Publications
Conference papers
Minjie Cai, Xavier de Carné de Carnavalet, Siqi Zhang, Lianying Zhao, Mengyuan Zhang ,
“Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling”,
Nordic Conference on Secure IT systems (NordSec ‘24 ) , Karlstad, Sweden, Nov. 2024. [author copy ]
Onur Duman, Mengyuan Zhang , Lingyu Wang, Mourad Debbabi,
“SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs ”,
Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA ‘24 ) , Lausanne, Switzerland, July 17-19, 2024.
Junjian Ye, Xavier de Carné de Carnavalet, Mengyuan Zhang , Lianying Zhao, Lifa Wu, Wei Zhang,
“Exposed by Default: A Security Analysis of Home Router Default Settings ,”
ACM ASIA Conference on Computer and Communications Security (AsiaCCS ‘24) , Singapore, July 1-5, 2024. [author copy ]
Siqi Zhang, Minjie Cai, Mengyuan Zhang , Lianying Zhao, Xavier de Carné de Carnavalet,
“The Flaw Within: Identifying CVSS Scores Discrepancies in the NVD ,”
IEEE International Conference on Cloud Computing Technology and Science (CloudCom ‘23 ) , Napoli, Italy, Dec. 4-6, 2023. [author copy ]
Siqi Zhang, Mengyuan Zhang , Lianying Zhao,
“VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation ,”
IFIP Annual Conference on Data and Applications Security and Privacy (DBSec ‘23 ) , Sophia Antipolis, France, July 19-21, 2023. [author copy ]
Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Mengyuan Zhang , Lingyu Wang,
“ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Function Virtualization (NFV) ”,
Network and Distributed System Security Symposium (NDSS ‘22 ) , San Diego, CA, USA, Feb. 27-Mar. 3, 2022. [author copy ]
Mohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang , Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet,
“DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment ”,
Annual Computer Security Applications Conference (ACSAC ‘21 ) , Virtual Event, USA, Dec. 6-10, 2021.
Lianying Zhao, Muhammad Shafayat Oshman, Mengyuan Zhang , Fereydoun Farrahi Moghaddam, Shubham Chander, Makan Pourzandi,
“Towards 5G-ready Security Metrics ”,
IEEE International Conference on Communications (ICC ‘21 ) , June 14-23, 2021. [author copy ]
Mohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang , Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet,
“Malchain: Virtual Application Behaviour Profiling by Aggregated Microservice Data Exchange Graph ”,
IEEE International Conference on Cloud Computing Technology and Science (CloudCom ‘20 ) , Bangkok, Thailand, Dec. 14-17, 2020.
Alaa Oqaily, Sudershan Lakshmanan Thirunavukkarasu, Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang , Makan Pourzandi, Lingyu Wang, Mourad Debbabi,
“NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack ,”
IEEE International Conference on Cloud Computing Technology and Science (CloudCom ‘20 ) , Bangkok, Thailand, Dec. 14-17, 2020. [author copy ]
Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang , Lingyu Wang, Makan Pourzandi, and Mourad Debbabi,
“R2 DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions ,”
ACM Conference on Computer and Communications Security (CCS ‘20 ) , Orlando, USA, Nov. 9-13, 2020. [author copy ] [arxiv ]
Azadeh Tabiban, Yosr Jarraya, Mengyuan Zhang , Makan Pourzandi, Lingyu Wang, and Mourad Debbabi,
“Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack ,”
IEEE Conference on Communications and Network Security (CNS ‘20 ) , Avignon, France, June 29-July 1, 2020. [author copy ]
Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang , Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi, and Mourad Debbabi,
“Modeling NFV Deployment to Identify the Cross-level Inconsistency Vulnerabilities ,”
IEEE International Conference on Cloud Computing Technology and Science (CloudCom ‘19 ) , Sydney, Australia, Dec. 11-13, 2019. [author copy ]
Momen Oqaily, Yosr Jarraya, Mengyuan Zhang , Lingyu Wang, Makan Pourzandi, and Mourad Debbabi,
“iCAT: An Interactive Customizable Anonymization Tool ,”
European Symposium on Research in Computer Security (ESORICS ‘19 ) , Luxembourg, Sep. 23-27, 2019. [author copy ]
Mengyuan Zhang , Yue Xin, Lingyu Wang, Sushil Jajodia, and Anoop Singhal,
“CASFinder: Detecting Common Attack Surface ,”
IFIP Annual Conference on Data and Applications Security and Privacy (DBSec ‘19 ) , Charleston, SC, USA, July 15-17, 2019 (Best Paper Award ). [author copy ]
Taous Madi, Mengyuan Zhang , Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, and Mourad Debbabi,
“QuantiC: Distance Metrics for Evaluating Multi-tenancy Threats in Public Cloud ,”
IEEE International Conference on Cloud Computing Technology and Science (CloudCom ‘18 ) , Nicosia, Cyprus, Dec. 10-13, 2018. [author copy ]
