Enterprise data breach: causes, challenges, prevention, and future directions

L Cheng, F Liu, D Yao - Wiley Interdisciplinary Reviews: Data …, 2017 - Wiley Online Library
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …

Privacy-preserving detection of sensitive data exposure

X Shu, D Yao, E Bertino - IEEE transactions on information …, 2015 - ieeexplore.ieee.org
Statistics from security firms, research institutions and government organizations show that
the number of data-leak instances have grown rapidly in recent years. Among various data …

Method and system for determining whether domain names are legitimate or malicious

M Antonakakis, R Perdisci, D Dagon, W Lee - US Patent 9,516,058, 2016 - Google Patents
4,843,540 A 6, 1989 Stolfo 4,860,201 A 8, 1989 Stolfo et al. 5,363,473 A 11/1994 Stolfo et al.
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …

Method and system for detecting malicious domain names at an upper DNS hierarchy

M Antonakakis, R Perdisci, W Lee… - US Patent …, 2014 - Google Patents
7,277,961 7,331,060 7,372,809 7,383,577 7,424,619 7,426,576 7,448,084 7,483,947 7.487,
544 7,536,360 7,634,808 7,639,714 7,657,935 7,665,131 7,698.442 7,752,125 7,752,665 …

Mimesis Aegis: A Mimicry Privacy {Shield–A}{System's} Approach to Data Privacy on Public Cloud

B Lau, S Chung, C Song, Y Jang, W Lee… - 23rd usenix security …, 2014 - usenix.org
Users are increasingly storing, accessing, and exchanging data through public cloud
services such as those provided by Google, Facebook, Apple, and Microsoft. Although users …

Method and system for detecting malware

E Antonakakis, R Perdisci, W Lee… - US Patent 8,578,497, 2013 - Google Patents
A system and method of analysis. NX domain names are collected from an asset in a real
network. The NX domain names are domain names that are not registered. The real network …

Method and system for network-based detecting of malware from behavioral clustering

R Perdisci, W Lee, G Ollmann - US Patent 8,826,438, 2014 - Google Patents
(57) ABSTRACT A computerized system and method for performing behav ioral clustering of
malware samples, comprising: executing malware samples in a controlled computer …

Data leak detection as a service

X Shu, D Yao - International Conference on Security and Privacy in …, 2012 - Springer
We describe a network-based data-leak detection (DLD) technique, the main feature of
which is that the detection does not reveal the content of the sensitive data. Instead, only a …

Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels

AM Dunn, MZ Lee, S Jana, S Kim… - … USENIX Symposium on …, 2012 - usenix.org
Modern systems keep long memories. As we show in this paper, an adversary who gains
access to a Linux system, even one that implements secure deallocation, can recover the …