Our paper titled “IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems” was accepted at the IFIP/IEEE International Symposium on Integrated Network Management 2019 in Washington DC.
Our paper titled “Curator: Provenance Management for Modern Distributed Systems” was accepted at the 10TH USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2018 in London, UK.
Our paper titled “Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs” was accepted at the 25th Network and Distributed System Security Symposium (NDSS), 2018 in San Diego, CA.
I presented our paper “Transparent Web Service Auditing via Network Provenance Functions” at the 26th International World Wide Web Conference, 2017 in Perth, AU.
I gave a talk at Cornell in Ithica, NY about our work on secure data provenance.
I gave a talk at WPI in Worcester, MA about our work on secure data provenance.
Our paper titled “Transparent Web Service Auditing via Network Provenance Functions” was accepted at the 26th International World Wide Web Conference, 2017 in Perth, AU.
I presented our paper “Leveraging Data Provenance to Enhance Cyber Resilience” at the 1st IEEE SecDev conference in Boston, MA.
I gave a talk at the University of Connecticut in Storrs, CT about our work on secure data provenance.
I presented our paper “High-throughput Ingest of Data Provenance Records into Accumulo” at the 2016 IEEE High Performance Extreme Computing Conference (HPEC ‘16) in Waltham, MA.
I have accepted a position at MIT Lincoln Laboratory.
I have successfully defended my dissertation, titled “Building Scalable Document Integrity Systems”
Our paper, “Network-based Root of Trust for Installation” has been accepted to appear in IEEE Security & Privacy.
Our paper, “Seeding Clouds with Trust Anchors”, has been accepted at the 2nd ACM Cloud Computing Security Workshop in Chicago, IL.
I have been awarded a Student Travel Grant to the 19th USENIX Security Symposium in Washington, DC.
Our paper, “OS Security Architectures Built on Smart Disks” has been accepted for publication in IEEE Security & Privacy magazine.
I presented our paper “Scalable Web Content Attestation” at the 2009 Annual Computer Security Applications Conference.
Our papers Scalable Web Content Attestation and Justifying Integrity Using a Virtual Machine Verifier were accepted to the 2009 Annual Computer Security Applications Conference.
I have been awarded a student grant to attend USENIX Security ‘09.
I have successfully defended my Masters Thesis and will continue at Penn State for my Ph.D.
Our paper “Configuration Management at Massive Scale: System Design and Experience” was accepted to the IEEE Journal on Selected Areas in Communications.
I have been awarded a student grant to attend USENIX Security ‘08.
I am wrapping up my work on configuration management with AT&T.
I have passed my candidacy exams and am now a Ph.D. candidate.
I have returned from Florham Park, NJ but continue to work on configuration management.
I am going to Florham Park, NJ to work on configuration management at AT&T Research.