Publications by the DETER Team

The DETER Project Team has published extensively about the work of the project, its research results, and the on-going process of putting research results into practice in DETERLab, where cybersecurity experimenters worldwide can benefit from DETER's advances in cybersecurity test and experimentation technology. You can view peer-reviewed publications, invited papers and other publications below.

Peer-Reviewed Publications

2017

2016

  • DETERLab and the DETER Project. John Wroclawski, Terry Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic, and Stephen Schwab. In GENI: Prototype of the Next Internet. Rick McGeer, Mark Berman, Chip Elliott and Rob Ricci, Eds. New York: Springer-Verlag, 2016.
  • Authorization and Access Control: ABAC. Ted Faber, Steve Schwab, and John Wroclawski. In GENI: Prototype of the Next Internet. Rick McGeer, Mark Berman, Chip Elliott, and Rob Ricci, Eds. New York: Springer-Verlag, 2016.
  • Behavioral Experimentation of Cyber Attacker Deterrence with DETER Testbed. H. Rosoff, J. Blythe, S. Kusumastuti, and R. John. In Proceedings of the Society for Risk Analysis (SRA) Annual Meeting, San Diego, CA, December 11-15, 2016.
  • Mitigating Denial-of-Service Attacks in Wide-Area LQR Control. Nachiappan Chockalingam, Aranya Chakrabortty, and Alefiya Hussain. In Proceedings of the forthcoming 2016 IEEE PES General Meeting: Paving The Way For Grid Modernization, Boston, Massachusetts, July 17-21, 2016.
  • Foundations of Infrastructure CPS. Anuradha Annaswamy, Alefiya Hussain, Aranya Chakrabortty, and Miloš Cvetković. In Proceedings of the forthcoming 2016 American Control Conference, Boston, Massachusetts, July 6-8, 2016.
  • Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users. R. Koppel, J. Blythe, V. Kothari, and S. W. Smith. In Proceedings of the 12th Symposium On Usable Privacy and Security (SOUPS), Denver, CO, June 22-24, 2016.
  • DBit: A Methodology for Comparing Content Distribution Networks. Zahib Akhtar, Alefiya Hussain, Ethan Katz-Bassett, and Ramesh Govindan. In Proceedings of the forthcoming Traffic Monitoring and Analysis workshop (TMA '16), Louvain La Neuve, Belgium, 7-8 April, 2016.
  • Validating Agent-Based Modeling of Human Password Behavior. B. Korbar, J. Blythe, R. Koppel, V. Kothari, and S. W. Smith. In Proceedings of the AAAI-16 Workshop on Artificial Intelligence for Cyber Security (AICS), Phoenix, Arizona, February 12, 2016.
  • Defending Against Strategic Adversaries in Dynamic Pricing Markets for Smart Grids. Paul Wood, Saurabh Bagchi, and Alefiya Hussain. In Proceedings of the 8th International Conference on COMmunication and Systems & NETworkS (COMSNETS '16), Bangalore, India, January 5-9, 2016.

2015

  • A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users. Tatyana Ryutov, Michael Orosz, James Blythe, and Detlof von Winterfeldt. In Proceedings of the 11th International Workshop on Security and Trust Management (STM '15), Vienna, Austria, September 21-22, 2015.
  • Engaging Novices in Cybersecurity Competitions: A Vision and Lessons Learned at ACM Tapia 2015. Jelena Mirkovic, Aimee Tabor, Simon Woo, and Portia Pusey. In Proceedings of the 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE '15), Washington DC, August 11, 2015.
  • Mismorphism: a Semiotic Model of Computer Security Circumvention. S.W. Smith, R. Koppel, J. Blythe, and V. Kothari. In Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance (HAISA '15), Levos, Greece, July 1-3, 2015.
  • Expressing Different Traffic Models Using The LegoTG Framework. Genevieve Bartlett and Jelena Mirkovic. Best Paper Award at the international workshop on Computer and Networking Experimental Research using Testbeds (CNERT '15), Columbus, OH, June 29, 2015.
  • Cypress: A Testbed for Research in Networked Cyber-Physical Systems. Ryan Goodfellow and Erik Kline. In Proceedings of the 10th EAI International Conference on Testbeds and Research Infrastructures of the Development of Networks & Communities (TRIDENTCOM), Vancouver, BC, Canada, June 24-25, 2015.
  • Beyond the Lock Icon: Real-time Detection of Phishing Websites Using Public Key Certificates. Zheng Dong, Apu Kapadia, Jim Blythe, and L. Jean Camp. Best Paper Honorable Mention at the eCrime 2015 Mobile Security Symposium, Barcelona, Spain, May 26-29, 2015.
  • Optimizing Defensive Investments in Energy-Based Cyber-Physical Systems. Paul Wood, Saurabh Bagchi, and Alefiya Hussain. In Proceedings of the 20th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems, Hyderabad, India, May 25-29, 2015.
  • Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling. Vijay Kothari, Jim Blythe, Ross Koppel, and Sean W. Smith. In Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS '15), University of Illinois at Urbana-Champaign, April 21-22, 2015.
  • Workarounds to Computer Access in Healthcare Organizations: You want My Password or a Dead Patient? Ross Koppel, Sean W. Smith, Jim Blythe, and Vijay Kothari. In Proceedings of Information Technology and Communication in Health Conference (ITCH) 2015, Victoria, BC, Canada, February 26 - March 1, 2015.

2014

2013

2012

2011

2010

2009

  • RAD: Reflector Attack Defense Using Message Authentication Codes. E. Kline, M. Beaumont-Gay, J. Mirkovic, and P. Reiher. In Proceedings of the 2009 Annual Computer Security Applications Conference, Honolulu, Hawaii, December 7-11, 2009.
  • A Federated Experiment Environment for Emulab-based Testbeds. T. Faber and J. Wroclawski. In Proceedings of the 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2009), Washington DC, April 6-8, 2009.
  • Tools for Worm Experimentation on the DETER Testbed. S. Wei, C. Ko, J. Mirkovic, and A. Hussain. In Proceedings of the 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2009), Washington DC, April 6-8, 2009.
  • Current Developments in DETER Cybersecurity Testbed Technology. T. Benzel, B. Braden, T. Faber, J. Mirkovic, S. Schwab, K. Sollins, and J. Wroclawski. In Proceedings of the Cybersecurity Applications & Technology Conference for Homeland Security (CATCH 2009), Washington, DC, March 3-4, 2009.
  • How to Test DoS Defenses. J. Mirkovic, S. Fahmy, P. Reiher, and R. Thomas. In Proceedings of the Cybersecurity Applications & Technology Conference for Homeland Security (CATCH 2009), Washington, DC, March 3-4, 2009.

2008

2007

2006

  • Identification of Repeated Denial of Service Attacks. Alefiya Hussain, John Heidemann, and Christos Papadopoulos. In Proceedings of 25th IEEE International Conference on Computer Communications 2006 (INFOCOM '06), Barcelona, Spain, April 23-29, 2006.
  • Experience with DETER: A Testbed for Security Research. T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. In Proceedings of Tridentcom (International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities), March 2006.

2004

  • Cyber Defense Technology Networking and Evaluation. R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S. Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R. Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, J. D. Tygar, S. Sastry, D. Sterne, and S. F. Wu. In Communications of the ACM, Special issue on Emerging Technologies for Homeland Security, Vol. 47, Issue 3, pp 58-61, March 2004.

2003

Invited Papers

Other Publications