(This page contains the preprint versions of the articles. The articles are limited to personal use only. You may find the official versions and the copyright notices from the publishers' websites.)

[2024]

[38] "CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters", Mahmood GholipourChoubeh, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Boubakr Nour and Makan Pourzandi, Proc. the 14th ACM Conference on Data and Application Security and Privacy (CODASPY 2024), Porto, Portugal, June 19 - 21, 2024, Accepted.

[PDF]
[Bibtex]

[37] "Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences", Hugo Kermabon-Bobinnec, Yosr Jarraya, Lingyu Wang, Suryadipta Majumdar and Makan Pourzandi, Proc. the Network and Distributed System Security Symposium (NDSS 2024), San Diego, USA, February 26 - March 1, 2024, Accepted.

[PDF]
[Bibtex]

[2023]

[36] "iCAT+: An Interactive Customizable Anonymization Tool using Automated Translation through Deep Learning", Momen Oqaily, Mohammad Ekramul Kabir, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, and Mourad Debbabi, IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted.

[PDF]
[Bibtex]

[35] "Caught-in-Translation (CiT): Detecting Cross-level Inconsistency Attacks in Network Functions Virtualization (NFV)", Sudershan Lakshmanan, Mengyuan Zhang, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted.

[PDF]
[Bibtex]

[34] "Warping the Defence Timeline: Non-disruptive Proactive Attack Mitigation for Kubernetes Clusters", Sima Bagheri, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Makan Pourzandi, Proc. the IEEE International Conference on Communications (ICC 2023), Rome, Italy, 28 May - 01 June, 2023, Accepted.

[PDF]
[Bibtex]

[33] "A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds", Momen Oqaily, Suryadipta Majumdar, Lingyu Wang, Mohammad Ekramul Kabir, Yosr Jarraya, A S M Asadujjaman, Makan Pourzandi, Mourad Debbabi, Proc. the 13th ACM Conference on Data and Application Security and Privacy (CODASPY 2023), Charlotte, NC, USA, April 24 - 26, 2023, Accepted.

[PDF]
[Bibtex]

[2022]

[32] "VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack", Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi and Lingyu Wang, Proc. the 27th Nordic Conference on Secure IT Systems (NordSec 2022), Iceland, November 30 - December 2, Accepted.

[PDF]
[Bibtex]

[31] "5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions", A S M Asadujjaman, Mohammad Ekramul Kabir, Hinddeep Purohit, Suryadipta Majumdar, Lingyu Wang, Yosr Jarraya and Makan Pourzandi, In 13th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2022), IEEE, Bangkok, Thailand, December 13 - 16, Accepted.

[PDF]
[Bibtex]

[30] "MLFM: Machine Learning Meets Formal Method for Efficient Security Verification in Network Functions Virtualization (NFV)", Alaa Oqaily, Yosr Jarraya, Lingyu Wang, Makan Pourzandi, Suryadipta Majumdar, Proc. the 27th European Symposium on Research in Computer Security (ESORICS 2022), Copenhagen, Denmark, September 26 - 30, 2022, Accepted.

[PDF]
[Bibtex]

[29] "ProSPEC: Proactive Security Policy Enforcement for Containers", Hugo Kermabon-Bobinnec, Mahmood Gholipourchoubeh, Sima Bagheri, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi and Lingyu Wang, Proc. the 12th ACM Conference on Data and Application Security and Privacy (CODASPY 2022), Baltimore-Washington DC Area, USA, April 24 - 26, 2022, Accepted.

[PDF]
[Bibtex]
[Video]

[2021]

[28] "ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Function Virtualization (NFV)", Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Mengyuan Zhang and Lingyu Wang, Proc. the Network and Distributed System Security Symposium (NDSS 2022), San Diego, USA, February 27 - March 3, 2022, Accepted.

[PDF]
[Bibtex]

[27] "Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains", A S M Asadujjaman, Momen Oqaily, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. The 9th IEEE Conference on Communications and Network Security (CNS 2021), Virtual Conference, October 4 - 6, 2021, Accepted.

[PDF]
[Bibtex]

[26] "A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing", Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya and Yuan Hong, IEEE Transactions on Knowledge and Data Engineering (TKDE), Accepted.

[PDF]
[Bibtex]

[25] “ProSAS: Proactive Security Auditing System for Clouds”, Suryadipta Majumdar, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted.

[PDF]
[Bibtex]

[2020]

[24] “A Multi-view Approach to Preserve Both Privacy and Utility in Network Trace Anonymization”, Meisam Mohammady, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi, ACM Transactions on Privacy and Security (TOPS), Accepted.

[PDF]
[Bibtex]

[23] “VMGuard: State-based Proactive Verification of Virtual Network Isolation with Application to NFV”, Gagandeep Singh Chawla, Mengyuan Zhang, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted.

[PDF]
[Bibtex]

[22] “NFVGuard : Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack”, Alaa Oqaily, Sudershan Lakshmanan Thirunavukkarasu, Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. The 12th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2020), Bangkok, Thailand, December 14 - 17, 2020.