Onur Duman, Mengyuan Zhang , Lingyu Wang, Mourad Debbabi,
“Measuring the Security Posture of IEC 61850 Substations with Redundancy Against Zero Day Attacks ,”
IEEE International Conference on Smart Grid Communications (SmartGridComm ‘17 ) , Dresden, Germany, Oct. 23-26, 2017. [author copy ]
Lingyu Wang, Mengyuan Zhang , Sushil Jajodia, Anoop Singhal, Massimiliano Albanese,
“Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks ,”
European Symposium on Research in Computer Security (ESORICS ‘14 ) , Wroclaw, Poland, Sep. 7-11, 2014. [author copy ]
Journal articles
Junjian Ye, Xincheng Fei, Xavier de Carné de Carnavalet, Lianying Zhao, Lifa Wu, Mengyuan Zhang ,
“Detecting Command Injection Vulnerabilities in Linux-Based Embedded Firmware with LLM-based Taint Analysis of Library Functions ,”
Elsevier Computers & Security , 144, 103971, September 2024. [author copy ]
Sudershan Lakshmanan, Mengyuan Zhang , Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang,
“Caught-in-Translation (CiT): Detecting Cross-level Inconsistency Attacks in Network Functions Virtualization (NFV) ”,
IEEE Transactions on Dependable and Secure Computing (TDSC ) , vol. 21, no. 4, July-Aug. 2024, pp. 2964-2981. [author copy ]
Momen Oqaily, Mohammad Ekramul Kabir, Suryadipta Majumdar, Yosr Jarraya, Mengyuan Zhang , Makan Pourzandi, Lingyu Wang, and Mourad Debbabi,
“iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning ”,
IEEE Transactions on Dependable and Secure Computing (TDSC ) , vol. 21, no. 4, July-Aug. 2024, pp. 2799-2817. [author copy ]
Onur Duman, Mengyuan Zhang , Lingyu Wang, Mourad Debbabi, Ribal Atallah, Bernard Lebel,
“Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems ,”
IEEE Transactions on Dependable and Secure Computing (TDSC ) , vol. 19, no. 2, March-April 2022, pp. 1018-1035. [author copy ]
Gagandeep Singh Chawla, Mengyuan Zhang , Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, and Mourad Debbabi,
“VMGuard: State-based Proactive Verification of Virtual Network Isolation with Application to NFV ,”
IEEE Transactions on Dependable and Secure Computing (TDSC ) , vol. 18, no. 4, July-Aug. 2021, pp. 1553-1567. [author copy ]
Mengyuan Zhang , Xavier de Carné de Carnavalet, Lingyu Wang, Ahmed Ragab,
“Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security ,”
IEEE Transactions on Information Forensics and Security (TIFS ) , vol. 14, no. 9, Sep. 2019, pages 2315-2330. [author copy ]
Mina Khalili, Mengyuan Zhang , Daniel Borbor, Lingyu Wang, Nicandro Scarabeo, Michel-Ange Zamor,
“Monitoring and Improving Managed Security Services inside a Security Operation Center ,”
EAI Endorsed Transactions on Security and Safety , Vol. 5, No. 18, Jan. 2019. [author copy ]
Mengyuan Zhang , Lingyu Wang, Sushil Jajodia, Anoop Singhal,
“Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks’ Resilience against Zero-Day Attacks ,”
IEEE Transactions on Dependable and Secure Computing (TDSC ) , vol. 18, no. 1, Dec. 2018, pages 310-324. [author copy ]
Mengyuan Zhang , Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese,
“Network Diversity: A Security Metric for Evaluating the Resilience of Networks against Zero-Day Attacks ,”
IEEE Transactions on Information Forensics and Security (TIFS ) , vol. 11, no. 5, Jan. 2016, pages 1071-1086. [author copy ]
Book Chapters and Encyclopedia
Mengyuan Zhang (2023). Network Diversity . In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
Lingyu Wang, Mengyuan Zhang , Anoop Singhal, “Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks ,” in From Database to Cyber Security , Pierangela Samarati, Indrajit Ray, Indrakshi Ray, editors, Springer, 2018
Mengyuan Zhang , Lingyu Wang, Sushil Jajodia, Anoop Singhal, “Evaluating the network diversity of networks against zero-day attacks ,” in Network Security Metrics , Lingyu Wang, Sushil Jajodia, Anoop Singhal, editors, Springer, 2017
Patents
“Caught-in-Translation (CiT): A Novel System for Translation-based Real-time Inconsistency Detection in NFV”, Filed Patent
“Utility optimized differential privacy system”, Filed Patent, Application number: 17610795
“Microservice Profiling in Containerized Environments for Data Driven Approaches,”, Filed Patent, Publication number: WO2021105905A1
“Data Anonymization Views,” Filed Patent, Publication number: WO2020222140A1
“Utility Optimized Differential Privacy System,” Filed Patent, Publication number: WO2020230061A1
Taous Madi, Mengyuan Zhang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “Apparatus and Method for Evaluating Multiple Aspects of the Security for Virtualized Infrastructure in a Cloud Environment,” publication number: US2021152572A1