top of page
A Taxonomy of Industrial Control Protocols and Networks in the Power Grid
Refereed Conference Papers
Approximating bounded 0-1 integer linear programs.
Access control and signatures via quorum secret sharing.
The load and availability of Byzantine quorum systems.
Key management for encrypted broadcast.
On the economics of multicasting.
Architecting the Lumeta firewall analyzer.
Bounding the bias of tree-like sampling in IP topologies.
Trends in firewall configuration errors: Measuring the holes in Swiss cheese.
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems.
Accurate modeling of the Siemens S7 SCADA protocol for intrusion detection and digital forensics.
The load, capacity and availability of quorum systems.
How to be an efficient snoop, or the probe complexity of quorum systems.
Towards making broadcast encryption practical.
Fang: A firewall analysis engine.
A practical revocation scheme for broadcast encryption using smart cards.
CRUST: Cryptographic remote untrusted storage without public keys.
Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA networks.
Poly-logarithmic side channel rank estimation via exponential sampling.
Crumbling walls: A class of practical and efficient quorum systems.
Firmato: A novel firewall management toolkit.
Finding a dense-core in Jellyfish graphs.
Classification of Encrypted IoT Traffic Despite Padding and Shaping
Optimal layouts on a chain ATM network.
Optimal average-case layouts on chain networks.
How to prove where you are: Tracking the location of customer equipment.
The performance of routing and control protocols on virtual rings.
Computing the unmeasured: An algebraic approach to Internet mapping.
Install-time vaccination of Windows executables to defend against stack smashing attacks.
Field classification, modeling and anomaly detection in unknown CAN bus networks.
Vehicle safe-mode: An after-market proof-of-concept.
Method and apparatus for converting a routing table into a collection of disjoint zones.
Method for providing long-lived broadcast encryption.
Anti-spoofing defense system for a CAN bus.
A method and apparatus for network mapping using end-to-end delay measurements.
Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers.
Method and apparatus for automatic risk assessment of a firewall configuration.
Method and apparatus for analyzing one or more firewalls.
Cryptographic method for restricting access to transmitted programming content using f-redundant establishment key combinations.
Reordering a firewall rulebase according to usage statistics.
A method and apparatus for managing a firewall.
A combinatorial design method and apparatus for multi-ring networks with combined routing and flow control.
bottom of page