top of page

Interests

Firewall

Trends in Firewall Configuration Errors

01

Combating the perils of port 80 at the firewall.

07

The use and usability of direction-based
filtering in firewalls

05

A Quantitative Study of Firewall Configuration Errors

06

Publications

JOURANLS

Crumbling walls: A class of practical and efficient quorum systems.

2

Optimal layouts on a chain ATM network.

6

Quorum systems in replicated databases: Science or fiction? (invited paper)

10

Key management for encrypted broadcast.

14

Why security standards sometimes fail.

18

A quantitative study of firewall configuration errors.

22

Lightweight key management for IEEE 802.11 wireless LANs with key refresh and host revocation.

26

A geographic directed preferential Internet topology model.

30

Trends in firewall configuration errors: Measuring the holes in Swiss cheese.

34

A secure supply-chain RFID system that respects your privacy.

38

Direction finding of rogue Wi-Fi access points using an off-the-shelf MIMO-OFDM receiver.

42

A security analysis and revised security extension for the precision time protocol.

46

A Taxonomy of Industrial Control Protocols and Networks in the Power Grid

51

The availability of crumbling wall quorum systems.

3

Optimal availability quorum systems: Theory and practice.

7

On location-restricted services

11

Probabilistic quorum systems.

15

Combinatorial design of multi-ring networks with combined routing and flow control.

19

The use and usability of direction-based filtering in firewalls.

23

Install-time vaccination of Windows executables to defend against stack smashing attacks.

27

Bounding the bias of tree-like sampling in IP topologies.

31

The geometric efficient matching algorithm for firewalls.

35

Accurate modeling of the Siemens S7 SCADA protocol for intrusion detection and digital forensics.

39

Side-channel cryptographic attacks using pseudo-boolean optimization.

43

Vehicle safe-mode, concept to practice: Limp-mode in the service of cyber security.

47

​PESrank: An Explainable online password strength estimator | Accepted for publication in Journal of Computer Security

50

Randomized approximation of bounded multicovering problems.

4

The load, capacity and availability of quorum systems.

8

The load and availability of Byzantine quorum systems.

12

How to be an efficient snoop, or the probe complexity of quorum systems.

16

Computing the unmeasured: An algebraic approach to Internet mapping.

20

A note on the fragility of the "Michael" message integrity code.

24

Offline firewall analysis.

28

Finding a dense-core in Jellyfish graphs.

32

WDA: A web farm distributed denial of service attack attenuator.

36

Implementing public-key cryptography on passive RFID tags is practical.

40

Automatic construction of statechart-based anomaly detection models for multi-threaded industrial control systems.

44

Using the MSET device to counteract power-analysis attacks.

48

The availability of quorum systems.

1

Computational experience with approximation algorithms for the setcovering problem.

5

Access control and signatures via quorum secret sharing.

9

Key management for restricted multicast using broadcast encryption.

13

Combating the perils of port 80 at the firewall.

17

On the economics of multicasting.

21

Firmato: A novel firewall management toolkit.

25

A practical revocation scheme for broadcast encryption using smart cards.

29

CRUST: Cryptographic remote untrusted storage without public keys.

33

Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems.

37

Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA networks.

41

Field classification, modeling and anomaly detection in unknown CAN bus networks.

45

Rank estimation with bounded error via exponential sampling.

49

Refereed Conference Papers

Approximating bounded 0-1 integer linear programs.

01

Access control and signatures via quorum secret sharing.

05

The load and availability of Byzantine quorum systems.

09

Key management for encrypted broadcast.

13

On the economics of multicasting.

17

Architecting the Lumeta firewall analyzer.

21

A clustering approach for exploring the Internet structure.

25

A uniform framework for cryptanalysis of the Bluetooth E_0 cipher.

29

Cryptanalysis of the Bluetooth E0 cipher using OBDD's.

33

Bounding the bias of tree-like sampling in IP topologies.

37

No more 0-days (or code-based intrusion detection by Korset).

41

Trends in firewall configuration errors: Measuring the holes in Swiss cheese.

45

Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems.

49

Accurate modeling of the Siemens S7 SCADA protocol for intrusion detection and digital forensics.

53

Simple photonic emission attack with reduced data complexity.

57

Modeling Modbus TCP using specification-based intrusion detection.

61

Testing the boundaries of the Parrot anti-spoofing defense system.

65

Cache-attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis.

69

Woodpecker, a software-only true random generator for the CAN bus.

73

Rogue7: Rogue engineering-station attacks on S7 Simatic PLCs.

77

Spoofing attacks against vehicular FMCW radar.

81

The load, capacity and availability of quorum systems.

02

How to be an efficient snoop, or the probe complexity of quorum systems.

06

Quorum-based secure multi-party computation.

10

Towards making broadcast encryption practical.

14

Fang: A firewall analysis engine.

18

A practical revocation scheme for broadcast encryption using smart cards.

22

The geometric efficient matching algorithm for firewalls.

