Publications

Filter by type:

eyeDNS: Monitoring a University Campus Network

Chandan Chowdhury, Dalton Hahn, Matthew French, Pratyusa K. Manadhata, Eugene Y. Vasserman, Alexandru G. Bardas , ICC Communication and Information Systems Security Symposium, May 2018

Details

Decision Theory for Network Security: Active Sensing for Detection and Prevention of Data Exfiltration

Sara Mc Carthy, Arunesh Sinha, Milind Tambe, Pratyusa K. Manadhata , Applied Risk Analysis for Guiding Homeland Security Policy and Decisions, John Wiley and Sons, November 2017

Details

Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks

Sara Mc Carthy, Arunesh Sinha, Milind Tambe, Pratyusa K. Manadhata , 7th Conference on Decision and Game Theory for Security (GameSec), November 2016

Details PDF Slides

Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers

Amro Awad, Pratyusa K. Manadhata, Stuart Haber, Yan Solihin, William Horne , 21st ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), April 2016

Details PDF Slides

A Novel Algorithm for Pattern Matching with Back References

Liu Yang, Vinod Ganapathy, Pratyusa K. Manadhata, Ye Wu , 35th IEEE International Performance Computing and Communications Conference, December 2015

Details PDF

Detecting Malicious Domains via Graph Inference

Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William Horne , ACM Computer and Communications Security (CCS) Workshop on Artificial Intelligence and Security (AISec), November 2014

Details PDF

Traffic Signature-based Mobile Device Location Authentication

John Brassil, Pratyusa K. Manadhata, Ravi Netravalli , IEEE Transactions on Mobile Computing, September 2014

Details PDF

The Operational Role of Security Information and Event Management Systems

Sandeep Bhatt, Pratyusa K. Manadhata, Loai Zomlot , IEEE Security and Privacy, September 2014

Details PDF

Detecting Malicious Domains via Graph Inference

Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William Horne , 19th European Symposium on Research in Computer Security (ESORICS), September 2014

Details PDF Slides

Big Data Analytics for Security Intelligence

Alvaro Cardenas, Pratyusa K. Manadhata, Sreeranga Rajan , IEEE Security and Privacy, November 2013

Details PDF

Efficient Submatch Extraction for Practical Regular Expression

Bill Horne, Stuart Haber, Pratyusa K. Manadhata, Miranda Mowbray, Prasad Rao , 7th International Conference on Language and Automata Theory and Applications, April 2013

Details PDF

Game Theoretic Approaches to Attack Surface Shifting

Pratyusa K. Manadhata , Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Advances in Information Security Volume 100, Springer, January 2013

Details PDF

Fast Submatch Extraction using OBDDs

Liu Yang, Pratyusa K. Manadhata, William Horne, Prasad Rao, Vinod Ganapathy , 8th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), October 2012

Details PDF

Big Data for Security: Challenges, Opportunities, and Examples

Pratyusa K. Manadhata , ACM CCS Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, October 2012

Details PDF

Authenticating a Mobile Device's Location Using Voice Signatures

John Brassil, Ravi Netravali, Stuart Haber, Pratyusa K. Manadhata, Prasad Rao , 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), October 2012

Details PDF

Securing a Femtocell-based Location Service

John Brassil, Pratyusa K. Manadhata , International Conference on Selected Topics in Mobile and Wireless Networking (iCOST), July 2012

Details PDF

Verifying the Location of a Mobile Device User (Best Paper Award)

John Brassil, Pratyusa K. Manadhata , 4th International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec), June 2012

Details PDF

A Formal Model for A System's Attack Surface

Pratyusa K. Manadhata, Jeannette M. Wing , Moving Target Defense: An Asymmetric Approach to Cyber Security, Advances in Information Security Volume 54, Springer, October 2011

Details PDF Slides

Text Classification for Data Loss Prevention

Michael Hart, Pratyusa K. Manadhata, Rob Johnson , Privacy Enhancing Technologies Symposium (PETS), July 2011

Details PDF Slides

An Attack Surface Metric

Pratyusa K. Manadhata, Jeannette M. Wing , IEEE Transactions on Software Engineering, May 2011

Details PDF Slides

Measuring the Attack Surfaces of Enterprise Software

Pratyusa K. Manadhata, Yuecel Karabulut, Jeannette M. Wing , International Symposium on Engineering Secure Software and Systems (ESSoS), Leuven, February 2009

Details PDF

An Attack Surface Metric

Pratyusa K. Manadhata , Ph.D. Thesis, Carnegie Mellon University, December 2008

Details PDF

Measuring the Attack Surfaces of SAP Software Systems

Pratyusa K. Manadhata, Yuecel Karabulut, Jeannette M. Wing , IEEE International Symposium on Software Reliability Engineering (ISSRE), November 2008

Details PDF

Measuring the Attack Surfaces of Two FTP Daemons

Pratyusa K. Manadhata, Jeannette M. Wing, Mark A. Flynn, Miles A. McQueen , ACM CCS Workshop on Quality of Protection, October 2006

Details PDF

An Attack Surface Metric

Pratyusa K. Manadhata, Jeannette M. Wing , USENIX Security Workshop on Security Metrics, August 2006

Details PDF