Steven Gianvecchio Ph.D. Computer Science College of William and Mary |
I graduated and joined MITRE in 2010. I received my Ph.D. in Computer Science from the College of William and Mary in 2010. My research advisor was Dr. Haining Wang. I received my B.S. in Computer Science from the State University of New York at Brockport in 2001 and my M.S. in Computer Science from the College of William and Mary in 2006.
News
- August 16th, 2010 - Our paper, "Who is Tweeting on Twitter: Human, Bot, or Cyborg?" has been accepted to ACSAC 2010 in Austin, TX, USA.
- June 21st, 2010 - Our paper, "Mimimorphism: A New Approach to Binary Code Obfuscation," has been accepted to ACM CCS 2010 in Chicago, IL, USA.
- April 26th, 2010 - Our paper, "An Entropy-Based Approach to Detecting Covert Timing Channels," has been accepted to TDSC.
- November 11th, 2009 - I presented our paper, "Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs," at ACM CCS 2009 in Chicago, IL, USA.
- July 12th, 2009 - Our paper, "Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs," has been accepted to ACM CCS 2009.
- March 27th, 2009 - I presented our paper, "Measurement and Classification of Humans and Bots in Internet Chat," at the Graduate Research Symposium in Williamsburg, VA, USA.
Research
My Ph.D. research uses information-theoretic methods to address different problems in network and system security, such as detecting covert channels or determining if a user is a human or bot. My research interests include networks, distributed systems, network monitoring, intrusion detection, traffic modeling, and covert channels.
Publications
- Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, and Haining Wang. "Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification." To appear in IEEE/ACM Transactions on Networking. [paper] [abstract]
- Steven Gianvecchio and Haining Wang. "An Entropy-Based Approach to Detecting Covert Timing Channels." To appear in IEEE Transactions on Dependable and Secure Computing. [paper] [abstract]
- Zi Chu, Steven Gianvecchio, Haining Wang, and Sushil Jajodia. "Who is Tweeting on Twitter: Human, Bot, or Cyborg?." Appeared in Proceedings of ACSAC 2010, Austin, TX, USA, December 2010. [paper] [slides] [abstract]
- Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, and Haining Wang. "Mimimorphism: A New Approach to Binary Code Obfuscation." Appeared in Proceedings of ACM CCS 2010, Chicago, IL, USA, October 2010. [paper] [slides] [abstract]
- Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, and Haining Wang. "Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs." Appeared in Proceedings of ACM CCS 2009, Chicago, IL, USA, November 2009. [paper] [slides] [abstract]
- Steven Gianvecchio, Haining Wang, Duminda Wijesekera, and Sushil Jajodia. "Model-Based Covert Timing Channels: Automated Modeling and Evasion." Appeared in Proceedings of RAID 2008, Boston, MA, USA, September 2008. [paper] [slides] [abstract]
- Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, and Haining Wang. "Measurement and Classification of Humans and Bots in Internet Chat." Appeared in Proceedings of USENIX Security 2008, San Jose, CA, USA, August 2008. [paper] [slides] [abstract]
- Steven Gianvecchio and Haining Wang. "Detecting Covert Timing Channels: An Entropy-Based Approach." Appeared in Proceedings of ACM CCS 2007, Alexandria, VA, USA, November 2007. [paper] [slides] [abstract]
Conference Lists
- 1993-2007 impact factor ratings of computer science conferences and journals. [source: CiteSeerX]
- 2008 tier rankings of computer science journals. [source: CORE]
- 2007 tier rankings of computer science conferences. [source: CORE]
- 2007 tier rankings of computer science journals. [source: CORE]
- 2010 tier rankings of computer security conferences. [source: Guofei Gu]
- 2008-2010 security conference call for papers. [source: WikiCFP]
- 2008-2010 networking conference call for papers. [source: WikiCFP]
Resources