ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis Y Meidan, M Bohadana, A Shabtai, JD Guarnizo, M Ochoa, ... Proceedings of the symposium on applied computing, 506-509, 2017 | 474 | 2017 |
Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures I Homoliak, F Toffalini, J Guarnizo, Y Elovici, M Ochoa ACM Computing Surveys (CSUR) 52 (2), 1-40, 2019 | 290 | 2019 |
Detection of unauthorized IoT devices using machine learning techniques Y Meidan, M Bohadana, A Shabtai, M Ochoa, NO Tippenhauer, ... arXiv preprint arXiv:1709.04647, 2017 | 279 | 2017 |
Automatic quantification of cache side-channels B Köpf, L Mauborgne, M Ochoa Computer Aided Verification: 24th International Conference, CAV 2012 …, 2012 | 148 | 2012 |
Siphon: Towards scalable high-interaction physical honeypots JD Guarnizo, A Tambe, SS Bhunia, M Ochoa, NO Tippenhauer, A Shabtai, ... Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 57-68, 2017 | 146 | 2017 |
NoisePrint Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems CM Ahmed, M Ochoa, J Zhou, AP Mathur, R Qadeer, C Murguia, J Ruths Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 93 | 2018 |
Robust and effective malware detection through quantitative data flow graph metrics T Wüchner, M Ochoa, A Pretschner Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015 | 82 | 2015 |
Leveraging compression-based graph mining for behavior-based malware detection T Wüchner, A Cisłak, M Ochoa, A Pretschner IEEE Transactions on Dependable and Secure Computing 16 (1), 99-112, 2017 | 81 | 2017 |
Malware detection with quantitative data flow graphs T Wüchner, M Ochoa, A Pretschner Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 69 | 2014 |
Twos: A dataset of malicious insider threat behavior based on a gamified competition A Harilal, F Toffalini, J Castellanos, J Guarnizo, I Homoliak, M Ochoa Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017 | 60 | 2017 |
Gamifying ICS security training and research: Design, implementation, and results of S3 D Antonioli, HR Ghaeini, S Adepu, M Ochoa, NO Tippenhauer Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017 | 59* | 2017 |
Innercircle: A parallelizable decentralized privacy-preserving location proximity protocol P Hallgren, M Ochoa, A Sabelfeld 2015 13th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2015 | 50 | 2015 |
A framework for measuring software obfuscation resilience against automated attacks S Banescu, M Ochoa, A Pretschner 2015 IEEE/ACM 1st International Workshop on Software Protection, 45-51, 2015 | 48 | 2015 |
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. A Harilal, F Toffalini, I Homoliak, JH Castellanos, J Guarnizo, S Mondal, ... J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (1), 54-85, 2018 | 46 | 2018 |
Improving network intrusion detection classifiers by non-payload-based exploit-independent obfuscations: An adversarial approach I Homoliak, M Teknos, M Ochoa, D Breitenbacher, S Hosseini, P Hanacek arXiv preprint arXiv:1805.02684, 2018 | 43 | 2018 |
MACKE: Compositional analysis of low-level vulnerabilities with symbolic execution S Ognawala, M Ochoa, A Pretschner, T Limmer Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016 | 43 | 2016 |
Legacy-compliant data authentication for industrial control system traffic JH Castellanos, D Antonioli, NO Tippenhauer, M Ochoa Applied Cryptography and Network Security: 15th International Conference …, 2017 | 39 | 2017 |
Detection of threats to IoT devices using scalable VPN-forwarded honeypots A Tambe, YL Aung, R Sridharan, M Ochoa, NO Tippenhauer, A Shabtai, ... Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | 37 | 2019 |
Finding dependencies between cyber-physical domains for security testing of industrial control systems JH Castellanos, M Ochoa, J Zhou Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 34 | 2018 |
Vera: A flexible model-based vulnerability testing tool A Blome, M Ochoa, K Li, M Peroli, MT Dashti 2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013 | 33 | 2013 |