Suivre
Frederico Araujo
Frederico Araujo
IBM Research
Adresse e-mail validée de ibm.com - Page d'accueil
Titre
Citée par
Citée par
Année
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation
F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser
21st ACM Conference on Computer and Communications Security (CCS’14), 2014
1562014
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
832018
Filesystem view separation for data confidentiality and integrity using lattice-based security domains
F Araujo, MP Stoecklin, TP Taylor
US Patent 11,562,086, 2023
382023
DIVAs 4.0: A multi-agent based simulation framework
M Al-Zinati, F Araujo, D Kuiper, J Valente, RZ Wenkstern
2013 IEEE/ACM 17th International Symposium on Distributed Simulation and …, 2013
352013
Defending against model inversion attacks on neural networks
F Araujo, J Zhang, T Taylor, MP Stoecklin
US Patent 10,733,292, 2020
302020
Unsupervised Deep Embedding for Novel Class Detection over Data Stream
A Mustafa, G Ayoade, K Al-Naami, L Khan, K Hamlen, B Thuraisingham, ...
Proceedings of the IEEE International Conference on BigData, 2017
292017
Compiler-instrumented, Dynamic {Secret-Redaction} of Legacy Processes for Attacker Deception
F Araujo, W Kevin
24th USENIX Security Symposium (USENIX Security 15), 145-159, 2015
272015
Cyber-deception using network port projection
F Araujo, DL Schales, MP Stoecklin, TP Taylor
US Patent 10,979,453, 2021
262021
Intrusion detection in micro-services through container telemetry and behavior modeling
F Araujo, TP Taylor, J Jang, W Blair
US Patent 11,748,473, 2023
222023
Improving cybersecurity hygiene through JIT patching
F Araujo, T Taylor
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
222020
Detecting adversarial attacks through decoy training
J Zhang, F Araujo, T Taylor, MP Stoecklin
US Patent 11,501,156, 2022
212022
Experiences with Honey-Patching in Active Cyber Security Education
F Araujo, M Shapouri, S Pandey, KW Hamlen
8th Workshop on Cyber Security Experimentation and Test, 2015
212015
Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views
F Araujo, AE Kohlbrenner, MP Stoecklin, TP Taylor
US Patent 11,775,638, 2023
202023
Application-level sandboxing
F Araujo, DL Schales, MP Stoecklin, TP Taylor
US Patent 10,887,346, 2021
192021
On-demand injection of software booby traps in live processes
F Araujo, DL Schales, MP Stoecklin, TP Taylor
US Patent 10,498,763, 2019
192019
Automated synthesis of reference policies for runtime microservice protection
F Araujo, W Blair, TP Taylor
US Patent App. 17/390,881, 2023
172023
Automating Cyberdeception Evaluation with Deep Learning.
G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan
HICSS 3, 1-10, 2020
172020
Iterative constraint solving in abstract graph matching for cyber incident reasoning
X Shu, DL Schales, MP Stoecklin, F Araujo
US Patent 11,941,054, 2024
162024
Improving intrusion detectors by crook-sourcing
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
152019
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses
X Lin, F Araujo, T Taylor, J Jang, J Polakis
2023 IEEE Symposium on Security and Privacy (SP), 987-1004, 2023
112023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20