Security Research Group

Computer Science and Engineering
Michigan State University

Home | People | Publications | Videos | Contact

Select Publications*

  • Bajpai, Pranshu and Enbody, Richard. "Attacking Key Management in Ransomware." IEEE IT Professional 2020, https://doi.org/10.1109/MITP.2020.2977285.

  • Bajpai, Pranshu and Enbody, Richard. "An Empirical Study of API Calls in Ransomware." Proceedings of the 2020 IEEE International Conference on Electro Information Technology 2020, https://doi.org/10.1109/EIT48999.2020.9208284.

  • Bajpai, Pranshu, Richard Enbody, and Betty H. C. Cheng. "Ransomware Targeting Automobiles." Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security 2020, https://doi.org/10.1145/3375706.3380558.

  • Bajpai, Pranshu and Enbody, Richard. "Memory Forensics Against Ransomware." Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services 2020, https://doi.org/10.1109/CyberSecurity49315.2020.9138853.

  • Bajpai, Pranshu and Enbody, Richard. "Towards Effective Identification and Rating of Automotive Vulnerabilities." Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security 2020, https://doi.org/10.1145/3375706.3380556.

  • Bajpai, Pranshu and Enbody, Richard. "An Empirical Study of Key Generation in Cryptographic Ransomware." Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services 2020, https://doi.org/10.1109/CyberSecurity49315.2020.9138878.

  • Bajpai, Pranshu, and Richard Enbody. “Dissecting .NET Ransomware: Key Generation, Encryption and Operation.” Network Security 2020, no. 2 (February 2020): 8–14. https://doi.org/10.1016/S1353-4858(20)30020-9.

  • Bajpai, Pranshu, Tyler Olsen, Seth Edgar, Rob McCurdy, and Richard Enbody. “BATSense: Anomalous Security Event Detection Using TBATS Machine Learning.” In 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 1–8. Oxford, United Kingdom: IEEE, 2019. https://doi.org/10.1109/CyberSecPODS.2019.8885079.

  • Bajpai, Pranshu, Aditya K. Sood, and Richard Enbody. “A Key-Management-Based Taxonomy for Ransomware.” In 2018 APWG Symposium on Electronic Crime Research (ECrime), 1–12. San Diego, CA: IEEE, 2018. https://doi.org/10.1109/ECRIME.2018.8376213.

  • Bajpai, Pranshu, Aditya K Sood, and Richard J Enbody. “The Art of Mapping IoT Devices in Networks.” Network Security 2018, no. 4 (April 2018): 8–15. https://doi.org/10.1016/S1353-4858(18)30033-3.

  • Sood, A. K., Pranshu Bajpai, and Richard Enbody. “Evidential Study of Ransomware: Cryptoviral Infections and Countermeasures.” ISACA Journal 5, no. 2018 (October 26, 2018).

  • DeMott, J. D., Enbody, R. J., & Punch, W. F. (2011). Towards an automatic exploit pipeline. In 2011 International Conference for Internet Technology and Secured Transactions (pp. 323329).

  • DeMott, J. D., Enbody, R. J., & Punch, W. F. (2013). Systematic bug finding and fault localization enhanced with input data tracking. Computers & Security, 32, 130157. https://doi.org/10.1016/j.cose.2012.09.015.

  • Piromsopa, K., & Enbody, R. (2011). Survey of Protections from Buffer-Overflow Attacks. Engineering Journal, 15(2), 3152. https://doi.org/10.4186/ej.2011.15.2.31.

  • Piromsopa, K., & Enbody, R. J. (2006a). Arbitrary Copy: Bypassing Buffer-Overflow Protections. In 2006 IEEE International Conference on Electro/Information Technology (pp. 580584). https://doi.org/10.1109/EIT.2006.252213.

  • Piromsopa, K., & Enbody, R. J. (2006b). Buffer-Overflow Protection: The Theory. In 2006 IEEE International Conference on Electro/Information Technology (pp. 454458). https://doi.org/10.1109/EIT.2006.252128.

  • Piromsopa, K., & Enbody, R. J. (2006c). Secure Bit: Transparent, Hardware Buffer-Overflow Protection. IEEE Transactions on Dependable and Secure Computing, 3(4), 365376. https://doi.org/10.1109/TDSC.2006.56.

  • Sood, A., & Enbody, R. (2011). The state of HTTP declarative security in online banking websites. Computer Fraud & Security, 2011(7), 1116. https://doi.org/10.1016/S1361-3723(11)70073-2.

  • Sood, A. K., Bansal, R., & Enbody, R. J. (2013). Cybercrime: Dissecting the State of Underground Enterprise. IEEE Internet Computing, 17(1), 6068. https://doi.org/10.1109/MIC.2012.61.

  • Sood, A. K., & Enbody, R. J. (2011). Malvertising exploiting web advertising. Computer Fraud & Security, 2011(4), 1116. https://doi.org/10.1016/S1361-3723(11)70041-0.

  • Sood, A. K., & Enbody, R. J. (2013). Crimeware-as-a-service A survey of commoditized crimeware in the underground market. International Journal of Critical Infrastructure Protection, 6(1), 2838. https://doi.org/10.1016/j.ijcip.2013.01.002.

  • Sood, A. K., & Enbody, R. J. (2013). Targeted Cyberattacks: A Superset of Advanced Persistent Threats. IEEE Security Privacy, 11(1), 5461. https://doi.org/10.1109/MSP.2012.90.

  • Sood, A. K., Enbody, R. J., & Bansal, R. (2013). Dissecting SpyEye Understanding the design of third generation botnets. Computer Networks, 57(2), 436450. https://doi.org/10.1016/j.comnet.2012.06.021.

  • Sood, A. K., Zeadally, S., & Enbody, R. J. (2016). An Empirical Study of HTTP-based Financial Botnets. IEEE Transactions on Dependable and Secure Computing, 13(2), 236251. https://doi.org/10.1109/TDSC.2014.2382590.


*For a complete list of publications, please visit individual profiles of our members.