P. Anantharaman, S. Cheung, N. Boorman, and M. Locasto,
"A Format-Aware Reducer for Scriptable Rewriting of PDF Files",
Proceedings of the 2022 IEEE Security and Privacy Workshops.
pp.136-151, May, 2022.
Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, and D. Boneh,
"StegoTorus: A Camouflage Proxy for the Tor Anonymity System",
Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS).
pp.109-120, Oct, 2012.
M.O. Stehr, C. Talcott, J. Rushby, P. Lincoln, M. Kim, S. Cheung,
and A. Poggio, "Fractionated Software for Networked Cyber-Physical Systems:
Research Directions and Long-Term Vision",
LNCS Vol. 7000, Springer. pp.110-143, Nov 2011.
L. Briesemeister, S. Cheung, U. Lindqvist, and Alfonso Valdes,
"Detection, Correlation, and Visualization of Attacks against Critical Infrastructure Systems",
Eighth Annual Conference on Privacy, Security and Trust.
Ottawa, Ontario, Canada.
August 17-19, 2010.
A. Valdes and S. Cheung,
"Communication Pattern Anomaly Detection in Process Control Systems",
2009 IEEE International Conference on Technologies for Homeland Security,
Waltham, MA, May 2009.
A. Valdes and S. Cheung,
"Intrusion Monitoring in Process Control Systems",
Proceedings of the 42nd Hawaii International Conference on System Sciences,
Big Island, Hawaii, January 2009.
T.E. Uribe and S. Cheung, "Automatic Analysis of Firewall and
Network Intrusion Detection System Configurations". Journal of Computer
Security, Vol.15, No.6, 2007. (An earlier version appears in the
Proceedings of the
2004 ACM Workshop on Formal Methods in Security Engineering,
Washington, D.C., October 2004.)
R. Cunningham, S. Cheung, M. Fong, U. Lindqvist, D. Nichol, R.
Pawlowski, E. Robinson, W. Sanders, S. Singh, A. Valdes, B. Woodworth
and M. Zhivich, "Securing Current and Future Process Control Systems",
Chapter 8 in IFIP International Federation for Information Processing,
Volume 253, Critical Infrastructure Protection, eds. E. Goetz and S.
Shenoi, Springer, pp. 99-115, 2007. (This paper was presented
in the First Annual IFIP
WG 11.10 International Conference on Critical Infrastructure
Protection, Hanover, New Hampshire, March 2007.)
S. Cheung, B. Dutertre, U.
Lindqvist, "Detecting Disruptive Routers in Wireless Sensor Networks",
Proceedings of the 5th International Conference on Ad-hoc, Mobile, and
Wireless Networks, Ottawa, Canada, August 2006.
S. Cheung, "Denial of Service
against the Domain Name System", IEEE Security and Privacy, Vol.4,
No.1, pp.40-45, January/February, 2006.
M. Bishop, S. Cheung, J. Frank, J. Hoagland, S. Samorodin, and
C. Wee, "Internet Security". Chapter 6 of Statistical Methods in
Computer Security, W. Chen (ed.), Marcel Dekker, New York, NY, 2005.
T.E. Uribe, S. Cheung, J. Levy, and A. Valdes, "Intrusion
Tolerance and Worm Spread". Fast abstract. International Conference on
Dependable Systems and Networks (DSN-2003), San Francisco, CA, June
2003.
S. Cheung, U. Lindqvist, and M.W. Fong, "Modeling Multistep Cyber
Attacks for Scenario Recognition", Proceedings of the 3rd DARPA
Information Survivability Conference and Exposition, Washington, D.C.,
April 2003.
A. Valdes, M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre, J.
Levy, H. Saidi, V. Stavridou, and T.E. Uribe, "Dependable Intrusion
Tolerance: Technology Demo", Proceedings of the 3rd DARPA Information
Survivability Conference and Exposition (DISCEX III), Washington, D.C.,
April 2003.
P.A. Porras, S. Cheung, and M. Almgren, "Malicious Code Outbreak
Discovery: Issues and Approaches", Position Paper, DARPA Malicious Code
Defense Workshop, Denver, Colorado, August 2002.
A. Valdes, M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre, J.
Levy, H. Saidi, V. Stavridou, and T.E. Uribe, "An Architecture for an
Adaptive Intrusion Tolerant Server", Proceedings of the Security
Protocols Workshop, Cambridge, UK, April 2002.
S. Cheung, and K.N. Levitt, "A Formal-Specification Based
Approach
for Protecting the Domain Name System", Proceedings of the
International Conference on Dependable Systems and Networks (Workshop
on Dependability Despite Malicious Faults), New York
City, New York, June 25-28, 2000.
K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R.A.
Olsson, "Detecting Disruptive Routers: A Distributed Network Monitoring
Approach", IEEE Network, September/October 1998. An earlier version
appears in the Proceedings of the 1998 IEEE Symposium on Security and
Privacy, Oakland, California, May 3-6, 1998.
S. Cheung, "An Efficient Message Authentication Scheme for Link
State Routing", Proceedings of the 13th Annual Computer Security
Applications Conference, San Diego, California, December 8-12, 1997.
S. Cheung, and K.N. Levitt, "Protecting Routing Infrastructures
from Denial of Service Using Cooperative Intrusion Detection",
Proceedings of the New Security Paradigms Workshop, Cumbria, UK,
September 23-26, 1997.
M. Bishop, S. Cheung, J. Frank, J. Hoagland, S. Samorodin, and
C.
Wee, "The Threat from the Net", IEEE Spectrum, August 1997.
C.K. Au-Yeung, F.C.M. Lau, and S. Cheung, "Efficient Computations
on Cube-Mesh: A Mesh with Express Links", Computer Architecture '97:
Selected Papers of the 2nd Australasian Conference, R. Pose (ed.),
Springer, 1997.
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank,
J.
Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle, "GrIDS: A
Graph-Based Intrusion Detection System for Large Networks", Proceedings
of the 19th National Information Systems Security Conference,
Baltimore, Maryland, October 21-25, 1996.
S. Cheung and F.C.M. Lau, "Routing with Locality on Meshes with
Buses", Journal of Parallel and Distributed Computing, February 1996.
S. Cheung and F.C.M. Lau, "Efficient Computations on Meshes with
Express Links", Technical Report TR-95-01, Department of Computer
Science, The University of Hong Kong, May 1995.
K.N. Levitt and S. Cheung, "Common Techniques in Fault-Tolerance
and Security", Proceedings of the 4th Conference on Dependable
Computing for Critical Applications, San Diego, California, January
1994.
S. Cheung and F.C.M. Lau, "Time Lower Bounds for Permutation
Routing on Multi-Dimensional Bused Meshes", Parallel Processing
Letters, June 1993.
S. Cheung and F.C.M. Lau, "A Lower Bound for Permutation Routing
on Two-Dimensional Bused Meshes", Information Processing Letters, April
1993.
S. Cheung and F.C.M. Lau, "Mesh Permutation Routing with
Locality", Information Processing Letters, August 1992.