Avatar

Birhanu Eshete

Assistant Professor of Computer Science

University of Michigan, Dearborn

About

I am an Assistant Professor in the department of Computer and Information Science at the University of Michigan, Dearborn, where I lead the Data-Driven Security & Privacy Lab. Previously, I was a Postdoctoral Researcher in the Systems and Internet Security Lab at the University of Illinois at Chicago.

My research interests include cybercrime analysis, cyber threat intellignce, and adversarial machine learning. I also organize the UM-Dearborn Cybersecurity Seminar and mentor the UMD Blue Bytes (an ethical hacking team on campus).

Latest News!

10/15/2019: I will be speaking about cybercrime at USENIX ENIGMA’20.

09/15/2019: Our work on APT detection is accepted to ACM CCS’19.

Research Areas

*

Adversarial Machine Learning

poisoning, evasion, model/example inference.

Cyber Threat Intelligence

characterization, measurement, and forensics.

Cybercrime Analysis

reconstruction, measurement, and defense.

Latest Publications

Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting

Cyber threat intelligence (CTI) is being used to search for indicators of attacks that might have compromised an enterprise network for …

HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows

In this paper, we present a new approach for the detection of Advanced and Persistent Threats (APTs). Our approach is inspired by …

ProPatrol: Attack Investigation via Extracted High-Level Tasks

Kernel audit logs are a valuable source of information in the forensic investigation of a cyber attack. However, the coarse gran- …

NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications

Modern multi-tier web applications are composed of several dynamic features, which make their vulnerability analysis challenging from a …

SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data

We present an approach and system for real-time recon- struction of attack scenarios on an enterprise host. To meet the scalability and …

Courses Taught

Fall 2019: Data Security and Privacy

Description:With the continuing proliferation of ways to collect and use information about people, there is a great concern whether …

Winter 2019: Compiler Design

Description: Principles of language compilation. Introduction to formal languages, lexical analysis, top-down and bottom-up parsing, …

Fall 2018: Data Security and Privacy

Description:With the continuing proliferation of ways to collect and use information about people, there is a great concern whether …

Professional Service

[Conferences, Journals, Misc]

Program Committee Member

  • SECURECOMM: Security and Privacy in Communication Networks, 2019.
  • SECURECOMM: Security and Privacy in Communication Networks, 2018.
  • SECURECOMM: Security and Privacy in Communication Networks, 2017.
  • MAICS: Modern Artificial Intelligence and Cognitive Science Conference, 2017.
  • SECURECOMM: Security and Privacy in Communication Networks, 2016.
  • MAICS: Modern Artificial Intelligence and Cognitive Science Conference, 2016.
  • Invited Journal Article Reviewer

  • ITS: IEEE Intelligent Transportation Systems Magazine, 2019.
  • TIFS: IEEE Transactions on Information Forensics & Security, 2018.
  • TDSC: IEEE Transactions on Dependable and Secure Computing, 2017.
  • IJIS: International Journal of Information Security, 2016.
  • NEPL: Neural Processing Letters, 2015.
  • TDSC: IEEE Transactions on Dependable and Secure Computing, 2015.
  • ESEJ: e-Informatica Software Engineering Journal, 2015.
  • JSS: Journal of Systems and Software, 2013.
  • External Conference Reviewer

  • CCS: ACM Conference on Computer and Communications Security, 2018.
  • NDSS: Network and Distributed Systems Security Symposium, 2016.
  • QRS: International Conference on Software Quality, Reliability & Security, 2015.
  • ICWE: International Conference on Web Engineering, 2015.
  • NDSS: Network and Distributed Systems Security Symposium, 2015.
  • ICISS: International Conference on Information Systems Security, 2014.
  • SERE: International Conference on Security and Reliability, 2014.
  • Misc

  • UIC SRF: Faculty Judge: UIC Student Research Forum, University of Illinois at Chicago, 2015.
  • Contact Me