SEAL has landed a grant from Air Force Research Lab of Rome, NY, to work on developing metrics for the quality of threat indicators to facilitate the use of threat information sharing for actionable intelligence.
Five posters by SEAL researchers have been accepted for presentation at IEEE Conference on Communications and Network Security (IEEE CNS 2016) to be held from October 17 to 19 in Philadelphia, PA, USA. The posters summarize some of our recent work on measurements, security analyics, threat attribution, and machine learning applications to security. The posters are entitled
- A User Study of the Effectiveness of Typosquatting Techniques (with Jeff and Ah Reum)
- Assessing DNS Privacy under Partial Deployment of Special-Use Domain Names (with Ah Reum Kang)
- Transparency of the new gTLD’s Centralized Zone Data Service: A Measurement Study (with Ah Reum, Seong Hoon, Steve and Kui)
- Assessing DNS Privacy under Partial Deployment of Special-Use Domain Names (with Ah Reum and Kui)
- WHAP: Web-Hacking Profiling Using Case-Based Reasoning (with Mee Lan, Ah Reum, and Huy Kang)
Congrats to all authors, particluarly current SEAL members, Jeff and Ah Reum!
One paper by SEAL researchers has been accepted for presentation at the International Conference on Availability, Reliability and Security (ARES 2016) to be held from August 29 to August 31 in Salzburg, Austria. The paper is on assessing the landscape of domain name typosquatting and is authored by Jeffrey Spaulding. Congratulations to Jeff on his first paper!
SEAL received a grant from the national science foundation (NSF) to conduct research on understanding the attack surface of privacy enhancing technologies (PETs), such as Tor and I2P, and ways to detect malicious use and misuse of such technologies.
One poster by SEAL researchers has been accepted for presentation at the ACM Special Interest Group on Data Communication (ACM SIGCOMM 2016) to be held from August 22 to 26 in Florianópolis, Brazil. The poster is entitled “A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure” and is authored with collaborators from Korea University. Congratulations to all authors.
Our work on assessing the landscape of domain name typosquatting got mentioned in an article in slate on the use of typosquatting for malware attacks. The work (under submission) is jointly done with Jeffrey Spaulding (Ph.D. student) and my colleague Prof Shambhu J. Upadhyaya.
Congratulations to Jeff and Shambhu!
SEAL has received funding from AFOSR to investigate privacy issues in threat sharing. The funding is part of the SFFP (summer faculty fellow program) executed by AFOSR, where PI Mohaisen will visit AFRL using this funding during the summer of 2016.
Jeff Spaulding will join SEAL as the first Ph.D. student. Jeff will be working on critical infrastructure security; particularly understanding security issues in the domain name system.