default search action
Phillip A. Porras
Person information
- affiliation: SRI International, Menlo Park, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Jinwoo Kim, Minjae Seo, Seungsoo Lee, Jaehyun Nam, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu, Seungwon Shin:
Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective. Comput. Networks 241: 110203 (2024) - [c67]Haohuang Wen, Prakhar Sharma, Vinod Yegneswaran, Phillip A. Porras, Ashish Gehani, Zhiqiang Lin:
6G-XSec: Explainable Edge Security for Emerging OpenRAN Architectures. HotNets 2024: 77-85 - [c66]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani, Zhiqiang Lin:
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service. NDSS 2024 - 2023
- [j19]Jinwoo Kim, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin, Taejune Park:
Extended data plane architecture for in-network security services in software-defined networks. Comput. Secur. 124: 102976 (2023) - [j18]Jaehyun Nam, Seungsoo Lee, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Secure Inter-Container Communications Using XDP/eBPF. IEEE/ACM Trans. Netw. 31(2): 934-947 (2023) - [c65]Kaiyu Hou, Dhiraj Saharia, Vinod Yegneswaran, Phillip A. Porras:
LANTERN: Layered Adaptive Network Telemetry Collection for Programmable Dataplanes. EuroP4@CoNEXT 2023: 1-7 - [c64]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
Thwarting Smartphone SMS Attacks at the Radio Interface Layer. NDSS 2023 - 2022
- [j17]Seungsoo Lee, Seungwon Woo, Jinwoo Kim, Jaehyun Nam, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
A Framework for Policy Inconsistency Detection in Software-Defined Networks. IEEE/ACM Trans. Netw. 30(3): 1410-1423 (2022) - [c63]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
A fine-grained telemetry stream for security services in 5G open radio access networks. EmergingWireless@CoNEXT 2022: 18-23 - 2021
- [j16]Hyeonseong Jo, Jinwoo Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
GapFinder: Finding Inconsistency of Security Information From Unstructured Text. IEEE Trans. Inf. Forensics Secur. 16: 86-99 (2021) - [j15]Jinwoo Kim, Jaehyun Nam, Suyeol Lee, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception. IEEE Trans. Inf. Forensics Secur. 16: 3138-3153 (2021) - [i2]Prakhar Sharma, Phillip A. Porras, Steven Cheung, James Carpenter, Vinod Yegneswaran:
Scalable Microservice Forensics and Stability Assessment Using Variational Autoencoders. CoRR abs/2104.13193 (2021) - 2020
- [j14]Seungsoo Lee, Jinwoo Kim, Seungwon Woo, Changhoon Yoon, Sandra Scott-Hayward, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
A comprehensive security assessment framework for software-defined networks. Comput. Secur. 91: 101720 (2020) - [j13]Heedo Kang, Vinod Yegneswaran, Shalini Ghosh, Phillip A. Porras, Seungwon Shin:
Automated Permission Model Generation for Securing SDN Control-Plane. IEEE Trans. Inf. Forensics Secur. 15: 1668-1682 (2020) - [c62]Seungsoo Lee, Seungwon Woo, Jinwoo Kim, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks. INFOCOM 2020: 1788-1797 - [c61]Jaehyun Nam, Seungsoo Lee, Hyunmin Seo, Phil Porras, Vinod Yegneswaran, Seungwon Shin:
BASTION: A Security Enforcement Network Stack for Container Networks. USENIX ATC 2020: 81-95 - [i1]Jianwei Huang, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
On the Privacy and Integrity Risks of Contact-Tracing Applications. CoRR abs/2012.03283 (2020)
2010 – 2019
- 2019
- [j12]Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Operator-Defined Reconfigurable Network OS for Software-Defined Networks. IEEE/ACM Trans. Netw. 27(3): 1206-1219 (2019) - [c60]Vasudevan Nagendra, Vinod Yegneswaran, Phillip A. Porras, Samir R. Das:
Coordinated dataflow protection for ultra-high bandwidth science networks. ACSAC 2019: 568-583 - [c59]Taejune Park, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin:
DPX: Data-Plane eXtensions for SDN Security Service Instantiation. DIMVA 2019: 415-437 - [c58]Rukman Senanayake, Phillip A. Porras, Jason Kaehler:
Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions. HCI (29) 2019: 339-352 - 2018
- [c57]Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Barista: An Event-centric NOS Composition Framework for Software-Defined Networks. INFOCOM 2018: 980-988 - [c56]Heedo Kang, Seungwon Shin, Vinod Yegneswaran, Shalini Ghosh, Phillip A. Porras:
AEGIS: An Automated Permission Generation and Verification System for SDNs. SecSoN@SIGCOMM 2018: 20-26 - 2017
- [j11]Changhoon Yoon, Seungsoo Lee, Heedo Kang, Taejune Park, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks. IEEE/ACM Trans. Netw. 25(6): 3514-3530 (2017) - [c55]Shalini Ghosh, Phillip A. Porras, Vinod Yegneswaran, Ken Nitz, Ariyam Das:
ATOL: A Framework for Automated Analysis and Categorization of the Darkweb Ecosystem. AAAI Workshops 2017 - [c54]Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska:
A Security-Mode for Carrier-Grade SDN Controllers. ACSAC 2017: 461-473 - [c53]Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Bridging the architectural gap between NOS design principles in software-defined networks. SoCC 2017: 637 - [c52]Seunghyeon Lee, Jinwoo Kim, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran:
Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks. DSN 2017: 249-260 - [c51]Vasudevan Nagendra, Vinod Yegneswaran, Phillip A. Porras:
Securing Ultra-High-Bandwidth Science DMZ Networks with Coordinated Situational Awareness. HotNets 2017: 22-28 - [c50]Shalini Ghosh, Ariyam Das, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani:
Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem. KDD 2017: 1793-1802 - [c49]Seungsoo Lee, Changhoon Yoon, Chanhee Lee, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras:
DELTA: A Security Assessment Framework for Software-Defined Networks. NDSS 2017 - 2016
- [j10]Hongyu Gao, Vinod Yegneswaran, Jian Jiang, Yan Chen, Phillip A. Porras, Shalini Ghosh, Hai-Xin Duan:
Reexamining DNS From a Global Recursive Resolver Perspective. IEEE/ACM Trans. Netw. 24(1): 43-57 (2016) - [c48]Xiang Pan, Vinod Yegneswaran, Yan Chen, Phillip A. Porras, Seungwon Shin:
HogMap: Using SDNs to Incentivize Collaborative Security Monitoring. SDN-NFV@CODASPY 2016: 7-12 - 2015
- [c47]Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip A. Porras, Venkat N. Venkatakrishnan, Vinod Yegneswaran:
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration. NDSS 2015 - [c46]Phillip A. Porras, Steven Cheung, Martin W. Fong, Keith Skinner, Vinod Yegneswaran:
Securing the Software Defined Network Control Layer. NDSS 2015 - 2014
- [c45]Seungwon Shin, YongJoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip A. Porras, Vinod Yegneswaran, Jiseong Noh, Brent ByungHoon Kang:
Rosemary: A Robust, Secure, and High-performance Network Operating System. CCS 2014: 78-89 - [c44]Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip A. Porras:
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. ESORICS (1) 2014: 163-182 - 2013
- [c43]Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. CCS 2013: 413-424 - [c42]Sooel Son, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Model checking invariant security properties in OpenFlow. ICC 2013: 1974-1979 - [c41]Andrew M. White, Srinivas Krishnan, Michael D. Bailey, Fabian Monrose, Phillip A. Porras:
