Holmes: real-time apt detection through correlation of suspicious information flows SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan 2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019 | 270 | 2019 |
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ... USENIX Security Symposium, 487-504, 2017 | 142 | 2017 |
Binspect: Holistic analysis and detection of malicious web pages B Eshete, A Villafiorita, K Weldemariam Security and Privacy in Communication Networks: 8th International ICST …, 2013 | 111 | 2013 |
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 100 | 2019 |
{NAVEX}: Precise and scalable exploit generation for dynamic web applications A Alhuzali, R Gjomemo, B Eshete, VN Venkatakrishnan 27th {USENIX} Security Symposium ({USENIX} Security 18), 377-392, 2018 | 57 | 2018 |
Webwinnow: Leveraging exploit kit workflows to detect malicious urls B Eshete, VN Venkatakrishnan Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 55 | 2014 |
Early detection of security misconfiguration vulnerabilities in web applications B Eshete, A Villafiorita, K Weldemariam 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 48 | 2011 |
Chainsaw: Chained Automated Workflow-based Exploit Generation A Alhuzali, B Eshete, R Gjomemo, VN Venkatakrishnan Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 41 | 2016 |
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration. B Eshete, A Alhuzali, M Monshizadeh, PA Porras, VN Venkatakrishnan, ... NDSS, 2015 | 35 | 2015 |
Malicious Website Detection: Effectiveness and Efficiency Issues B Eshete, A Villafiorita, K Weldemariam, FB Kessler Proceedings of SysSec Workshop (SysSec), 2011, 123 - 126, 2011 | 32 | 2011 |
Effective analysis, characterization, and detection of malicious web pages B Eshete Proceedings of the 22nd International Conference on World Wide Web, 355-360, 2013 | 30 | 2013 |
Host-based anomaly detection for pervasive medical systems B Asfaw, D Bekele, B Eshete, A Villafiorita, K Weldemariam 2010 Fifth International Conference on Risks and Security of Internet and …, 2010 | 30 | 2010 |
Einspect: Evolution-guided analysis and detection of malicious web pages B Eshete, A Villafiorita, K Weldemariam, M Zulkernine 2013 IEEE 37th Annual Computer Software and Applications Conference, 375-380, 2013 | 26 | 2013 |
Propatrol: Attack investigation via extracted high-level tasks S M. Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan Information Systems Security: 14th International Conference, ICISS 2018 …, 2018 | 22 | 2018 |
Making Machine Learning Trustworthy B Eshete Science 373 (6556), 743-744, 2021 | 18 | 2021 |
Confeagle: Automated analysis of configuration vulnerabilities in web applications B Eshete, A Villafiorita, K Weldemariam, M Zulkernine 2013 IEEE 7th International Conference on Software Security and Reliability …, 2013 | 16 | 2013 |
ICT for good: Opportunities, challenges and the way forward B Eshete, A Mattioli, A Villafiorita, K Weldemariam 2010 Fourth International Conference on Digital Society, 14-19, 2010 | 12 | 2010 |
Morphence: Moving target defense against adversarial examples A Amich, B Eshete Annual Computer Security Applications Conference, 61-75, 2021 | 9 | 2021 |
Pricure: privacy-preserving collaborative inference in a multi-party setting I Jarin, B Eshete Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics, 25-35, 2021 | 8 | 2021 |
Explanation-guided diagnosis of machine learning evasion attacks A Amich, B Eshete Security and Privacy in Communication Networks: 17th EAI International …, 2021 | 7 | 2021 |