Birhanu Eshete
Birhanu Eshete
Assistant Professor, Computer Science, University of Michigan, Dearborn
Geverifieerd e-mailadres voor umich.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Holmes: real-time apt detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019
1072019
Binspect: Holistic analysis and detection of malicious web pages
B Eshete, A Villafiorita, K Weldemariam
International conference on security and privacy in communication systems …, 2012
832012
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 487-504, 2017
592017
Webwinnow: Leveraging exploit kit workflows to detect malicious urls
B Eshete, VN Venkatakrishnan
Proceedings of the 4th ACM conference on Data and application security and …, 2014
482014
Early detection of security misconfiguration vulnerabilities in web applications
B Eshete, A Villafiorita, K Weldemariam
2011 Sixth International Conference on Availability, Reliability and …, 2011
352011
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.
B Eshete, A Alhuzali, M Monshizadeh, PA Porras, VN Venkatakrishnan, ...
NDSS, 2015
272015
Effective analysis, characterization, and detection of malicious web pages
B Eshete
Proceedings of the 22nd International Conference on World Wide Web, 355-360, 2013
252013
Malicious Website Detection: Effectiveness and Efficiency Issues
B Eshete, A Villafiorita, K Weldemariam, FB Kessler
Proceedings of SysSec Workshop (SysSec), 2011, 123 - 126, 2011
242011
Host-based anomaly detection for pervasive medical systems
B Asfaw, D Bekele, B Eshete, A Villafiorita, K Weldemariam
2010 Fifth International Conference on Risks and Security of Internet and …, 2010
242010
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting
SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
222019
{NAVEX}: Precise and scalable exploit generation for dynamic web applications
A Alhuzali, R Gjomemo, B Eshete, VN Venkatakrishnan
27th {USENIX} Security Symposium ({USENIX} Security 18), 377-392, 2018
212018
Chainsaw: Chained Automated Workflow-based Exploit Generation
A Alhuzali, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
192016
Einspect: Evolution-guided analysis and detection of malicious web pages
B Eshete, A Villafiorita, K Weldemariam, M Zulkernine
2013 IEEE 37th Annual Computer Software and Applications Conference, 375-380, 2013
182013
Confeagle: Automated analysis of configuration vulnerabilities in web applications
B Eshete, A Villafiorita, K Weldemariam, M Zulkernine
2013 IEEE 7th International Conference on Software Security and Reliability …, 2013
122013
Propatrol: Attack investigation via extracted high-level tasks
SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
International Conference on Information Systems Security, 107-126, 2018
112018
ICT for good: Opportunities, challenges and the way forward
B Eshete, A Mattioli, A Villafiorita, K Weldemariam
2010 Fourth International Conference on Digital Society, 14-19, 2010
112010
Measuring the Impact of Different Metrics on Software Quality: a Case Study in the Open Source Domain
V Sartori, B Eshete, A Villafiorita
Proceedings of the Fifth International Conference on Digital Society, 2011
62011
Attack analysis results for adversarial engagement 1 of the darpa transparent computing program
B Eshete, R Gjomemo, MN Hossain, S Momeni, R Sekar, S Stoller, ...
arXiv preprint arXiv:1610.06936, 2016
52016
Effective Analysis, Characterization, and Detection of Malicious Activities on the Web.
B Eshete
University of Trento, Italy, 2013
42013
Context Information Refinement for Pervasive Medical Systems
BM Eshete
Addis Ababa University, 2007
32007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20