The DETER Project Team has published extensively about the work of the project, its research results, and the on-going process of putting research results into practice in DETERLab, where cybersecurity experimenters worldwide can benefit from DETER's advances in cybersecurity test and experimentation technology. You can view peer-reviewed publications, invited papers and other publications below.
Peer-Reviewed Publications
2018
- DEW: Distributed Experiment Workflows. Jelena Mirkovic, Genevieve Bartlett, and Jim Blythe. In Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET '18), Baltimore, MD, August 13, 2018.
- Malware Analysis Through High-level Behavior. Xiyue Deng and Jelena Mirkovic. In Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET '18), Baltimore, MD, August 13, 2018.
- Usable Security vs. Workflow Realities. Jim Blythe, Vijay Kothari, Sean W. Smith, and Ross Koppel. In Proceedings of the Fourteenth Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, August 12-14, 2018.
- Security for the Collective Reality of the Smart Home. Ross Koppel, Jim Blythe, Vijay Kothari, and Sean W. Smith. In Proceedings of the Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018.
- FARM: Architecture for Distributed Agent-based Social Simulations. Jim Blythe and Alexey Tregubov. In Proceedings of the International Workshop on Massively Multi-Agent Systems (MMAS2018), Stockholm, Sweeden, July 14, 2018.
2017
- Hiding Debuggers from Malware with Apate. Hao Shi and Jelena Mirkovic. In Proceedings of the 32nd ACM SIGAPP Symposium on Applied Computing, Marrakech, Morocco, April 4-6, 2017.
- Enabling SDN Experimentation in Network Testbeds. Sivaramakrishnan Ramanathan, Pravein Kannan, Chan Mun Choon, Jelena Mirkovic, and Keith Sklower. In Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security 2017), Scottsdale, Arizona, March 24, 2017.
- Towards Repeatability & Verifiability in Networking Experiments: A Stochastic Framework. Swati Sharma, Alefiya Hussain, and Huzur Saran. Original Research Article in Journal of Network and Computer Applications, Volume 81, Pages 12-23, March 1, 2017.
2016
- DETERLab and the DETER Project. John Wroclawski, Terry Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic, and Stephen Schwab. In GENI: Prototype of the Next Internet. Rick McGeer, Mark Berman, Chip Elliott and Rob Ricci, Eds. New York: Springer-Verlag, 2016.
- Authorization and Access Control: ABAC. Ted Faber, Steve Schwab, and John Wroclawski. In GENI: Prototype of the Next Internet. Rick McGeer, Mark Berman, Chip Elliott, and Rob Ricci, Eds. New York: Springer-Verlag, 2016.
- Behavioral Experimentation of Cyber Attacker Deterrence with DETER Testbed. H. Rosoff, J. Blythe, S. Kusumastuti, and R. John. In Proceedings of the Society for Risk Analysis (SRA) Annual Meeting, San Diego, CA, December 11-15, 2016.
- A Testbed for Closed Loop Cyber-Physical-Social System Simulation and Security Analysis. Ren Liu, Ryan Goodfellow, and Anurag K. Srivastava. Section V.I in the book Cyber-Physical-Social Systems and Constructs in Electric Power Engineering edited by Siddharth Suryanarayanan, Robin Roche, and Timothy M. Hansen. Published in October 2016.
- Mitigating Denial-of-Service Attacks in Wide-Area LQR Control. Nachiappan Chockalingam, Aranya Chakrabortty, and Alefiya Hussain. In Proceedings of the forthcoming 2016 IEEE PES General Meeting: Paving The Way For Grid Modernization, Boston, Massachusetts, July 17-21, 2016.
- Foundations of Infrastructure CPS. Anuradha Annaswamy, Alefiya Hussain, Aranya Chakrabortty, and Miloš Cvetković. In Proceedings of the forthcoming 2016 American Control Conference, Boston, Massachusetts, July 6-8, 2016.
- Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users. R. Koppel, J. Blythe, V. Kothari, and S. W. Smith. In Proceedings of the 12th Symposium On Usable Privacy and Security (SOUPS), Denver, CO, June 22-24, 2016.
- DBit: A Methodology for Comparing Content Distribution Networks. Zahib Akhtar, Alefiya Hussain, Ethan Katz-Bassett, and Ramesh Govindan. In Proceedings of the forthcoming Traffic Monitoring and Analysis workshop (TMA '16), Louvain La Neuve, Belgium, 7-8 April, 2016.
- Validating Agent-Based Modeling of Human Password Behavior. B. Korbar, J. Blythe, R. Koppel, V. Kothari, and S. W. Smith. In Proceedings of the AAAI-16 Workshop on Artificial Intelligence for Cyber Security (AICS), Phoenix, Arizona, February 12, 2016.
