News
Dec 22, 2022
Our paper titled “Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive Hashing” received the best paper award from IEEE International Symposium on Network Computing and Applications (NCA 2022).
Nov 29, 2022
Our paper titled “Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive Hashing” was accepted at the IEEE International Symposium on Network Computing and Applications (NCA 2022).
Oct 3, 2022
I have started a new position as a Staff Engineer with Canonical.
Oct 1, 2022
Our paper titled “Detecting VoIP Data Streams: Approaches Using Hidden Representation Learning” was accepted at the Annual Conference on Innovative Applications of Artificial Intelligence (IAAI 23).
Jul 26, 2022
Our paper titled “Flurry: A Fast Framework for Provenance Graph Generation for Representation Learning” was accepted at the ACM International Conference on Information & Knowledge Management.
Aug 24, 2021
Our paper titled “Prov-GEm: Automated System Provenance Analysis through Graph Embeddings” was accepted at the IEEE International Conference on Machine Learning and Applications.
Jul 29, 2019
Our paper titled “Detecting Safety and Security Faults in PLC Systems with Data Provenance” was accepted at the IEEE International Symposium on Technologies for Homeland Security 2019 in Waltham, MA.
Nov 16, 2018
Our paper titled “IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems” was accepted at the IFIP/IEEE International Symposium on Integrated Network Management 2019 in Washington DC.
May 15, 2018
Our paper titled “Curator: Provenance Management for Modern Distributed Systems” was accepted at the 10TH USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2018 in London, UK.
Oct 26, 2017
Our paper titled “Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs” was accepted at the 25th Network and Distributed System Security Symposium (NDSS), 2018 in San Diego, CA.
Jul 18, 2017
Our paper titled “Practical Whole-System Provenance Capture” was accepted at the 8th ACM Symposium on Cloud Computing, 2017 in Santa Clara, CA.
Apr 10, 2017
I have accepted a position as an Assistant Professor at the University of North Carolina at Charlotte. I will be joining the Department of Software and Information Systems in Fall 2017.
Apr 6, 2017
I presented our paper “Transparent Web Service Auditing via Network Provenance Functions” at the 26th International World Wide Web Conference, 2017 in Perth, AU.
Jan 27, 2017
I gave a talk at Cornell in Ithica, NY about our work on secure data provenance.
Jan 24, 2017
I gave a talk at WPI in Worcester, MA about our work on secure data provenance.
Dec 19, 2016
Our paper titled “Transparent Web Service Auditing via Network Provenance Functions” was accepted at the 26th International World Wide Web Conference, 2017 in Perth, AU.
Nov 4, 2016
I presented our paper “Leveraging Data Provenance to Enhance Cyber Resilience” at the 1st IEEE SecDev conference in Boston, MA.
Oct 28, 2016
I gave a talk at the University of Connecticut in Storrs, CT about our work on secure data provenance.
Sep 15, 2016
I presented our paper “High-throughput Ingest of Data Provenance Records into Accumulo” at the 2016 IEEE High Performance Extreme Computing Conference (HPEC ‘16) in Waltham, MA.
Sep 12, 2011
I have accepted a position at MIT Lincoln Laboratory.
Aug 31, 2011
I have successfully defended my dissertation, titled “Building Scalable Document Integrity Systems”
Feb 15, 2011
Our paper, “Scalable Web Content Attestation” has been accepted to appear in IEEE Transactions on Computers.
Oct 7, 2010
Our paper, “Network-based Root of Trust for Installation” has been accepted to appear in IEEE Security & Privacy.
Aug 6, 2010
Our paper, “Seeding Clouds with Trust Anchors”, has been accepted at the 2nd ACM Cloud Computing Security Workshop in Chicago, IL.
Jul 25, 2010
I have been awarded a Student Travel Grant to the 19th USENIX Security Symposium in Washington, DC.
Apr 6, 2010
Our paper, “OS Security Architectures Built on Smart Disks” has been accepted for publication in IEEE Security & Privacy magazine.
Mar 2, 2010
Our paper “An architecture for enforcing end-to-end access control over web applications” was accepted to the 15th ACM Symposium on Access Control Models and Technologies.
Dec 7, 2009
I presented our paper “Scalable Web Content Attestation” at the 2009 Annual Computer Security Applications Conference.
Aug 26, 2009
Our papers Scalable Web Content Attestation and Justifying Integrity Using a Virtual Machine Verifier were accepted to the 2009 Annual Computer Security Applications Conference.
Jul 15, 2009
I have been awarded a student grant to attend USENIX Security ‘09.
Apr 8, 2009
I have successfully defended my Masters Thesis and will continue at Penn State for my Ph.D.
Nov 26, 2008
Our paper “Configuration Management at Massive Scale: System Design and Experience” was accepted to the IEEE Journal on Selected Areas in Communications.
Jul 3, 2008
I have been awarded a student grant to attend USENIX Security ‘08.
Jan 31, 2008
I am wrapping up my work on configuration management with AT&T.
Oct 15, 2007
I have passed my candidacy exams and am now a Ph.D. candidate.
Aug 24, 2007
I have returned from Florham Park, NJ but continue to work on configuration management.
May 21, 2007
I am going to Florham Park, NJ to work on configuration management at AT&T Research.