Jelena Mirkovic (USC Information Sciences Institute)

Cybersecurity and privacy research is of critical importance to keep our nation and our infrastructure safe, and to protect intellectual progress broadly across scientific disciplines of national importance. Reproducible experimentation in common, easy-to-use environments, with public datasets, is essential for accelerated progress in cybersecurity and privacy research. For too long our adversaries have exploited our cyber infrastructure largely undeterred, while our research has remained opportunistic. It is performed piecemeal, using tools, datasets, and equipment available to a given research lab, often in isolation from other related work and often on much simplified versions of larger, interdependent systems. In this talk I will report on our recently held Cybersecurity experimentation workshop (Dec 14, 2022), and findings from the community discussions around needs for future cybersecurity experimentation.

Speaker's biography

Jelena Mirkovic is Research Team Leader at USC Information Sciences Institute and research associate professor of Computer Science at USC. During her professional career she published more than 100 conference and journal papers, and the first book on the denial-of-service attacks. She also pioneered use of testbeds in cybersecurity education. Her research interests span networking, security and education. Her current research is focused on denial-of-service attacks, phishing, user authentication, user privacy and cybersecurity education.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 42 [1] => 66 ) ) ) [post__not_in] => Array ( [0] => 12765 ) )

Detection and Resolution of Control Decision Anomalies

Prof. Kang Shin (Kevin and Nancy O'Connor Professor of Computer Science, and the Founding Director of the Real-Time Computing Laboratory (RTCL) in the Electrical Engineering and Computer Science Department at the University of Michigan)

Read More

Measuring Messengers: Analyzing Infrastructures and Message Timings to Extract...

Theodor Schnitzler (Research Center Trustworthy Data Science and Security, TU Dortmund, and Ruhr-Universität Bochum)

Read More

Learning Automated Defense Strategies Using Graph-Based Cyber Attack Simulations

Jakob Nyber, Pontus Johnson (KTH Royal Institute of Technology)

Read More

Ethical Challenges in Blockchain Network Measurement Research

Yuzhe Tang (Syracuse University), Kai Li (San Diego State University), and Yibo Wang and Jiaqi Chen (Syracuse University)

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)