Clear and Present Data: Opaque Traffic and its Security Implications for the Future. NDSS 2013 - [c40]Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson:
FRESCO: Modular Composable Security Services for Software-Defined Networks. NDSS 2013 - [c39]Hongyu Gao, Vinod Yegneswaran, Yan Chen, Phillip A. Porras, Shalini Ghosh, Jian Jiang, Hai-Xin Duan:
An empirical reexamination of global DNS behavior. SIGCOMM 2013: 267-278 - 2012
- [c38]Matthew Fredrikson, Richard Joiner, Somesh Jha, Thomas W. Reps, Phillip A. Porras, Hassen Saïdi, Vinod Yegneswaran:
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement. CAV 2012: 548-563 - [c37]Chao Yang, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Detecting money-stealing apps in alternative Android markets. CCS 2012: 1034-1036 - [c36]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. NDSS 2012 - [c35]David Fifield, Nate Hardison, Jonathan D. Ellithorpe, Emily Stark, Dan Boneh, Roger Dingledine, Phillip A. Porras:
Evading Censorship with Browser-Based Proxies. Privacy Enhancing Technologies 2012: 239-258 - [c34]Phillip A. Porras, Seungwon Shin, Vinod Yegneswaran, Martin W. Fong, Mabry Tyson, Guofei Gu:
A security enforcement kernel for OpenFlow networks. HotSDN@SIGCOMM 2012: 121-126 - [c33]Patrick Lincoln, Ian Mason, Phillip A. Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Allen Simpson, Paul Vixie, Dan Boneh:
Bootstrapping Communications into an Anti-Censorship System. FOCI 2012 - 2011
- [c32]Lakshmanan Nataraj, Vinod Yegneswaran, Phillip A. Porras, Jian Zhang:
A comparative assessment of malware classification using binary texture analysis and dynamic analysis. AISec 2011: 21-30 - [c31]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
Poster: a path-cutting approach to blocking XSS worms in social web networks. CCS 2011: 745-748 - 2010
- [j9]Jian Zhang, Phillip A. Porras, Johannes Ullrich:
Gaussian process learning for cyber-attack early warning. Stat. Anal. Data Min. 3(1): 56-68 (2010) - [c30]Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:
BLADE: an attack-agnostic approach for preventing drive-by malware infections. CCS 2010: 440-450 - [c29]Phillip A. Porras, Hassen Saïdi, Vinod Yegneswaran:
An Analysis of the iKee.B iPhone Botnet. MobiSec 2010: 141-152
2000 – 2009
- 2009
- [j8]Phillip A. Porras:
Inside risks - Reflections on Conficker. Commun. ACM 52(10): 23-24 (2009) - [j7]Phillip A. Porras:
Directions in Network-Based Security Monitoring. IEEE Secur. Priv. 7(1): 82-85 (2009) - [c28]Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, Jennifer Stoll, Wenke Lee:
Active Botnet Probing to Identify Obscure Command and Control Channels. ACSAC 2009: 241-253 - [c27]Phillip A. Porras, Hassen Saïdi:
A Foray into Conficker's Logic and Rendezvous Points. LEET 2009 - [c26]Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:
BLADE: Slashing the Invisible Channel of Drive-by Download Malware. RAID 2009: 350-352 - [c25]Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras:
ALICE@home: Distributed Framework for Detecting Malicious Sites. RAID 2009: 362-364 - 2008
- [j6]Jian Zhang, Phillip A. Porras, Johannes Ullrich:
Highly Predictive Blacklisting. login Usenix Mag. 33(6) (2008) - [c24]Monirul Islam Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee:
Eureka: A Framework for Enabling Static Malware Analysis. ESORICS 2008: 481-500 - [c23]Jian Zhang, Phillip A. Porras, Johannes Ullrich:
Gaussian Process Learning for Cyber-Attack Early Warning. SDM 2008: 255-264 - [c22]Jian Zhang, Phillip A. Porras, Johannes Ullrich:
Highly Predictive Blacklisting. USENIX Security Symposium 2008: 107-122 - 2007
- [c21]Raman Sharykin, Phillip A. Porras:
Applying Formal Evaluation to Worm Defense Design. IPCCC 2007: 479-486 - [c20]Dennis K. Nilsson, Phillip A. Porras, Erland Jonsson:
How to Secure Bluetooth-Based Pico Networks. SAFECOMP 2007: 209-223 - [c19]Guofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee:
Misleading and defeating importance-scanning malware propagation. SecureComm 2007: 250-259 - [c18]Jian Zhang, Phillip A. Porras, Johannes Ullrich:
A New Service for Increasing the Effectiveness of Network Address Blacklists. SRUTI 2007 - [c17]Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Wenke Lee:
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. USENIX Security Symposium 2007 - 2006
- [j5]Phillip A. Porras:
Privacy-Enabled Global Threat Monitoring. IEEE Secur. Priv. 4(6): 60-63 (2006) - [c16]Linda Briesemeister, Phillip A. Porras:
Automatically deducing propagation sequences that circumvent a collaborative worm defense. IPCCC 2006 - [c15]Phillip A. Porras, Vitaly Shmatikov:
Large-scale collection and sanitization of network security data: risks and challenges. NSPW 2006: 57-64 - 2005
- [c14]Linda Briesemeister, Phillip A. Porras:
Microscopic Simulation of a Group Defense Strategy. PADS 2005: 254-261 - 2004
- [j4]Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, Wes Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) - [c13]Patrick Lincoln, Phillip A. Porras, Vitaly Shmatikov:
Privacy-Preserving Sharing and Correlation of Security Alerts. USENIX Security Symposium 2004: 239-254 - [c12]Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting:
A hybrid quarantine defense. WORM 2004: 73-82 - 2003
- [c11]Linda Briesemeister, Patrick Lincoln, Phillip A. Porras:
Epidemic profiles and defense of scale-free networks. WORM 2003: 67-75 - 2002
- [c10]Livio Ricciulli, Phillip A. Porras, Patrick Lincoln, Pankaj Kakkar, Steven Dawson:
An Adaptable Network COntrol and Reporting System (ANCORS). DANCE 2002: 466-483 - [c9]Phillip A. Porras, Martin W. Fong, Alfonso Valdes:
A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. RAID 2002: 95-114 - 2001
- [c8]Ulf Lindqvist, Phillip A. Porras:
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris. ACSAC 2001: 240-251
1990 – 1999
- 1999
- [c7]Peter G. Neumann, Phillip A. Porras:
Experience with EMERALD to Date. Workshop on Intrusion Detection and Network Monitoring 1999: 73-80 - [c6]Livio Ricciulli, Phillip A. Porras:
An Adaptable Network COntrol and Reporting System (ANCORS). Integrated Network Management 1999: 401-414 - [c5]Ulf Lindqvist, Phillip A. Porras:
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). S&P 1999: 146-161 - 1998
- [c4]Phillip A. Porras, Alfonso Valdes:
Live Traffic Analysis of TCP/IP Gateways. NDSS 1998 - 1996
- [j3]Olin Sibert, Phillip A. Porras, Robert Lindell:
An Analysis of the Intel 80x86 Security Architecture and Implementations. IEEE Trans. Software Eng. 22(5): 283-293 (1996) - 1995
- [j2]Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras:
State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Trans. Software Eng. 21(3): 181-199 (1995) - [c3]Olin Sibert, Phillip A. Porras, Robert Lindell:
The Intel 80×86 processor architecture: pitfalls for secure systems. S&P 1995: 211-222 - 1992
- [c2]Phillip A. Porras, Richard A. Kemmerer:
Penetration state transition analysis: A rule-based intrusion detection approach. ACSAC 1992: 220-229 - 1991
- [j1]Richard A. Kemmerer, Phillip A. Porras:
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. IEEE Trans. Software Eng. 17(11): 1166-1185 (1991) - [c1]Phillip A. Porras, Richard A. Kemmerer:
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. S&P 1991: 36-51
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint