Stephanie Forrest
CyberBio—Computer Security and Data Privacy Publications
- Strategic aspects of cyber attack, attribution, and blame
B. Edwards, A. Furnas, S. Forrest, and
R. Axelrod. Proc. Nat. Acad. Sci (PNAS), Early edition
(Feb. 2017).
- Hype and heavy tails: Analyzing ten years of data breaches B. Edwards,
S. Hofmeyr, and S. Forrest Journal of Cybersecurity 2(1):3–14 (2016) doi: 10.1093/cybsec/tyw003 (Updated and expanded revision of WEIS 2015 conference paper)
- Hype and heavy tails: A closer look at data breaches B. Edwards,
S. Hofmeyr, and S. Forrest. Workshop on the Economics of Information
Security (WEIS), 2015 (Best Paper Award).
- Repairing COTS Router Firmware without Access to Source Code or Test Suites: A Case Study in Evolutionary Software Repair E. Schulte,
W. Weimer, and S. Forrest The First International Genetic
Improvement Workshop, 2015 (to appear).
- Implications of Security Enhancements and Interventions for Core Internet Infrastructure S. Goldberg and S. Forrest The 42nd Research
Conference on Communication, Information and Internet Policy (TPRC, 2014).
- Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions B. Edwards, T. Moore, G. Stelle, S. Hofmeyr and
S. Forrest New Security Paradignms Workshop (NSPW'12).
- Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data M. Groat, B. Edwards, J. Horey, W. He, and
S. Forrest. Pervasive Computing (PERCOM) 2012.
- Modeling Internet-scale policies for cleaning up malware
S. Hofmeyr, T. Moore, S. Forrest, B. Edwards and G. Stelle. Tenth Workshop on Economics of Information Security (WEIS)
(2011).
- Kipda: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks M. Groat, W. He, and S. Forrest. INFOCOM (2011).
- The evolution of system-call monitoring Forrest, S. Hofmeyr, and
A. Somayaji. Proc. of the 2008 Annual Computer Security Applications Conference (ACSAC '08). IEEE Computer Society
pp. 418-430. Invited paper for classic papers session (2008).
- Negative ternary set sharing E. Trias, J. Navas, E. Ackley,
S. Forrest, and M. Hermenegildo. Proc. of the International Conference on Logic Programming (ILCP) Springer Lecture Notes in
Computer Science, Berlin / Heidelberg pp. 301-316 (2008).
- Two efficient representations for set-sharing analysis in logic programs E. Trias, J. Navas, E. Ackley, S. Forrest, and
M. Hermenegildo. Proc. of the 17th International Workshop on Functional and (Constraint) Logic Programming Electronic Notes in
Theoretical Computer Science www.elsevier.nl/locate/entcs (2008).
- The ecology of modern malware J.R. Crandall, R. Ensafi, S. Forrest,
J. Ladau, and B. Shebaro. /Proc. of the New Security Paradigms
Workshop (NSPW) / Olympic Valley, CA (2008).
- Autonomous security for autonomous systems J. Karlin, J. Rexford,
and S. Forrest. Computer Networks 52:2908-2923 (2008).
- Negative representations of information F. Esponda, S. Forrest, and
P. Helman. International Journal of Information Security. 8:2
(2009).
- Scaling theory for information networks M. Moses, S. Forrest,
A. L. Davis, M. Lodder, and J. H. Brown. Journal of the Royal Society Interface 5:20, pp. 1391-1510 (2008). Preprint.
- Anonymous data collection in sensor networks J. Horey, M. Groat,
S. Forrest, and F. Esponda. /The 4th Annual International Conference
on Mobile and Ubiquitous Systems: Computing, Networking and
Services./ (2007)
- Protecting Data Privacy through Hard-to-Reverse Negative Databases
F. Esponda, E.S. Ackley, P. Helman, H. Jia, and
S. Forrest. Int. Journal of Information Security 6:6 (2007).
- A Relational Algebra for Negative Databases F. Esponda, E. Trias,
E. Ackley, S. Forrest. UNM Computer Science Tech Report
TR-CS-2007-18.
