MEERKATS: Maintaining EnterprisE Resiliency
via Kaleidoscopic Adaptation and
Transformation of Software Services

logo
 
Description →
Participants →
Publications →
News →

Publications

Model Aggregation for Distributed Content Anomaly Detection
Sean Whalen, Nathaniel Boggs, Salvatore J. Stolfo
In the Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security (AISec), November 2014.

Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems
Riley Spahn, Jonathan Bell, Michael Lee, Sravan Bhamidipati, Roxana Geambasu, Gail Kaiser
In the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October 2014.

Unsupervised Anomaly-based Malware Detection using Hardware Features
Adrian Tang, Simha Sethumadhavan, Salvatore Stolfo
In the Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2014.

Synthetic Data Generation and Defense in Depth Measurement of Web Applications
Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo
In the Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2014.

XRay: Increasing the Web's Transparency with Differential Correlation
Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, and Roxana Geambasu
In the Proceedings of the 23rd USENIX Security Symposium, August 2014.

SAuth: Protecting User Accounts from Password Database Leaks
George Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis
In the Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), November 2013.

Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads
Heming Cui, Jiri Simsa, Yi-Hong Lin, Hao Li, Ben Blum, Junfeng Yang, Garth A. Gibson, and Randal E. Bryant
In the Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP), November 2013.

vTube: Efficient Streaming of Virtual Appliances Over Last-Mile Networks
Yoshihisa Abe, Roxana Geambasu, Kaustubh Joshi, H. Andres Lagar-Cavilla, and Mahadev Satyanarayanan.
In the Proceedings of the ACM Symposium on Cloud Computing (SOCC), October 2013.

CloudFence: Data Flow Tracking as a Cloud Service
Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, and Angelos D. Keromytis
In the Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), October 2013.

CellFlood: Attacking Tor Onion Routers on the Cheap
Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, and Angelos D. Keromytis
In the Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS), September 2013.

Determinism Is Not Enough: Making Parallel Programs Reliable with Stable Multithreading
Junfeng Yang, Heming Cui, Jingyue Wu, Yang Tang, Gang Hu
In the Communications of the ACM, 2013.

Effective Dynamic Detection of Alias Analysis Errors
Jingyue Wu, Gang Hu, Yang Tang, Junfeng Yang
In the Proceedings of the 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC-FSE), August 2013.

Cloud resiliency and security via diversified replica execution and monitoring
Azzedine Benameur, Nathan S. Evans, and Matthew C. Elder
In the Proceedings of the 6th International Symposium on Resilient Control Systems (ISRCS), August 2013.

MOTAG: Moving Target Defense Against Internet Denial of Service Attacks
Quan Jia, Kun Sun, and Angelos Stavou
In the Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN), July 2013.

Cloudopsy: an Autopsy of Data Flows in the Cloud
Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, and Angelos D. Keromytis
In the Proceedings of the Human Computer Interaction International 2013 (HCI), July 2013.

On the Feasibility of Online Malware Detection with Performance Counters
John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Simha Sethumadhavan, and Sal Stolfo
In the Proceedings of the 40th International Symposium on Computer Architecture (ISCA), June 2013.

Sound and Precise Analysis of Parallel Programs through Schedule Specialization
Jingyue Wu, Yang Tang, Gang Hu, Heming Cui, Junfeng Yang
In the Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), June 2012.

Concurrency Attacks
Junfeng Yang, Ang Cui, Sal Stolfo, and Simha Sethumadhavan
In the Proceedings of the 4th USENIX Workshop on Hot Topics in Parallelism (HOTPAR), June 2012.

CleanOS: Limiting Mobile Data Exposure with Idle Eviction
Yang Tang, Phillip Ames, Sravan Bhamidipati, Ashish Bijlani, Roxana Geambasu, and Nikhil Sarda
In the Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October 2012.

Self-healing Multitier Architectures Using Cascading Rescue Points
Angeliki Zavou, Georgios Portokalidis, and Angelos D. Keromytis
In the Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC), December 2012.

Exploiting Split Browsers for Efficiently Protecting User Data
Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, and Angelos D. Keromytis
In the Proceedings of CCSW 2012: The ACM Cloud Computing Security Workshop, October 2012.

Adaptive Defenses for Commodity Software through Virtual Application Partitioning
Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, and Angelos D. Keromytis
In the Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS), October 2012.

Lost in Translation: Improving Decoy Documents via Automated Translation
Jonathan Voris, Nathaniel Boggs, and Salvatore J. Stolfo
In the Proceedings of the Workshop on Research for Insider Threat (WRIT), May 2012.

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
Salvatore J. Stolfo, Malek Ben Salem, and Angelos D. Keromytis
In the Proceedings of the Workshop on Research for Insider Threat (WRIT), May 2012.

Position Paper: The MEERKATS Cloud Security Architecture
Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew Elder, Darrell Kienzle, and Angelos Stavrou
In the Proceedings of the 3rd International Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC), June 2012.

Towards a Universal Data Provenance Framework using Dynamic Instrumentation
Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, and Sotiris Ioannidis
In the Proceedings of the 27th IFIP International Information Security and Privacy Conference (SEC), June 2012. (Acceptance rate: 25%)

Latest News

09/19/14
New York Times Technology Blog coverage of XRay project: "XRay: A New Tool for Tracking the Use of Personal Data on the Web," Steve Lohr, August 2014.
09/03/14
Our paper "Model Aggregation for Distributed Content Anomaly Detection" is to appear in the 7th ACM Workshop on Artificial Intelligence and Security (AISec).
07/24/14
Our paper "Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems" is to appear in the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI).
05/27/14
Our paper "Unsupervised Anomaly-based Malware Detection using Hardware Features" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
05/27/14
Our paper "Synthetic Data Generation and Defense in Depth Measurement of Web Applications" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
This work is supported by the United States Defense Advanced Research Projects Agency (DARPA) through Contract FA8650-11-C-7190. Opinions, findings, conclusions and recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the US Government, or DARPA.