- Defending Against Strategic Adversaries in Dynamic Pricing Markets for Smart Grids. Paul Wood, Saurabh Bagchi, and Alefiya Hussain. In Proceedings of the 8th International Conference on COMmunication and Systems & NETworkS (COMSNETS '16), Bangalore, India, January 5-9, 2016.
2015
- A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users. Tatyana Ryutov, Michael Orosz, James Blythe, and Detlof von Winterfeldt. In Proceedings of the 11th International Workshop on Security and Trust Management (STM '15), Vienna, Austria, September 21-22, 2015.
- Engaging Novices in Cybersecurity Competitions: A Vision and Lessons Learned at ACM Tapia 2015. Jelena Mirkovic, Aimee Tabor, Simon Woo, and Portia Pusey. In Proceedings of the 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE '15), Washington DC, August 11, 2015.
- Mismorphism: a Semiotic Model of Computer Security Circumvention. S.W. Smith, R. Koppel, J. Blythe, and V. Kothari. In Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance (HAISA '15), Levos, Greece, July 1-3, 2015.
- Expressing Different Traffic Models Using The LegoTG Framework. Genevieve Bartlett and Jelena Mirkovic. Best Paper Award at the international workshop on Computer and Networking Experimental Research using Testbeds (CNERT '15), Columbus, OH, June 29, 2015.
- Cypress: A Testbed for Research in Networked Cyber-Physical Systems. Ryan Goodfellow and Erik Kline. In Proceedings of the 10th EAI International Conference on Testbeds and Research Infrastructures of the Development of Networks & Communities (TRIDENTCOM), Vancouver, BC, Canada, June 24-25, 2015.
- Beyond the Lock Icon: Real-time Detection of Phishing Websites Using Public Key Certificates. Zheng Dong, Apu Kapadia, Jim Blythe, and L. Jean Camp. Best Paper Honorable Mention at the eCrime 2015 Mobile Security Symposium, Barcelona, Spain, May 26-29, 2015.
- Optimizing Defensive Investments in Energy-Based Cyber-Physical Systems. Paul Wood, Saurabh Bagchi, and Alefiya Hussain. In Proceedings of the 20th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems, Hyderabad, India, May 25-29, 2015.
- Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling. Vijay Kothari, Jim Blythe, Ross Koppel, and Sean W. Smith. In Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS '15), University of Illinois at Urbana-Champaign, April 21-22, 2015.
- Workarounds to Computer Access in Healthcare Organizations: You want My Password or a Dead Patient? Ross Koppel, Sean W. Smith, Jim Blythe, and Vijay Kothari. In Proceedings of Information Technology and Communication in Health Conference (ITCH) 2015, Victoria, BC, Canada, February 26 - March 1, 2015.
2014
- A Calibration Methodology for Networked Cybersecurity Testbed Environments. Vineet Ghatge, Prateek Jaipuria, and Alefiya Hussain. In Proceedings of The LASER Workshop, Arlington, Virginia, October 2014.
- Cardinal Pill Testing of System Virtual Machines. H. Shi, A. Alwabel, and J. Mirkovic. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, August 21, 2014.
- Ethnography of Computer Security Evasions in Healthcare Settings: Circumvention as the Norm. Jim Blythe, Ross Koppel, Vijay Kothari, and Sean W. Smith. In Proceedings of the USENIX Summit on Health Information Technologies (HealthTech '14), San Diego, CA, August 19, 2014.
- Class Capture-the-Flag Exercises. Jelena Mirkovic and Peter A. H. Peterson. In Proceedings of the 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE'14), San Diego, CA, August 18, 2014.
- Safe and Automated Live Malware Experimentation on Public Testbeds. A. Alwabel, H. Shi, G. Bartlett, and J. Mirkovic. In Proceedings of the 7th Workshop on Cyber Security Experimentation and Test (CSET'14), San Diego, CA, August 18, 2014.
- Design and Analysis of Wide-Area Resilient Control Algorithms for Large-Scale Power Systems: Theoretical and Experimental Methods poster. A. Hussain, A. Chakrabortty, P. Jaipuria, V. Ghatge, J. Zhang, and Y. Xin. Presented at the SmartAmerica Expo, Washington DC, June 2014.
- Agent-Based Modeling of User Circumvention of Security. Vijay Kothari, Jim Blythe, Ross Koppel, and Sean W. Smith. In Proceedings of the First International Workshop on Agents and CyberSecurity (ACySe), Paris, France, May 5, 2014.
- Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems. A. Hussain, T. Faber, R. Braden, T. Benzel, T. Yardley, J. Jones, D. Nicol, W. Sanders, T. Edgar, T. Carroll, D. Manz, and L. Tinnel. In Proceedings of the International Workshop on Cyber-Physical Systems Security (CPS-Sec), Marina del Rey, California, May 2014.
- Why Johnny Can't Blow The Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp. In Proceedings of the Workshop on Usable Security (USEC 2014), San Diego, CA, February 23, 2015.
2013
- Replay of Malicious Traffic in Network Testbeds. Alefiya Hussain, Yuri Pradkin and John Heidemann. In Proceedings of the 13th IEEE Conference on Technologies for Homeland Security (HST '13), Waltham, Massachusetts, November 12-14, 2013.
- In Quest of Benchmarking Security Risks to Cyber-Physical Systems. Saurabh Amin, Galina A. Schwartz, and Alefiya Hussain. In IEEE Network Magazine, pp. 19 - 24, January / February 2013.
- First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyber-Physical Systems. Ryan Goodfellow, Robert Braden, Terry Benzel, and David E. Bakken. In Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW '13), Oak Ridge, TN, January 8-10, 2013.
2012
- Reducing Allocation Errors in Network Testbeds. Jelena Mirkovic, Hao Shi, and Alefiya Hussain. In Proceedings of Internet Measurement Conference 2012 (IMC '12), Boston, Massachusetts, November 2012.
- The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation. Terry Benzel and John Wroclawski. Invited Paper in the Jornal of Information Processing, Vol. 20, No. 4, pp 824-834, October 2012.
- A Dual-Process Cognitive Model for Testing Resilient Control Systems. Jim Blythe. In Proceedings of the 5th International Symposium on Resilient Control Systems (ISRCS '12), Salt Lake City, Utah, August 2012.
- Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack. Anas Al Majali, Arun Viswanathan, and Clifford Neuman. 5th Workshop on Cyber Security Experimentation and Test (CSET) 2012, Bellevue, WA, August 2012.
- Beyond Disk Imaging for Preserving User State in Network Testbeds. Jelena Mirkovic, Abdulla Alwabel, and Ted Faber. In Proceedings of 5th Workshop on Cyber Security Experimentation and Test (CSET) 2012, Bellevue, WA, August 2012.
- Experience with Heterogenous Clock-Skew based Device Fingerprinting. Swati Sharma, Alefiya Hussain, and Huzur Saran. In Proceedings of ACM Workshop on Learning from Authoritative Security Experiment Results 2012 (LASER '12), Arlington, Virginia, July 2012.
- Implementing Mental Models. Jim Blythe and Jean Camp. In Proceedings of the IEEE CS Security and Privacy Workshops (SPW), San Francisco, Caifornia, May 2012.
- NCS Security Experimentation using DETER. Alefiya Hussain and Saurabh Amin. In Proceedings of Conference on High Confidence Networked Systems (HiCoNS) at CPSWeek (Cyber Physical Systems) 2012, Beijing, China, April 2012.
- Teaching Cybersecurity with DeterLab. Jelena Mirkovic and Terry Benzel. In Journal IEEE Security & Privacy, Volume 10, Issue 1, pp. 73-76, Jan. - Feb. 2012.
- Markov Model Based Experiment Comparison. Swati Sharma and Alefiya Hussain. In Proceedings of 4th International Conference on COMmunication Systems and NETworkS 2012 (COMSNET '12), Bangalore, India, January 2012. Best Poster Award
2011
- The Science of Cyber Security Experimentation: The DETER Project. Terry Benzel. In Proceedings of the Annual Computer Security Applications Conference (ACSAC) 2011, Orlando, Florida, December 2011.
- Multiresolution Semantic Visualization of Network Traffic. Alefiya Hussain and Arun Viswanathan. In Proceedings of Fifth IEEE International Conference on Semantic Computing 2011 (ICSC '11), Stanford University, Palo Alto, CA, September 19-21, 2011.
- Teaching Security with Network Testbeds. J. Mirkovic, M. Ryan, J. Hickey, K. Sklower, P. Reiher, P. A. H. Peterson, B. H. Kang, M. C. Chuah, D. Massey, and G. Ragusa. In Proceedings of the ACM SIGCOMM Education Workshop, Toronto, Ontario, Canada, August 15-19, 2011.
- A Semantic Framework for Data Analysis in Networked Systems. A Viswanathan, A. Hussain, J. Mirkovic, S. Schwab and J. Wroclawski. In Proceedings of 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, Massachusetts, March 30 - April 1, 2011.
2010
- The DETER Project: Advancing the Science of Cyber Security Experimentation and Test. J. Mirkovic, T. Benzel T. Faber, R. Braden, J. Wroclawski, and S. Schwab. In Proceedings of the IEEE International Conference on Technologies for Homeland Security (HST '10), Boston, Massachusetts, November 2010.
