Avatar

Birhanu Eshete

Assistant Professor of Computer Science

University of Michigan, Dearborn

About

I am an Assistant Professor in the department of Computer and Information Science at the University of Michigan, Dearborn, where I lead the Data-Driven Security & Privacy Lab. I am also an affiliated faculty member in the Michigan Institute for Data Science (MIDAS) and a founding faculty member of the Dearborn AI Research Center (DAIR). Previously, I was a Postdoctoral Researcher in the Systems and Internet Security Lab at the University of Illinois at Chicago.

My research interests include adversarial machine learning, cybercrime analysis, and cyber threat intellignce. I also organize the UM-Dearborn Cybersecurity Seminar and mentor the UMD Blue Bytes (an ethical hacking team on campus).

Latest News!

06/26/20: Our work on best-effort adversarial approximation of ML malware classifiers is accepted to SecureComm’20.
02/18/20: I will be serving as PC member on USENIX Security’20 and SecureComm’20.
01/15/20: I will be speaking about cybercrime at USENIX ENIGMA’20.

My USENIX ENIGMA talk on cybercrime toolkits:

Research Areas

*

Adversarial Machine Learning

poisoning, evasion, model/example inference.

Cyber Threat Intelligence

characterization, measurement, and forensics.

Cybercrime Analysis

reconstruction, measurement, and defense.

Latest Publications

Best-Effort Adversarial Approximation of Black-Box Malware Classifiers

An adversary who aims to steal a black-box model repeatedly queries the model via a prediction API to learn a function that …

Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting

Cyber threat intelligence (CTI) is being used to search for indicators of attacks that might have compromised an enterprise network for …

HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows

In this paper, we present a new approach for the detection of Advanced and Persistent Threats (APTs). Our approach is inspired by …

ProPatrol: Attack Investigation via Extracted High-Level Tasks

Kernel audit logs are a valuable source of information in the forensic investigation of a cyber attack. However, the coarse gran- …

NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications

Modern multi-tier web applications are composed of several dynamic features, which make their vulnerability analysis challenging from a …

Teaching

[undergrad, grad]

Graduate

  • Fall 2020: Data Security and Privacy (CIS545)
  • Fall 2020: Foundations of Information Security (CIS540)
  • Winter 2020: Compiler Design (CIS574)
  • Fall 2019: Data Security and Privacy (CIS545)
  • Winter 2019: Compiler Design (CIS574)
  • Fall 2018: Data Security and Privacy (CIS545)
  • Undergraduate

  • Winter 2020: Compiler Design (CIS474)
  • Fall 2019: Data Security and Privacy (CIS4851)
  • Winter 2019: Compiler Design (CIS474)
  • Fall 2018: Data Security and Privacy (CIS4851)
  • Professional Service

    [Conferences, Journals, Misc]

    Program Committee Member

  • USENIX SEC: USENIX Security Symposium, 2020.
  • SECURECOMM: Security and Privacy in Communication Networks, 2020.
  • SECURECOMM: Security and Privacy in Communication Networks, 2019.
  • SECURECOMM: Security and Privacy in Communication Networks, 2018.
  • SECURECOMM: Security and Privacy in Communication Networks, 2017.
  • MAICS: Modern Artificial Intelligence and Cognitive Science Conference, 2017.
  • SECURECOMM: Security and Privacy in Communication Networks, 2016.
  • MAICS: Modern Artificial Intelligence and Cognitive Science Conference, 2016.
  • Invited Journal Article Reviewer

  • ITS: IEEE Intelligent Transportation Systems Magazine, 2019.
  • TIFS: IEEE Transactions on Information Forensics & Security, 2018.
  • TDSC: IEEE Transactions on Dependable and Secure Computing, 2017.
  • IJIS: International Journal of Information Security, 2016.
  • NEPL: Neural Processing Letters, 2015.
  • TDSC: IEEE Transactions on Dependable and Secure Computing, 2015.
  • ESEJ: e-Informatica Software Engineering Journal, 2015.
  • JSS: Journal of Systems and Software, 2013.
  • External Conference Reviewer

  • CCS: ACM Conference on Computer and Communications Security, 2018.
  • NDSS: Network and Distributed Systems Security Symposium, 2016.
  • QRS: International Conference on Software Quality, Reliability & Security, 2015.
  • ICWE: International Conference on Web Engineering, 2015.
  • NDSS: Network and Distributed Systems Security Symposium, 2015.
  • ICISS: International Conference on Information Systems Security, 2014.
  • SERE: International Conference on Security and Reliability, 2014.
  • Misc

  • UIC SRF: Faculty Judge: UIC Student Research Forum, University of Illinois at Chicago, 2015.
  • Contact Me