- Protecting BGP from Invalid Paths J. Karlin, S. Forrest, J. Rexford.
UNM Computer Science Tech Report TR-CS-2007-12.
- Radial Structure of the Internet P. Holme, J. Karlin, S. Forrest./
Proceedings of the Royal Society A: Mathematical, Physical and
Engineering Sciences/ 463:1231-1246 (2007). Preprint.
- Learning DFA representations of HTTP for protecting web applications
K. Ingham, A. Somayaji, S. Forrest, and J. Burge, /Journal of
Computer Networks. 51:5, pp. 1239-1255 (2007).
- Pretty Good BGP: Improving BGP by cautiously adopting routes
J. Karlin, J. Rexford, and S. Forrest, The 14th IEEE International Conference on Network Protocols (2006)
- Protecting Data Privacy through Hard-to-Reverse Negative Databases
F. Esponda, H. Jia, S. Forrest, and P. Helman, /Proceedings of the
Information Security Conference 2006 (ISC06) Springer LNCS 4176,
September/ 2006. pp. 72-84.
- On the prediction of Java object lifetimes H. Inoue, D. Stefanovic,
and S. Forrest. IEEE Transactions on Computers 55:7, pp. 880-892
(2006)
- Increasing Communications Security through Protocol Parameter Diversity E.G. Barrantes and S. Forrest. In Proceedings of the XXXII Latin-American Conference on Informatics (CLEI), Santiago,
Chile 20-25 August 2006.
- Inferring Java Security Policies Through Dynamic Sandboxing H. Inoue
and S. Forrest, International Conference on Programming Languages and Compilers (PLC 05) (2005).
- Randomized Instruction Set Emulation G. Barrantes, D. Ackley,
S. Forrest, and D. Stefanovic, ACM Transactions on Information Systems Security (TISSEC) Vol 8, No 1 pp. 3-40 (2005).
- A Machine Learning Evaluation of an Artificial Immune System
M. Glickman, J. Balthrop, and S. Forrest, Evolutionary Computation Journal Vol 13, No 2 pp. 179-212 (2005).
- On-line Negative Databases F. Esponda, E. Ackley, S. Forrest, and
P. Helman, Journal of Unconventional Computing, Vol 1, No 3
pp. 201-220 (2005).
- Adaptive Radio: Achieving Consensus Using Negative Preferences
D.L. Chao, J. Balthrop, S. Forrest, ACM GROUP05, 2005.
- 'Network Firewalls' K. Ingham and S. Forrest, In V. Rao Vemuri and
V. Sreeharirao Eds. Enhancing Computer Security with Smart Technology pp. 9-35. CRC Press (2005).
- Technological Networks and the Spread of Computer Viruses
J. Balthrop, S. Forrest, M. E. J. Newman, M. M. Williamson,
Science, Vol 304, Issue 5670, 527-529, 23 April 2004. Summary
- On-line negative databases F. Esponda, E. Ackley, S. Forrest, and
P. Helman, Third International Conference on Artificial Immune Systems (ICARIS) (2004) Best paper award.
- A formal framework for positive and negative detection F. Esponda,
S. Forrest, and P. Helman, IEEE Transactions on Systems, Man, and Cybernetics 34:1 pp. 357-373 (2004).
- Computation in the Wild S. Forrest, J. Balthrop, M. Glickman, and
D. Ackley. In K. Park and W. Willins Eds. The Internet as a Large-Scale Complex System. Oxford University Press (2005).
- Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks E.G. Barrantes, D.H. Ackley, S. Forrest,
T.S. Palmer, D. Stefanovic, D.D. Zovi. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS),
pp.281-289 (2003).
- The Crossover Closure and Partial Match Detection F. Esponda,
S. Forrest and P. Helman The second International Conference on Artificial Immune Systems (ICARIS) Best paper award (2003).