2009
- RAD: Reflector Attack Defense Using Message Authentication Codes. E. Kline, M. Beaumont-Gay, J. Mirkovic, and P. Reiher. In Proceedings of the 2009 Annual Computer Security Applications Conference, Honolulu, Hawaii, December 7-11, 2009.
- A Federated Experiment Environment for Emulab-based Testbeds. T. Faber and J. Wroclawski. In Proceedings of the 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2009), Washington DC, April 6-8, 2009.
- Tools for Worm Experimentation on the DETER Testbed. S. Wei, C. Ko, J. Mirkovic, and A. Hussain. In Proceedings of the 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2009), Washington DC, April 6-8, 2009.
- Current Developments in DETER Cybersecurity Testbed Technology. T. Benzel, B. Braden, T. Faber, J. Mirkovic, S. Schwab, K. Sollins, and J. Wroclawski. In Proceedings of the Cybersecurity Applications & Technology Conference for Homeland Security (CATCH 2009), Washington, DC, March 3-4, 2009.
- How to Test DoS Defenses. J. Mirkovic, S. Fahmy, P. Reiher, and R. Thomas. In Proceedings of the Cybersecurity Applications & Technology Conference for Homeland Security (CATCH 2009), Washington, DC, March 3-4, 2009.
2008
- A Two-Constraint Approach to Risky Cybersecurity Experiment Management. J. Wroclawski, J. Mirkovic, T. Faber and S. Schwab. Invited paper at the Sarnoff Symposium, April 2008.
- Access Control for Federation of Emulab-based Network Testbeds. Ted Faber and John Wroclawski. In Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET '08), San Jose, California, July 28, 2008.
- Experiment Isolation in a Secure Cluster Testbed. K. Lahey, R. Braden and K. Sklower. In Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET '08), San Jose, California, July 28, 2008.
- Managing the Health of Security Experiments. J. Mirkovic, K. Sollins, and J. Wroclawski. In Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET '08), San Jose, California, July 28, 2008.
2007
- Design, Deployment, and Use of the DETER Testbed. T. Benzel, R. Braden, D. Kim, A. Joseph, C. Neuman, R. Ostrenga, S. Schwab and K. Sklower. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007. [Slides.]
- A DETER Federation Architecture. Ted Faber, John Wroclawski and Kevin Lahey. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007.
- Emulating an Embedded Firewall. Clifford Neuman, Deepak Dayama and Arun Viswanathan. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007.
- A Plan for Malware Containment in the DETER Testbed. Ron Ostrenga, Stephen Schwab and Robert Braden. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007.
- SEER: A Security Experimentation EnviRonment for DETER. S. Schwab, B. Wilson, C. Ko and A. Hussain. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007.
- Very Large Scale Cooperative Experiments in Emulab-Derived Systems. Keith Sklower and Anthony D. Joseph. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007.
2006
- Identification of Repeated Denial of Service Attacks. Alefiya Hussain, John Heidemann, and Christos Papadopoulos. In Proceedings of 25th IEEE International Conference on Computer Communications 2006 (INFOCOM '06), Barcelona, Spain, April 23-29, 2006.
- Experience with DETER: A Testbed for Security Research. T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. In Proceedings of Tridentcom (International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities), March 2006.
2004
- Cyber Defense Technology Networking and Evaluation. R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S. Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R. Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, J. D. Tygar, S. Sastry, D. Sterne, and S. F. Wu. In Communications of the ACM, Special issue on Emerging Technologies for Homeland Security, Vol. 47, Issue 3, pp 58-61, March 2004.
2003
- A Framework for Classifying Denial of Service Attacks. Alefiya Hussain, John Heidemann, and Christos Papadopoulos. In Proceedings of ACM SIGCOMM - Data Communications Festival (SIGCOMM '03), Karlsruhe, Germany, August 25-29, 2003.
Invited Papers
- The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation. Terry Benzel and John Wroclawski. In Journal of Information Processing (JIP), Vol. 20, No. 4, pp 824-834, October 2012.
Other Publications
- Visualizing Multiple Levels and Dimensions of Social Network Properties. Cathleen McGrath, Jim Blythe, and David Krackhardt. In the Handbook of Human Centric Visualization, pp 513-525, Springer, 2014.
- Montage Topology Manager: Tools for Constructing and Sharing Representative Internet Topologies. A. Hussain, J. Chen. Technical Report ISI-TR-684, 9 pages, August 2012.
- Building Apparatus for Multi-resolution Networking Experiment Using Containers. DETER Team. Technical Report ISI-TR-683, 8 pages, 2011.