Stephanie Forrest
CyberBio—Computer Security and Other Applications of Immunology
- Automatically mitigating vulnerabilities in binary programs via partially recompilable decompilation. P. Reiter, H.J. Tay, W. Weimer, A. Doupe, R. Wang, and S. Forrest. ACM Trans. on Dependable and Secure Computing (in revision).
- Encrypted data sharing for preserving privacy in wastewater-based epidemiiology E. Driver, N. Trieu, M. Ahsan, L. Piske, H. Lee, R. Halden, and S. Forrest Science of the Total Environment 940 (2024).
- Challenges in cybersecurity: Lessons from biological defense systems E. Schrom, A. Kinzig, S. Forrest, A. Graham, S. Levin, C. Bergstrom, C. Castillo-Chavez, J. Collins, R. de Boer, A. Doupe, R. Ensafi, S. Feldman, B. Grenfell, J. A. Halderman, S. Huijben, C. Maley, M. Moses, A. Perelson, C. Perrings, J. Plotkin, J. Rexford, M. Tiwari. Mathematical Biosciences 362 (2023).
- Reducing Malware Analysis Overhead with Coverings M. Sandborn, Z. Stoebner, W. Weimer, S. Forrest, R. Dougherty, J. White, and K. Leach. Transactions on Dependable and Secure Computing (TDSC) 14:8 (2022)
- Start: A framework for trusted and reisilient autonomous vehicles K. Leach, K. Angstadt, C. Timperley, A. Nguyen-Tuong, J. Hiser, A. Paulos, P. Pal, P. Hurley, C. Thomas, J.W. Davidson, S. Forrest, C. Le Goues, and W. Weimer. 33rd International Symposium on Software Reliability Engineering (ISSRE-22), 2022.
- Back to the future: N-versioning of microservices A.~M. Espinoza, R. Wood, S. Forrest, and M. Tiwari. Intnl. Conference on Dependable Systems and Networks (DSN), 2022.
- Cutting through the noise to infer autonomous system topology K. Leyba, J. Daymude, J. Young, M. Newman, J. Rexford, and S. Forrest. INFCOM (2022).
- Wastewater monitoring raises privacy and ethical considerations D. Jacobs, T. McDaniel, A. Varsani, R. Halden, S. Forrest, and H. Lee. IEEE Trans. on Technology and Society 2:3 (2021).
- Borders and gateways: Measuring and analyzing national AS chokepoints K. Leyba, B. Edwards, C. Freeman, J. Crandall, and S. Forrest. In ACM Conference on Computing and Sustainable Societies (COMPASS) 2019.
- Defeating denial-of-service attacks in a self-managing N-variant system J. Jones, J. Hiser, J. Davidson, and S. Forrest. In 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2019. Best paper award.
- Strategic aspects of cyber attack, attribution, and blame B. Edwards, A. Furnas, S. Forrest and R. Axelrod. Proc. Nat. Acad. Sci (PNAS) (Feb. 2017)
- Negative selection based anomaly detector for multimodal health data D. Levin, M. Moses, T. Flanagan, S. Forrest, and P. Finley IEEE Symposium on Artificial Life, 2017.
- Trusted software repair for system resiliency W. Weimer, S. Forrest, M. Kim, C. Le Goues and P. Hurley Dependable Systems (DSN) (2017)
- Double Helix and RAVEN: A system for Cyber Fault Tolerance and Recovery M. Co, J. W. Davidson, J. D. Hiser, A. Nguyen-Tuong J. C. Knight, W. Weimer, J. Burket, G. L. Frazier, B. Dutertre T. M. Frazier, I. Mason, N. Shankar, and S. Forrest Proc. of the 11th Cyber and Information Security Research Conf Oak Ridge National Laboratory (2016) Runner up, best paper
- Hype and heavy tails: A closer look at data breaches B. Edwards,
S. Hofmeyr, and S. Forrest Workshop on the Economics of Information Security (WEIS) (2015) Best Paper Award
- Hype and heavy tails: Analyzing ten years of data breaches B. Edwards, S. Hofmeyr, and S. Forrest Journal of Cybersecurity 2(1):3–14 (2016) doi: 10.1093/cybsec/tyw003 (Updated and expanded revision of WEIS 2015 conference paper)
- Analyzing and modeling longitudinal security data: Promise and pitfalls B. Edwards, S. Hofmeyr, S. Forrest, and M. van Eeten. 31st Annual Computer Security Applications Conf. (ACSAC) (2015)
- Repairing COTS router firmware without access to source code or test suites: A cfase study in evolutionary software repair E. Schulte, W. Weimer, and S. Forrest The First International Genetic Improvement Workshop, 2015 (2015).
- Implications of security enhancements and interventions for core Internet infrastructure S. Goldberg and S. Forrest The 42nd Research
Conference on Communication, Information and Internet Policy (TPRC) (2014)
- Application and analysis of multidimensional negative surveys in participatory sensing applications M. Groat, B. Edwards, J. Horey, W. He and S. Forrest. Pervasive and Mobile Computing 9:372-9 (2013)
- Beyond the Blacklist: Modeling malware spread and the effect of
interventions B. Edwards, T. Moore, G. Stelle, S. Hofmeyr and S. Forrest New Security Paradignms Workshop (NSPW) (2012)
- Enhancing privacy in participatory sensing applications with multidimensional data M. Groat, B. Edwards, J. Horey, W. He and S. Forrest. Pervasive Computing (PERCOM) (2012)
- Reconstructing spatial distributions from anonymized locations J. Horey, S. Forrest and M. Groat. Workshop on Secure Data Management (ICDE) (2012)
- Moving target defenses in the Helix self-regenerative architecture C. Le Goues, A. Nguyen-Tuong, H Chen, J. W. Davidson S. Forrest, J. D. Hiser, J. C. Knight and M. Van Gundy. In S. Jajodia et al., editor, Moving Target Defense II: Application of Game Theory and Adversarial Modeling pages 115–146 (2012)
- KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks M. Groat, W. He, and S. Forrest. INFOCOM (2011).
- Modeling Internet-scale policies for cleaning up malware
S. Hofmeyr, T. Moore, S. Forrest, B. Edwards and G. Stelle. Tenth Workshop on Economics of Information Security (WEIS) (2011)
- Nation-state routing: Censorship, wiretapping, and BGP J. Karlin, S. Forrest, and J. Rexford. Arxiv:0903.3218v1 (2009)
- Negative representations of information F. Esponda, S. Forrest, and
P. Helman. International Journal of Information Security 8:2 (2009).
- The evolution of system-call monitoring Forrest, S. Hofmeyr, and
A. Somayaji. Proc. of the 2008 Annual Computer Security
Applications Conference (ACSAC '08). IEEE Computer Society
pp. 418-430. Invited paper for classic papers session (2008).
- Negative ternary set sharing E. Trias, J. Navas, E. Ackley,
S. Forrest, and M. Hermenegildo. Proc. of the International
Conference on Logic Programming (ILCP) Springer Lecture Notes in
Computer Science, Berlin / Heidelberg pp. 301-316 (2008).
- Two efficient representations for set-sharing analysis in logic programs E. Trias, J. Navas, E. Ackley, S. Forrest, and
M. Hermenegildo. Proc. of the 17th International Workshop on
Functional and (Constraint) Logic Programming Electronic Notes in
Theoretical Computer Science www.elsevier.nl/locate/entcs (2008).
- The ecology of malware J.R. Crandall, R. Ensafi, S. Forrest,
J. Ladau, and B. Shebaro. Proc. of the New Security Paradigms Workshop (NSPW) Olympic Valley, CA (2008).
- Autonomous security for autonomous systems J. Karlin, J. Rexford,
and S. Forrest. Computer Networks 52:2908-2923 (2008).
- Scaling theory for information networks M. Moses, S. Forrest, A. L. Davis, M. Lodder, and J. H. Brown. Journal of the Royal Society Interface 5:20, pp. 1391-1510 (2008).
- Anonymous data collection in sensor networks J. Horey, M. Groat,
S. Forrest, and F. Esponda. /The 4th Annual International Conference
on Mobile and Ubiquitous Systems: Computing, Networking and
Services./ (2007)
- Protecting Data Privacy through Hard-to-Reverse Negative Databases
F. Esponda, E.S. Ackley, P. Helman, H. Jia, and
S. Forrest. Int. Journal of Information Security 6:6 (2007).
- A Relational Algebra for Negative Databases F. Esponda, E. Trias,
E. Ackley, S. Forrest. UNM Computer Science Tech Report
TR-CS-2007-18.
- Protecting BGP from Invalid Paths J. Karlin, S. Forrest, J. Rexford.
UNM Computer Science Tech Report TR-CS-2007-12.
- Radial Structure of the Internet P. Holme, J. Karlin, S. Forrest.
Proceedings of the Royal Society A: Mathematical, Physical and
Engineering Sciences 463:1231-1246 (2007). Preprint.
- Learning DFA representations of HTTP for protecting web applications
K. Ingham, A. Somayaji, S. Forrest, and J. Burge Journal of
Computer Networks 51:5 pp. 1239-1255 (2007).
- Pretty Good BGP: Improving BGP by cautiously adopting routes
J. Karlin, J. Rexford, and S. Forrest, The 14th IEEE International
Conference on Network Protocols (2006)
- Protecting Data Privacy through Hard-to-Reverse Negative Databases
F. Esponda, H. Jia, S. Forrest, and P. Helman, Proceedings of the
Information Security Conference (ISC06) Springer LNCS 4176,
September (2006) pp. 72-84.
- Increasing Communications Security through Protocol Parameter
Diversity E.G. Barrantes and S. Forrest. In Proceedings of the
XXXII Latin-American Conference on Informatics (CLEI), Santiago,
Chile 20-25 August 2006.
- Inferring Java Security Policies Through Dynamic Sandboxing H. Inoue and S. Forrest, International Conference on Programming Languages
and Compilers (PLC 05) (2005).
- Randomized Instruction Set Emulation G. Barrantes, D. Ackley, S. Forrest, and D. Stefanovic, ACM Transactions on Information Systems Security (TISSEC) Vol 8, No 1 pp. 3-40 (2005).
- A Machine Learning Evaluation of an Artificial Immune System
M. Glickman, J. Balthrop, and S. Forrest, Evolutionary Computation
Journal Vol 13, No 2 pp. 179-212 (2005).
- On-line Negative Databases F. Esponda, E. Ackley, S. Forrest, and
P. Helman, Journal of Unconventional Computing, Vol 1, No 3
pp. 201-220 (2005).
- Adaptive Radio: Achieving Consensus Using Negative Preferences
D.L. Chao, J. Balthrop, S. Forrest, ACM GROUP05, 2005.
- 'Network Firewalls' K. Ingham and S. Forrest, In V. Rao Vemuri and V. Sreeharirao Eds. Enhancing Computer Security with Smart Technology pp. 9-35. CRC Press (2005).
- Technological Networks and the Spread of Computer Viruses
J. Balthrop, S. Forrest, M. E. J. Newman, M. M. Williamson,
Science, Vol 304, Issue 5670, 527-529, 23 April 2004. Unofficial version
- On-line negative databases F. Esponda, E. Ackley, S. Forrest, and P. Helman, Third International Conference on Artificial Immune Systems (ICARIS) (2004) BEST PAPER AWARD.
- A formal framework for positive and negative detection F. Esponda,
S. Forrest, and P. Helman, IEEE Transactions on Systems, Man, and
Cybernetics 34:1 pp. 357-373 (2004).
- Computation in the Wild S. Forrest, J. Balthrop, M. Glickman, and D. Ackley. In K. Park and W. Willins Eds. The Internet as a
Large-Scale Complex System. Oxford University Press (2005).
- Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks E.G. Barrantes, D.H. Ackley, S. Forrest,
T.S. Palmer, D. Stefanovic, D.D. Zovi. In Proceedings of the 10th
ACM Conference on Computer and Communications Security (CCS),
pp.281-289 (2003).
- The Crossover Closure and Partial Match Detection F. Esponda, S. Forrest and P. Helman The second International Conference on
Artificial Immune Systems (ICARIS) (2003) BEST PAPER AWARD.
- Anomaly Intrusion Detection in Dynamic Execution Environments H. Inoue and S. Forrest. New Security Paradigms Workshop
(2002).
- Generating biomorphs with an aesthetic immune system D. L. Chao and S. Forrest, Artificial Life VIII: The 8th International Conference on the Simulation and Synthesis of Living Systems (2002).
- Coverage and Generalization in an Artificial Immune System
J. Balthrop, F. Esponda, S. Forrest and M. Glickman. In
W. B. Langdon, E. Cantu-Paz, K. Mathias, R. Roy, D. Davis, R. Poli,
K. Balakrishnan, V. Hanovar, G. Rudolph, J. Wegener, L. Bull,
M. A. Potter, A. C. Schultz, J. F. Miller, E. Burke and N. Jonaska,
editors. Proceedings of the Genetic and Evolutionary Computation
Conference. (GECCO) Morgan Kaufmann. New York, pp. 3-10
(2002).
- Information Immune Systems D. L. Chao and S. Forrest. In International Conference on Artificial Immune Systems (ICARIS). pp. 132-140
(2002). Also publlished as Genetic Programming and Evolvable Machines (GPEM) 4:311-331 (2003).
- Email Networks and the Spread of Computer Viruses M. Newman,
S. Forrest and J. Balthrop. Physical Review E 66, 035101
(2002).
- Revisiting LISYS: Parameters and Normal Behavior J. Balthrop, S. Forrest, and M. Glickman. Proceedings of the 2002 Congress on
Evolutionary Computation (2002).
- Architecture for an Artificial Immune System S. Hofmeyr and
S. Forrest. Evolutionary Computation 7(1), Morgan-Kaufmann, San
Francisco, CA, pp. 1289-1296 (2000).
- Automated Response Using System-Call Delays A. Somayaji and
S. Forrest. Usenix (2000).
- Novelty Detection in Time Series Data using Ideas from Immunology D. Dasgupta and S. Forrest. In Proceedings of The International Conference on Intelligent Systems (1999).
- Detecting intrusions using system calls: Alternative data models
C. Warrender, S. Forrest, B. Pearlmutter. 1999 IEEE Symposium on
security and Privacy (1999).
- Artificial Immune Systems in Industrial Applications D. Dasgupta and
S. Forrest. Accepted for presentation at the International
conference on Intelligent Processing and Manufacturing Material
(IPMM) pp. 257-267. Honolulu, HI. July 10-14, 1999.
- Intrusion Detection Using Sequences of System Calls S. Hofmeyr,
S. Forrest, and A. Somayaji Journal of Computer Security Vol. 6,
pp. 151-180 (1998).
- Principles of a Computer Immune System A. Somayaji, S. Hofmeyr, and
S. Forrest New Security Paradigms Workshop (1998).
- A Distributed Approach to Anomaly Detection P. D'haeseleer, S. Forrest, and P. Helman. Tech Report (1997).
- Computer Immunology S. Forrest, S. Hofmeyr, and
A. Somayaji. /Communications of the ACM /Vol. 40, No. 10, pp. 88-96
(1997).
- Building Diverse Computer Systems S. Forrest, A. Somayaji, and
D. Ackley. In Proceedings of the Sixth Workshop on Hot Topics in
Operating Systems (1997).
- An Immunological Approach to Change Detection: Algorithms, Analysis, and Implications P. D'haeseleer, S. Forrest, and P. Helman. In
Proceedings of the 1996 IEEE Symposium on Computer Security and
Privacy (1996).
- A sense of self for Unix processes S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. In Proceedings of IEEE Symposium
on Computer Security and Privacy (1996).
- Self-Nonself Discrimination in a Computer S. Forrest, A.S. Perelson, L. Allen, R. and Cherukuri. In Proceedings of the 1994 IEEE
Symposium on Research in Security and Privacy, Los Alamitos, CA:
IEEE Computer Society Press (1994).
Other Publications