Publications

Back to Home

  • Method and System for Identifying at Least One of Undesirable Network Traffic, Computer Programs, and Computer Files, US Patent number 20090158430 pending.
  • Method, System, and Computer Program Product for Detecting Security Threats in a Computer Network, US Patent number 20070094725 pending.
  • Kevin Borders, Protecting Confidential Information from Malicious Software. Ph. D. Thesis, May 2009. [pdf]
  • Eric Vander Weele, Billy Lau, and Atul Prakash, Protecting Confidential Data on Personal Computers with Storage Capsules. Proceedings of the 18th USENIX Security Symposium, Aug. 2009. [pdf]
  • Kevin Borders and Atul Prakash, Quantifying Information Leaks in Outbound Web Traffic. Proceedings of the IEEE Symposium on Security and Privacy, May 2009. [pdf]
  • Xin Zhao, Kevin Borders, and Atul Prakash, Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers. Proceedings of the AVM/IFIP/USENIX 9th International Middleware Conference, Dec. 2008. [pdf]
  • Garett Brown, Travis Howe, Micheal Ihbe, Atul Prakash, and Kevin Borders, Social Networks and Context-Aware Spam. Proceedings of the ACM 2008 Conference on Computer Supported Cooperative Work, Nov. 2008. [pdf]
  • Kevin Borders and Atul Prakash, Towards Quantification of Network-Based Information Leaks via HTTP. Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HOTSEC '08), Jul. 2008. [pdf]
  • Laura Falk, Atul Prakash, and Kevin Borders, Analyzing Websites for User-Visible Security Design Flaws. Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Jul. 2008. [pdf]
  • Kevin Borders, Atul Prakash, and Mark Zielinski, Spector: Automatically Analyzing Shell Code. Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC '07), Dec. 2007. [pdf]
  • Kevin Borders and Atul Prakash, Securing Network Input via a Trusted Input Proxy. Proceedings of the 2nd USENIX Workshop on Hot Topics in Security (HOTSEC '07), Aug. 2007. [pdf]
  • Kevin Borders, Xin Zhao, and Atul Prakash, Securing Sensitive Content in a View-Only File System. Proceedings of the 6th ACM Workshop on Digital Rights Management, Oct. 2006. [pdf]
  • Kevin Borders, Xin Zhao, and Atul Prakash, Virtual Machine Security Systems. Book Chapter To Appear in Advances in Computer Science and Engineering.
  • Patrick Traynor, Kevin Butler, William Enck, Kevin Borders, and Patrick McDaniel, Malnets: Large-Scale Malicious Networks via Compromised Wireless Access Points. Technical Report NAS-TR-0048-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, Sept. 2006.
  • Xin Zhao, Atul Prakash, Brian Noble, and Kevin Borders, Improving Distributed File System Performance in Virtual Machine Environments. University of Michigan Technical Report CSE-TR-526-06, Sept. 2006. [pdf]
  • Kevin Borders, Laura Falk, Atul Prakash, OpenFire: Opening Networks to Reduce Network Attacks on Legitimate Services. University of Michigan Technical Report CSE-TR-517-06, May 2006. [pdf]
  • Kevin Borders, Xin Zhao, and Atul Prakash, Siren: Catching Evasive Malware (Short Paper). Proceedings of the IEEE Symposium on Security and Privacy, May 2006. [pdf]
  • Xin Zhao, Kevin Borders, and Atul Prakash, Towards protecting sensitive Files in a compromised system. Proceedings of 3rd International IEEE Security in Storage Workshop, Dec. 2005. [pdf]
  • Xin Zhao, Kevin Borders, and Atul Prakash, Svgrid: A secure virtual environment for untrusted grid applications. Proceedings of the 6th International ACM/IFIP/USENIX Middleware Conference, Dec. 2005. [pdf]
  • Kevin Borders, Xin Zhao, and Atul Prakash, CPOL: High-Performance Policy Evaluation. Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), Nov. 2005. [pdf]
  • Kevin Borders and Atul Prakash, Web Tap: Detecting Covert Web Traffic. Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), Oct. 2004. [pdf]