wenke Lee, Wei Fan, Matt Miller, Salvatore J. Stolfo, Erez Zadok; "A Multiple Model Cost-Sensitive Approach for Intrusion Detection;" Eleventh European Conference on Machine Learning (ECML '00); 2000. PDF

Salvatore J. Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, Philip K. Chan; "Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project;" Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX '00); 2000. PDF

1999
Wei Fan, Salvatore J. Stolfo, Junxin Zhang, and Philip K. Chan; "Adacost: misclassification cost-sensitive boosting;" In Proceedings of the 16th International Conference on Machine Learning (ICML '99); 1999. PDF

Wenke Lee, Salvatore J. Stolfo, Kui Mok; "Mining in a Data-flow Environment: Experience in Network Intrusion Detection;" In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '99); 1999/08. PDF

Wenke Lee, Salvatore J. Stolfo, Kui Mok; "A Data Mining Framework for Building Intrusion Detection Models;" In Proceedings of the 1999 IEEE Symposium on Security and Privacy; 1999/05. PDF

Wenke Lee, Christoper Park, Salvatore J. Stolfo; "Towards Automatic Intrusion Detection using NFR;" In Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring; 1999/04. PDF

1998
Wenke Lee, Salvatore J. Stolfo, Kui Mok; "Mining Audit Data to Build Intrusion Detection Models;" In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD '98); 1998/08. PDF

Wenke Lee, Salvatore J. Stolfo; "Data Mining Approaches for Intrusion Detection;" In Proceedings of the Seventh USENIX Security Symposium (SECURITY '98); 1998/01. PDF

1997
Wenke Lee, Salvatore J. Stolfo, Philip K. Chan; "Learning Patterns from Unix Process Execution Traces for Intrusion Detection';" AAAI Workshop: AI Approaches to Fraud Detection and Risk Management; 1997/07. PDF