26

A geographic directed preferential Internet topology model.

30

Dictionary attacks using keyboard acoustic emanations.

34

CRUST: Cryptographic remote untrusted storage without public keys.

38

RFID-based electronic voting: What could possibly go wrong?

42

RFID jamming and attacks on Israeli e-voting.

46

Practical template-algebraic side channel attacks with extremely low data complexity.

50

Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA networks.

54

A security analysis and revised security extension for the precision time protocol.

58

Parrot, a software-only anti-spoofing defense system for the CAN bus.

62

Stealthy deception attacks against SCADA systems.

66

Sliding-window correlation attacks against encryption devices with an unstable clock.

70

Poly-logarithmic side channel rank estimation via exponential sampling.

74

Hardware fingerprinting for the ARINC 429 avionic bus.

78

Trust dies in darkness: Shedding light on Samsung's TrustZone keymaster design.

82

Crumbling walls: A class of practical and efficient quorum systems.

03

Evaluating quorum systems over the Internet.

07

Replication, consistency, and practicality: Are these mutually exclusive?

11

Firmato: A novel firewall management toolkit.

15

Long-lived broadcast encryption.

19

An incremental super-linear preferential Internet topology model.

23

Cracking the Bluetooth PIN.

27

Toward securing untrusted storage without public-key operations.

31

One-time signatures revisited: Practical fast signatures using fractal merkle tree traversal.

35

Finding a dense-core in Jellyfish graphs.

39

Algebraic power analysis in the presence of errors.

43

Algebraic side-channel analysis beyond the Hamming weight leakage model.

47

Range extension attacks on contactless smart cards.

51

A statechart-based anomaly detection model for multi-threaded SCADA systems.

55

Secure containers in Android: the Samsung KNOX case study.

59

A bounded-space near-optimal key enumeration algorithm for multi-subkey side-channel attacks.

63

Vehicle safe-mode: Limp-mode in the service of cyber security.

67

Navigating the Samsung TrustZone with applications to cache-attacks on AES-256 in the Keymaster trustlet.

71

PRank: Fast analytical rank estimation via Pareto distributions.

75

An explainable online password strength estimator.

79

Classification of Encrypted IoT Traffic Despite Padding and Shaping

83

Optimal layouts on a chain ATM network.

04

Optimal average-case layouts on chain networks.

08

How to prove where you are: Tracking the location of customer equipment.

12

The performance of routing and control protocols on virtual rings.

16

Computing the unmeasured: An algebraic approach to Internet mapping.

20

Install-time vaccination of Windows executables to defend against stack smashing attacks.

24

Picking virtual pockets using relay attacks on contactless smartcard systems.

28

How to build a low-cost, extended-range RFID skimmer.

32

Remote algorithmic complexity attacks against randomized hash tables.

36

Korset: Automated, zero false-alarm intrusion detection for Linux.

40

Toward practical public key anti-counterfeiting for low-cost EPC tags.

44

Analyzing unique-bid auction sites for fun and profit.

48

A new framework for constraint-based probabilistic template side channel attacks.

52

Field classification, modeling and anomaly detection in unknown CAN bus networks.

56

Automatic construction of statechart-based anomaly detection models for multi-threaded SCADA via spectral analysis.

60

Photonic side channel attacks against RSA.

64

A new burst-DFA model for SCADA anomaly detection.

68

Temporal phase shifts in SCADA networks.

72

Vehicle safe-mode: An after-market proof-of-concept.

76

Characterizing GPU overclocking faults.

80

Book Chapter

Packet filtering and stateful firewalls.

01

Profiling communications in industrial IP networks: Model complexity and anomaly detection.

02

Theses

Quorum Systems for Distributed Control Protocols

01

Approximating bounded 0-1 integer linear programs

02

Invited Presentations

How not to configure your firewall: A field guide to common firewall misconfigurations.
misconfigurations.

01

How not to configure your firewall: A field guide to common firewall misconfigurations

02

A quantitative study of firewall configuration errors.

03

Patents

Method and apparatus for converting a routing table into a collection of disjoint zones.

11

Method for providing long-lived broadcast encryption.

07

Anti-spoofing defense system for a CAN bus.

14

A method and apparatus for network mapping using end-to-end delay measurements.

10

Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers.

06

Method and apparatus for automatic risk assessment of a firewall configuration.

13

Method and apparatus for analyzing one or more firewalls.

09

Cryptographic method for restricting access to transmitted programming content using f-redundant establishment key combinations.

05

Reordering a firewall rulebase according to usage statistics.

12

A method and apparatus for managing a firewall.

08

A combinatorial design method and apparatus for multi-ring networks with combined routing and flow control.

04

Other

Cryptanalysis of KeeLoq code-hopping using a single FPGA.

01

Perfect privacy for webmail with secret sharing.

01

Security applications for hardware performance counters: Software attestation and random generation.

01

Hackers do not stop at red lights.

01

bottom of page