Publications

Published in peer reviewed venues:

  1. Hassaan Irshad, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Lee, Jignesh Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, Xiangyu Zhang, TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection, IEEE Transactions on Information Forensics & Security, 2021
  2. Matthew Jablonski, Bo Yu, Gabriela Ciocarlie, Paulo Costa, A Case Study in the Formal Modeling of Safe and Secure Manufacturing Automation, IEEE Special Issue on Formal Methods Applied to Cyber-Physical Systems, 2021
  3. Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent Urias, Han Wei Lin, Gabriela Ciocarlie, Vinod Yegneswaran, and Ashish Gehani, ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation, 28th Network and Distributed System Security Symposium (NDSS), 2021
  4. Ben Marlin, Tarek Abdelzaher, Gabriela Ciocarlie, Adam Cobb, Mark Dennison, Brian Jalaian, Lance Kaplan, Tiffany Raber, Adrienne Raglin, Piyush Sharma, Mani Srivastava, Theron Trout, Meet Vadera, Maggie Wigness, On Uncertainty and Robustness in Large-scale Intelligent Data Fusion, IEEE CogMI, 2020
  5. Prashant Anantharaman, Liwei Song, Ioannis Agadakos, Gabriela Ciocarlie, Bogdan Copos, Ulf Lindqvist and Michael Locasto, IoTHound: Environment-agnostic Device Identification and Monitoring, International Conference on IoT, 2020 (Best Paper Award).
  6. Ákos Hajdu, Dejan Jovanović and Gabriela Ciocarlie, Formal Specification and Verification of Solidity Contracts with Events (short paper), FMBC, 2020.
  7. Sidi Mohamed Beillahi, Gabriela Ciocarlie, Michael Emmi, Constantin Enea, Behavioral Simulation for Smart Contracts, PLDI, 2020.
  8. Shaobo He, Michael Emmi and Gabriela Ciocarlie, ct-fuzz: Fuzzing for Timing Leaks, ICST, Testing Tools, 2020.
  9. Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Jemin George, Nandi Leslie, and James Michaelis, Application of Trust Assessment Techniques to IoBT Systems, MILCOM, 2019.
  10. Jian Li, Don Towsley, Shaofeng Zou, Venugopal V. Veeravalli, and Gabriela Ciocarlie, A Consensus-based Approach for Distributed Quickest Detection of Significant Events in Networks, Asilomar Conference on Signals, Systems and Computers, 2019.
  11. Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Jemin George, Nandi Leslie, James Michaelis, Security for Resilient IoBT Systems: Emerging Research Directions, INFOCOM Workshop on Internet of Things for Adversarial Environments , 2019.
  12. Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, and Somesh Jha, Kernel-Supported Cost-Effective Audit Logging for Causality Tracking, 29th USENIX Annual Technical Conference (ATC), 2018.
  13. Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, Michael Locasto, and James Michaelis, Risks and Benefits of Side-Channels in Battlefields, Fusion, 2018.
  14. Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela Ciocarlie, Ashish Gehani, and Vinod Yegneswaran, MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation, Network and Distributed System Security Symposium (NDSS), 2018.
  15. Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto, Butterfly Effect: Causality from Chaos in the IoT, IoTSec, 2018.
  16. Gabriela Ciocarlie, Karim Eldefrawy, and Tancrède Lepoint, BlockCIS—A Blockchain-based Cyber Insurance System, First IEEE Workshop on Blockchain Technologies and Applications, 2018.
  17. Ioannis Agadakos, Chien-Ying Chen, Matteo Campanelli, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist, Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things , CCS Workshop on Cyber-Physical Systems Security and Privacy (CCS-SPC), 2017.
  18. Prashant Anantharaman, Michael Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist, Building Hardened Internet-of-Things Clients with Language-theoretic Security , IEEE S&P Workshop on Language-Theoretic Security (LangSec) , 2017.
  19. Fernando Krell, Gabriela Ciocarlie, Ashish Gehani, and Mariana Raykova Low-Leakage Secure Search for Boolean Expressions, Cryptographer’s Track, RSA Conference, 2017.
  20. Gabriela F. Ciocarlie, Cherita Corbett, Eric Yeh, Christopher Connolly, Henning Sanneck, Muhammad Naseer-Ul-Islam, Borislava Gajic, Szabolcs Novaczki, and Kimmo Hatonen Diagnosis Cloud: Sharing Knowledge Across Cellular Networks, International Conference on Network and Service Management (CNSM), October 2016.
  21. Gabriela F. Ciocarlie, Eric Yeh, Christopher Connolly, Cherita Corbett, Ulf Lindqvist, Henning Sanneck, Kimmo Hatonen, Szabolcs Novaczki, Muhammad Naseer-Ul-Islam, and Borislava Gajic, Alarm Prioritization and Diagnosis for Cellular Networks, 7th International Conference on Mobile Networks and Management (MONAMI), September 2015 (Best Paper Award).
  22. Gabriela F. Ciocarlie, Christopher Connolly, Chih-Chieh Cheng, Ulf Lindqvist, Szabolcs Novaczi, Henning Sanneck and Muhammad Naseer-ul-Islam, Anomaly Detection and Diagnosis for Automatic Radio Network Verification, 6th International Conference on Mobile Networks and Management (MONAMI), September 2014.
  23. Gabriela F. Ciocarlie, Chih-Chieh Cheng, Christopher Connolly, Ulf Lindqvist, Kenneth Nitz, Szabolcs Novaczi, Henning Sanneck and Muhammad Naseer-ul-Islam, SONVer: SON Verification for Operational Cellular Networks, International Workshop on Self-Organized Networks (IWSON), Demo Paper, 2014.
  24. Gabriela F. Ciocarlie, Chih-Chieh Cheng, Christopher Connolly, Ulf Lindqvist, Szabolcs Novaczi, Henning Sanneck and Muhammad Naseer-ul-Islam, Managing Scope Changes for Cellular Network-level Anomaly Detection, International Workshop on Self-Organized Networks (IWSON), 2014.
  25. Gabriela F. Ciocarlie, Ulf Lindqvist, Kenneth Nitz, Szabolcs Novaczki and Henning Sanneck, On the Feasibility of Deploying Cell Anomaly Detection in Operational Cellular Networks , IEEE/IFIP Network Operations and Management Symposium (NOMS), Experience Session, 2014.
  26. Gabriela F. Ciocarlie, Ulf Lindqvist, Kenneth Nitz, Szabolcs Novaczki and Henning Sanneck, DCAD: Dynamic Cell Anomaly Detection for Operational Cellular Networks , IEEE/IFIP Network Operations and Management Symposium (NOMS), Demo Paper, 2014.
  27. Man-Ki Yoon and Gabriela F. Ciocarlie, Communication Pattern Monitoring: Improving the Utility of Anomaly Detection for Industrial Control Systems, NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014.
  28. Gabriela F. Ciocarlie, Ulf Lindqvist, Szabolcs Novaczki, and Henning Sanneck, Detecting Anomalies in Cellular Networks Using an Ensemble Method, 9th International Conference on Network and Service Management (CNSM), 2013. [PDF]
  29. Ashish Gehani, Gabriela Ciocarlie, and Natarajan Shankar, Accountable Clouds, 13th IEEE Conference on Technologies for Homeland Security (HST), 2013.
  30. Ashish Gehani and Gabriela Ciocarlie, Composing Cross-Domain Solutions, 2nd Layered Assurance Workshop (LAW) affiliated with the 28th Annual Computer Security Applications Conference (ACSAC), 2012.
  31. Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin, A Data Centric Approach for Modular Assurance, 4th Annual Layered Assurance Workshop (LAW), 2010.
  32. Gabriela F. Cretu-Ciocarlie, Karthik Marudhachalam Ramasamy and Salvatore J. Stolfo, Error-Response Feedback for Anomaly Detection Systems, 25th Annual Computer Security Applications Conference (ACSAC), Work in Progress Session, 2009.
  33. Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto and Salvatore J. Stolfo, Keep Your Friends Close: The Necessity for Updating an Anomaly Sensor with Legitimate Environment Changes, ACM/CCS AISec Workshop, 2009.
  34. Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto and Salvatore J. Stolfo, Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating, 12th International Symposium On Recent Advances In Intrusion Detection (RAID), 2009.
  35. Gabriela F. Cretu-Ciocarlie, Mihai Budiu, and Moises Goldszmidt, Hunting for problems with Artemis, 1st USENIX Workshop on the Analysis of System Logs (WASL), 2008.
  36. Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, and Salvatore J. Stolfo, Return Value Predictability for Self-Healing, 3rd International Workshop on Security (IWSEC), 2008.
  37. Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, and Angelos D. Keromytis, Casting out Demons: Sanitizing Training Data for Anomaly Sensors, IEEE Symposium on Security & Privacy, 2008.
  38. Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Extended Abstract: Online Training and Sanitization of AD Systems, NIPS 2007 Workshop on Machine Learning in Adversarial Environments for Computer Security, 2007.
  39. Gabriela F. Cretu, Angelos Stavrou, Salvatore J. Stolfo, Angelos D. Keromytis, Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems, Third Workshop on Hot Topics in System Dependability, 2007.
  40. Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, and Angelos D. Keromytis, From STEM to SEAD: Speculative Execution for Automated Defense, USENIX Annual Technical Conference, 2007.
  41. Gabriela F. Cretu, Janak J. Parekh, Ke Wang, Salvatore J. Stolfo, Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks, IEEE Consumer Communications and Networking Conference, 2006.
  42. Ke Wang, Gabriela Cretu, Salvatore J. Stolfo, Anomalous Payload-based Worm Detection and Signature Generation, International Conference on Recent Advances in Intrusion Detection, 2005.