Selected Talks:
- A Unifying Framework for Identifying Stealthy Attacks
on Mobile CPS Applications
- University of Southern California, Teamcore, Los Angeles, CA, June 2016.
- University of Texas at Austin, El Paso, TX, June 2016.
- Old Dominion University, Norfolk, VA, December 2015.
- University of Central Florida, Orlando, FL, March 2015.
- Texas A&M University, College Station, TX, November 2014.
- UT Austin, Mobile and Pervasive Computing Group, Austin, TX, October 2014.
- Stealthy Attacks on Mobile Cyber-Physical Systems: Identifying Exploits on Coordination Methods between UAVs
- Air Force Research Laboratory, Rome, NY, July 2014.
- Collaborative Computing in Mobile Clouds
- Air Force Research Laboratory, Rome, NY, July 2013.
- Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion
- IEEE 77th Vehicular Technology Conference (VTC), Dresden, Germany, June 2013.
- Securing Mobile Cyber-Physical Systems against Stealthy Attacks
- Industry Advisory Board (IAB) CS Meeting, San Marcos, TX, May 2012.
- NSF United-States/Middle-East Workshop On Trustworthiness in Emerging Distributed Systems and Networks, Istanbul, Turkey, June 2012.
- Air Force Research Laboratory, Rome, NY, July 2012. [slides]
- Secure and Trustworthy Cyberspace PI meeting (Poster), National Harbor, MD, November 2012.
- “BGP: Between Unplugging a Country and Hijacking Network Prefixes”
- CS Students Organization (EXE), April 2011.
- “Stealthy Attacks on Adaptation Mechanisms Employed in Network Architectures”
- Graduate Seminar, Texas A&M, October 2010.
- Graduate Seminar, University of Texas San Antonio, October 2010.
- “SKWeak Attacks on Path Splicing”
- IEEE Global Communication Conference (Globecom'10), Miami, Florida, December 2010.
- “Stealthy IP Prefix Hijacking Attacks”
- IEEE Global Communication Conference (Globecom'09), Honolulu, Hawaii, December 2009.
- “Burn before Reading: A Stealthy Framework for Combating Live Forensics Investigations”
- APWG eCrime Researchers Summit, Tacoma, Washington, October 2009.
- “HELP://Hypertext in-Emergency Leveraging Protocol”
- IEEE International Conference on Communications (ICC’09), Dresden, Germany, June 2009.
- “Masquerading a Wired Covert Channel into a Wireless-like Channel”
- In 1st IEEE Workshop on Network Security and Privacy, Austin, Texas, December 2008.
- Networking and Security Discussion Group (NASDG) Meeting, Texas State University, San Marcos, Texas, December 2008.
- “Liberating TCP: The Free and the Stunts”
- Computer Science Seminar, Texas State University, San Marcos, Texas, October 2007.
- “Reduction of Quality Attacks on Dynamic Load Balancers”
- 26th IEEE INFOCOM (INFOCOM'07), Anchorage, Alaska, May 2007.
- “Reduction of Quality Attacks on Adaptation Mechanisms”
- Ph.D. Thesis Defense, Boston University, Boston, Massachusetts, August 2006.
- “On the Impact of Low-Rate Attacks”
- IEEE International Conference on Communications (ICC'06), Istanbul, Turkey, June 2006.
- “Reduction of Quality (RoQ) Attacks on Internet End-Systems”
- 24th IEEE INFOCOM (INFOCOM'05), Miami, Florida, March 2005.
- “Bandwidth Stealing via Link Targeted RoQ Attacks”
- 2nd IASTED International Conference on Communication and Computer Networks (CCN'04), Cambridge, Massachusetts, November 2004.
- “Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources”
- 12th IEEE International Conference on Network Protocols (ICNP'04), Berlin, Germany, October 2004.
- Microsoft Research, Redmond, Washington, September 2004.
- “Providing Soft Bandwidth Guarantees Using Elastic TCP-based Tunnels”
- 9th IEEE Symposium on Computer and Communications (ISCC'2004), Alexandria, Egypt, July 2004.
- “Dynamics of Network Resource Management”
- Network Seminar, Boston University, Boston, Massachusetts, June 2004.
|