- Anomaly Intrusion Detection in Dynamic Execution Environments
H. Inoue and S. Forrest. New Security Paradigms Workshop
(2002). Postscript
- Generating biomorphs with an aesthetic immune system D. L. Chao and
S. Forrest, Artificial Life VIII: The 8th International Conference on the Simulation and Synthesis of Living Systems (2002).
- Coverage and Generalization in an Artificial Immune System
J. Balthrop, F. Esponda, S. Forrest and M. Glickman. In
W. B. Langdon, E. Cantu-Paz, K. Mathias, R. Roy, D. Davis, R. Poli,
K. Balakrishnan, V. Hanovar, G. Rudolph, J. Wegener, L. Bull,
M. A. Potter, A. C. Schultz, J. F. Miller, E. Burke and N. Jonaska,
editors. Proceedings of the Genetic and Evolutionary Computation Conference. (GECCO) Morgan Kaufmann. New York, pp. 3-10
(2002). Postscript
- Information Immune Systems D. L. Chao and S. Forrest. International Conference on Artificial Immune Systems (ICARIS). pp. 132-140
(2002)
- Email Networks and the Spread of Computer Viruses M. Newman,
S. Forrest and J. Balthrop. Physical Review E 66, 035101
(2002). Postscript
- Positive and Negative Detection F. Esponda, S. Forrest, and
P. Helman IEEE Transactions on Systems, Man and Cybernetics
Vol. 34, No. 1 (2004).
- Revisiting LISYS: Parameters and Normal Behavior J. Balthrop,
S. Forrest, and M. Glickman. Proceedings of the 2002 Congress on Evolutionary Computation (2002). Postscript
- Architecture for an Artificial Immune System S. Hofmeyr and
S. Forrest. Evolutionary Computation 7(1), Morgan-Kaufmann, San
Francisco, CA, pp. 1289-1296 (2000). Abstract Postscript
- Automated Response Using System-Call Delays A. Somayaji and
S. Forrest. Usenix (2000). Abstract Postscript
- Novelty Detection in Time Series Data using Ideas from Immunology
D. Dasgupta and S. Forrest. In Proceedings of The International Conference on Intelligent Systems (1999). Abstract Postscript
- Detecting intrusions using system calls: Alternative data models
C. Warrender, S. Forrest, B. Pearlmutter. 1999 IEEE Symposium on security and Privacy (1999). Abstract Postscript
- Artificial Immune Systems in Industrial Applications D. Dasgupta and
S. Forrest. Accepted for presentation at the International
conference on Intelligent Processing and Manufacturing Material
(IPMM) pp. 257-267. Honolulu, HI. July 10-14, 1999. Postscript
- Intrusion Detection Using Sequences of System Calls S. Hofmeyr,
S. Forrest, and A. Somayaji Journal of Computer Security Vol. 6,
pp. 151-180 (1998). Abstract
- Principles of a Computer Immune System A. Somayaji, S. Hofmeyr, and
S. Forrest New Security Paradigms Workshop pp. 75-82
(1998). Abstract
- A Distributed Approach to Anomaly Detection P. D'haeseleer,
S. Forrest, and P. Helman (1997). Abstract
- Computer Immunology S. Forrest, S. Hofmeyr, and
A. Somayaji. /Communications of the ACM /Vol. 40, No. 10, pp. 88-96
(1997).
- Building Diverse Computer Systems S. Forrest, A. Somayaji, and
D. Ackley. In Proceedings of the Sixth Workshop on Hot Topics in Operating Systems (1997). Abstract
- An Immunological Approach to Change Detection: Algorithms, Analysis, and Implications P. D'haeseleer, S. Forrest, and P. Helman. In
Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy (1996). Abstract Postscript
- A Sense of Self for Unix Processes S. Forrest, S. A. Hofmeyr,
A. Somayaji, and T. A. Longstaff. In Proceedings of IEEE Symposium on Computer Security and Privacy (1996). Abstract Postscript
- Self-Nonself Discrimination in a Computer S. Forrest, A.S. Perelson,
L. Allen, R. and Cherukuri. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA:
IEEE Computer Society Press (1994). Abstract Postscript
Other Publications