[PDF]
[Bibtex]

[21] “R^2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions”, Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi and Mourad Debbabi, in Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS 2020), November 9-13, 2020, Orlando, USA, Accepted.

[PDF]
[Bibtex]

[20] "Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack", Azadeh Tabiban, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. The 8th IEEE Conference on Communications and Network Security (CNS 2020), Avignon, France, June 29 - July 1, 2020, Accepted.

[PDF]
[Bibtex]

[2019]

[19] “SegGuard: Segmentation-based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing”, Momen Oqaily, Yosr Jarraya, Meisam Mohammady, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, IEEE Trans. on Dependable and Secure Computing (TDSC 2019), Accepted.

[PDF]
[Bibtex]

[18] “Cloud Security Auditing”, Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Springer, 2019, ISBN 978-3-030-23127-9.

[PDF]
[Bibtex]

[17] "Modeling NFV Deployment to Identify the Cross-level Inconsistency Vulnerabilities", Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi and Mourad Debbabi, Proc. The 11th IEEE International Conference and on Cloud Computing Technology and Science (CloudCom 2019), Sydney, Australia, December 11-13, 2019, Accepted.

[PDF]
[Bibtex]

[16] "Multi-Level Proactive Security Auditing for Cloud", Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. the IEEE Conference on Dependable and Secure Computing (DSC 2019), Hangzhou, China, November 18-20, 2019.

[PDF]
[Bibtex]

[15] "Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement", Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, 24th European Symposium on Research in Computer Security (ESORICS 2019), Luxembourg, September 23-27, 2019.

[PDF]
[Bibtex]

[14] "iCAT: An Interactive Customizable Anonymization Tool", Momen Oqaily,Yosr Jarraya, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi and Mourad Debbabi, 24th European Symposium on Research in Computer Security (ESORICS 2019), Luxembourg, September 23-27, 2019.

[PDF]
[Bibtex]

[2018]

[13] "Learning Probabilistic Dependencies among Events for Proactive Security Auditing in Clouds", Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Journal of Computer Security (Special Issue on ESORICS'17).

[PDF]
[Bibtex]

[12] "Cloud Security Auditing: Major Approaches and Existing Challenges", Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. the 11th International Symposium on Foundations & Practice of Security (FPS 2018), Montreal, Canada, November 13-15, 2018.

[PDF]
[Bibtex]

[11] "QuantiC: Distance Metrics for Evaluating Multi-tenancy Threats in Software Defined Networking (SDN)-Based Cloud", Taous Madi, Mengyuan Zhang, Yosr Jarrya, Amir Alimohammadifar, Makan Pourzandi,Lingyu Wang, Mourad Debbabi, 10th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2018).

[PDF]
[Bibtex]

[10] "ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack", Taous Madi, Amir Alimohammadifar, Yosr Jarraya, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, ACM Transactions on Privacy and Security (TOPS), Accepted.

[PDF]
[Bibtex]

[9] "Preserving Both Privacy and Utility in Network Trace Anonymization", Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi, Proc. the 25th ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 15-19, 2018, Accepted.

[PDF]
[Bibtex]

[8] "Stealthy Probing-based Verification (SPV): An Active Approach to Defending Software Defined Networks against Topology Poisoning Attacks", Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. the 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, September 3-7, 2018, Accepted.

[PDF]
[Bibtex]

[7] "PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds", Azadeh Tabiban, Suryadipta Majumdar, Lingyu Wang and Mourad Debbabi, Proc. the 4th IEEE Workshop on Security and Privacy in the Cloud (SPC 2018), Beijing, China, May 30-June 1, 2018, Accepted.

[PDF]
[Bibtex]

[6] "User-Level Runtime Security Auditing for the Cloud", Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 13, No. 5, May 2018, Accepted.

[PDF]
[Bibtex]

[2017]

[5] "LeaPS: Learning-Based Proactive Security Auditing for Clouds", Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. the 22nd European Symposium on Research in Computer Security (ESORICS 2017), Oslo, Norway, September 11-13, 2017, Accepted.

[PDF]
[Bibtex]

[4] "TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation", Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. the Network and Distributed System Security Symposium (NDSS 2017), San Diego, USA, February 26 - March 1, 2017, Accepted.

[PDF]
[Bibtex]

[2016]

[3] "Proactive Verification of Security Compliance for Clouds through Pre-Computation: Application to OpenStack", Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. the 21st European Symposium on Research in Computer Security (ESORICS 2016), Heraklion, Greece, September 26-30, 2016, Accepted.

[PDF]
[Bibtex]

[2] "Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack", Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. The 6TH ACM Conference on Data and Application Security and Privacy (CODASPY 2016), New Orleans, USA, March 09-11, 2016, Accepted.

[PDF]
[Bibtex]

[2015]

[1] "Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack", Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Proc. The 7th IEEE International Conference and on Cloud Computing Technology and Science (CloudCom 2015), Vancouver, Canada, November 30-December 3, 2015, Accepted.

[PDF]
[Bibtex]