Publications

(2023). Designing Secure Performance Metrics for Last-Level Cache. Proceedings of the 28th International Workshop on High-Level Parallel Programming Models and Supportive Environments (HIPS 2023).

(2022). Adversarial Detection of Censorship Measurements. Proceedings of the 21st ACM Workshop on Privacy in the Electronic Society (WPES’22), co-located with the 29th ACM Conference on Computer and Communications Security (CCS), 2022.

Project

(2022). EG-Booster: Explanation-Guided Booster of ML Evasion Attacks. Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (ACM CODASPY).

PDF Code Project Video

(2022). DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning. Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (ACM CODASPY).

PDF Code Project Video

(2021). Morphence: Moving Target Defense Against Adversarial Examples. Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC).

PDF Code Project Slides Video

(2021). Making Machine Learning Trustworthy. Science, Vol. 373, Issue 6556, pp. 743-744, American Association for the Advancement of Science.

PDF Project Video Source Document

(2021). Explanation-Guided Diagnosis of Machine Learning Evasion Attacks. Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm).

Preprint PDF Project

(2021). PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting. Proceedings of the 7th International Workshop Security and Privacy Anlytics (IWSPA), co-located with ACM CODASPY’21.

PDF Code Project

(2021). PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting. Proceedings of the 7th International Workshop on Security and Privacy Analytics (IWSPA), co-located with ACM CODASPY’21.

PDF Code Project

(2020). Best-Effort Adversarial Approximation of Black-Box Malware Classifiers. Proceedings of the 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm).

Preprint PDF Project Video

(2018). ProPatrol: Attack Investigation via Extracted High-Level Tasks. Proceedings of the 14th International Conference on Information Systems Security (ICISS).

PDF Project

(2017). DYNAMINER: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection. Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

PDF Project Slides

(2016). Chainsaw: Chained Automated Workflow-based Exploit Generation. Proceedings of the 23rd ACM Conference on Computer and Communications Security(CCS).

PDF Video

(2014). WebWinnow: Leveraging exploit kit workflows to detect malicious URLs. Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY).

PDF Project

(2013). EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages. Proceedings of the 37th IEEE International Conference on Computer Software and Applications (COMPSAC).

PDF

(2013). Effective Analysis, Characterization, and Detection of Malicious Web Pages. Proceedings of the 22nd ACM International Conference on World Wide Web Companion (WWW).

PDF

(2013). SAMo: Experimenting a Social Accountability Web Platform. Proceedings of the ACM Symposium on Computing for Development (ACM DEV).

PDF

(2012). Social Accountability for Mozambique: an Experience Report from the Moamba District. Proceedings of the International IEEE EAI Conference on e-Infrastructure and e-Services for Developing Countries (AFRICOMM).

PDF

(2012). BINSPECT: Holistic Analysis and Detection of Malicious Web Pages. Proceedings of the 8th Springer EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM).

PDF

(2011). Early Detection of Security Misconfiguration Vulnerabilities in Web Applications. Proceedings of the 6th IEEE Conference on Availability, Reliability and Security (ARES).

Code

(2011). Malicious Website Detection: Effectiveness and Efficiency Issues. Proceedings of 1st IEEE System Security Workshop (SysSec), Co-Located with DIMVA.

PDF

(2010). Host-based Anomaly Detection for Pervasive Medical Systems. Proceedings of the 5th IEEE Conference on Risks and Security of Internet and Systems (CRiSIS).

(2010). Context Information Refinement for Pervasive Medical Systems. Proceedings of the 5th IEEE International Conference on Digital Society (ICDS).

(2010). ICT for Good: Opportunities, Challenges and the Way Forward. Proceedings of the 5th IEEE International Conference on Digital Society (ICDS).

(2007). Context Information Refinement for Pervasive Medical Systems. Master’s Thesis, Addis Ababa University.

PDF