@article{joshi_dutta_2022, title={A Reinforcement Approach for Detecting P2P Botnet Communities in Dynamic Communication Graphs}, ISSN={["1550-3607"]}, DOI={10.1109/ICC45855.2022.9838876}, abstractNote={Peer-to-peer (P2P) botnets use decentralized command and control networks that make them resilient to disruptions. The P2P botnet overlay networks manifest structures in mutual-contact graphs, also called communication graphs, formed using network traffic information. It has been shown that these structures can be detected using community detection techniques from graph theory. These previous works, however, treat the communication graphs and the P2P botnet structures as static. In reality, communication graphs are dynamic as they represent the continuously changing network traffic flows. Similarly, the P2P botnets also evolve with time, as new bots join and existing bots leave either temporarily or permanently. In this paper we address the problem of detecting such evolving P2P botnet communities in dynamic communication graphs. We propose a reinforcement-based approach, suitable for large communication graphs, that improves precision and recall of P2P botnet community detection in dynamic communication graphs.}, journal={IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022)}, author={Joshi, Harshvardhan P. and Dutta, Rudra}, year={2022}, pages={56–61} } @article{mushi_joshi_dutta_guvenc_sichitiu_floyd_zajkowski_2022, title={The AERPAW Experiment Workflow - Considerations for Designing Usage Models for a Computing-supported Physical Research Platform}, ISSN={["2159-4228"]}, DOI={10.1109/INFOCOMWKSHPS54753.2022.9798061}, abstractNote={The AERPAW project is an ambitious project, funded by the PAWR program of the US NSF, to create a remote accessible research platform for a research facility with some distinct features that makes its usage model unique, and non-obvious to many researchers desirous of making use of this platform. AERPAW is primarily a physical resource (not a computing or cyber-resource) - the RF enviroment, and the airspace. Experimenters can explore them through radio transceivers and Unmanned Aerial Vehicles, both under the Experimenter’s programmatic control. Since the entire workflow of the user is through the mediation of virtual computing environments, users often tend to think of AERPAW as a computing resource, and find some of the experiment workflow counter-intuitive. In this paper, we articulate the challenges and considerations of designing an experiment workflow that balances the need for guaranteeing safe testbed operation, and providing flexible programmatic access to this unique resource.}, journal={IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS)}, author={Mushi, Magreth and Joshi, Harshvardhan P. and Dutta, Rudra and Guvenc, Ismail and Sichitiu, Mihail L. and Floyd, Brian and Zajkowski, Thomas}, year={2022} } @misc{zhang_joshi_riley_wright_2019, title={Towards a virtual network function research agenda: A systematic literature review of VNF design considerations}, volume={146}, ISSN={["1095-8592"]}, DOI={10.1016/j.jnca.2019.102417}, abstractNote={The traditional hardware-based physical network functions are increasingly being replaced with software-only Virtual Network Functions (VNFs). A systematic review on the VNF, scoped to cover research papers, open source projects, and standards, is conducted in this work. The review identifies a globally recognized technology trend towards the implementations of VNFs. Based on the design criteria proposed and analyzed in this paper, and the research questions used to structure this review, a window on the current state of the art for VNFs is provided to establish a research agenda. Common themes in future research directions for VNFs are identified. These include: better ways of managing VNF state information to improve flexibility and agility during load balancing, failover, and life cycle operations, and designing VNFs to enable their transparent migration across central and edge clouds.}, journal={JOURNAL OF NETWORK AND COMPUTER APPLICATIONS}, author={Zhang, Chuanji and Joshi, Harshvardhan P. and Riley, George F. and Wright, Steven A.}, year={2019}, month={Nov} } @inproceedings{joshi_dhanasekaran_dutta_2015, title={Impact of software obfuscation on susceptibility to return-oriented programming attacks}, DOI={10.1109/sarnof.2015.7324662}, abstractNote={Software obfuscation is a commonly used technique to protect software, especially against reverse-engineering attacks. It is a form of security through obscurity and is commonly used for intellectual property and Digital Rights Management protection. However, this increase of security may come at the expense of increased vulnerabilities in another direction, hitherto unsuspected. In this paper, we propose and investigate the hypothesis that some of the most popular obfuscation techniques, including changing the control flow graph and substituting simpler instruction sequences with complex instructions, may make the obfuscated binary more vulnerable to Return-Oriented Programming (ROP) based attacks. ROP is a comparatively recent technique used to exploit buffer-overflow vulnerabilities. We analyze the ROP gadgets present in both obfuscated and un-obfuscated versions of well known binaries. We show that the number of ROP gadgets in a binary significantly increase after obfuscation, and it can potentially make ROP-based exploits easier.}, booktitle={2015 36th ieee sarnoff symposium}, author={Joshi, H. P. and Dhanasekaran, A. and Dutta, Rudra}, year={2015}, pages={161–166} }