Security Research Group

Computer Science and Engineering
Michigan State University
Home | People | Publications | Contact

Select Publications*

Bajpai, P., Sood, A. K., & Enbody, R. J. (2018). The art of mapping IoT devices in networks. Network Security, 2018(4), 815. https://doi.org/10.1016/S1353-4858(18)30033-3
DeMott, J. D., Enbody, R. J., & Punch, W. F. (2011). Towards an automatic exploit pipeline. In 2011 International Conference for Internet Technology and Secured Transactions (pp. 323329).
DeMott, J. D., Enbody, R. J., & Punch, W. F. (2013). Systematic bug finding and fault localization enhanced with input data tracking. Computers & Security, 32, 130157. https://doi.org/10.1016/j.cose.2012.09.015
Piromsopa, K., & Enbody, R. (2011). Survey of Protections from Buffer-Overflow Attacks. Engineering Journal, 15(2), 3152. https://doi.org/10.4186/ej.2011.15.2.31
Piromsopa, K., & Enbody, R. J. (2006a). Arbitrary Copy: Bypassing Buffer-Overflow Protections. In 2006 IEEE International Conference on Electro/Information Technology (pp. 580584). https://doi.org/10.1109/EIT.2006.252213
Piromsopa, K., & Enbody, R. J. (2006b). Buffer-Overflow Protection: The Theory. In 2006 IEEE International Conference on Electro/Information Technology (pp. 454458). https://doi.org/10.1109/EIT.2006.252128
Piromsopa, K., & Enbody, R. J. (2006c). Secure Bit: Transparent, Hardware Buffer-Overflow Protection. IEEE Transactions on Dependable and Secure Computing, 3(4), 365376. https://doi.org/10.1109/TDSC.2006.56
Sood, A., & Enbody, R. (2011). The state of HTTP declarative security in online banking websites. Computer Fraud & Security, 2011(7), 1116. https://doi.org/10.1016/S1361-3723(11)70073-2
Sood, A. K., Bansal, R., & Enbody, R. J. (2013). Cybercrime: Dissecting the State of Underground Enterprise. IEEE Internet Computing, 17(1), 6068. https://doi.org/10.1109/MIC.2012.61
Sood, A. K., & Enbody, R. J. (2011). Malvertising exploiting web advertising. Computer Fraud & Security, 2011(4), 1116. https://doi.org/10.1016/S1361-3723(11)70041-0
Sood, A. K., & Enbody, R. J. (2013). Crimeware-as-a-service A survey of commoditized crimeware in the underground market. International Journal of Critical Infrastructure Protection, 6(1), 2838. https://doi.org/10.1016/j.ijcip.2013.01.002
Sood, A. K., & Enbody, R. J. (2013). Targeted Cyberattacks: A Superset of Advanced Persistent Threats. IEEE Security Privacy, 11(1), 5461. https://doi.org/10.1109/MSP.2012.90
Sood, A. K., Enbody, R. J., & Bansal, R. (2013). Dissecting SpyEye Understanding the design of third generation botnets. Computer Networks, 57(2), 436450. https://doi.org/10.1016/j.comnet.2012.06.021
Sood, A. K., Zeadally, S., & Enbody, R. J. (2016). An Empirical Study of HTTP-based Financial Botnets. IEEE Transactions on Dependable and Secure Computing, 13(2), 236251. https://doi.org/10.1109/TDSC.2014.2382590


*For a complete list of publications, please visit individual profiles of our members.