Former group member (MS, 2016; Ph.D., 2020).
Now at Georgetown University.
Publications with the Performability Engineering Research Group
An Attack Model, Language, and Injector for the Control Plane of Software-defined Networks.
B. E. Ujcich. (16UJC01)
M.S. thesis, University of Illinois at Urbana-Champaign, 2016.
ATTAIN: An Attack Injection Framework for Software-defined Networking.
B. E. Ujcich, U. Thakore, and W. H. Sanders. (16UJC03)
Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, Colorado, June 26-29, 2017, pp. 567-578. [IEEE Xplore entry]
REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks.
V. Badrinath Krishna, M. Rausch, B. E. Ujcich, I. Gupta, and W. H. Sanders. (16BAD01)
Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, Colorado, June 26-29, 2017, pp. 321-332. [IEEE Xplore entry]
Towards an Accountable Software-Defined Networking Architecture.
B. E. Ujcich, A. Miller, A. Bates, and W. H. Sanders. (17UJC01)
Proceedings of the 2017 IEEE Conference on Network Softwarization (NetSoft), Bologna, Italy, July 3-7, 2017, pp. 1-5. [IEEE Xplore entry]
A Provenance Model for the European Union General Data Protection Regulation.
B. E. Ujcich, A. Bates, and W. H. Sanders. (18UJC02)
Proceedings of the International Provenance and Annotation Workshop (IPAW 2018), London, UK, July 9-13, 2018 (K. Belhajjame, A. Gehani, and P. Alper, Eds.), pp. 45-57, Lecture Notes in Computer Science, vol. 11017. Cham: Springer. [The final publication is available at link.springer.com: Springer Link entry]
Data Provenance for Accountability Mechanisms and Properties.
B. E. Ujcich, A. Bates, and W. H. Sanders. (18UJC03)
Proceedings of the First Workshop on Supporting Algorithm Accountability Using Provenance: Opportunities and Challenges, London, UK, July 12, 2018. Online: https://sociam.github.io/saap-workshop/
Cross-App Poisoning in Software-Defined Networking.
B. E. Ujcich, S. Jero, A. Edmundson, Q. Wang, R. Skowyra, J. Landry, A. Bates, W. H. Sanders, C. Nita-Rotaru, and H. Okhravi. (18UJC04)
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS), Toronto, Canada, October 15-19, 2018, pp. 648-663. [ACM: https://doi.org/10.1145/3243734.3243759]
Data Protection Intents for Software-Defined Networking.
B. E. Ujcich and W. H. Sanders. (19UJC01)
Proceedings of the 2019 IEEE Conference on Network Softwarization (IEEE NetSoft), Paris, France, June 24-28, 2019, pp. 271-275. [IEEE Xplore entry]
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.
B. E. Ujcich, S. Jero, R. Skowyra, S. R. Gomez, A. Bates, W. H. Sanders, and H. Okhravi. (19UJC02)
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 23-26, 2020. [Paper in online proceedings]
Provenance for Intent-Based Networking.
B. E. Ujcich, A. Bates, and W. H. Sanders. (20UJC01)
Proceedings of the 6th IEEE Conference on Network Softwarization (NetSoft), online virtual conference, June 29-July 3, 2020, pp. 195-199. [IEEE Xplore entry]
Securing the Software-defined Networking Control Plane by Using Control and Data Dependency Techniques.
B. E. Ujcich. (20UJC03)
Ph.D. dissertation, University of Illinois at Urbana-Champaign, 2020.
Causal Analysis for Software-defined Networking Attacks.
B. E. Ujcich, S. Jero, R. Skowyra, A. Bates, W. H. Sanders, and H. Okhravi. (20UJC04)
Proceedings of the 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 11-13, 2021, pp. 3183-3200. [USENIX official version]
COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”
With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.