Automated Discovery for Emulytics

Describes automated methods and tools for discovering information systems through network and host analysis to create high-fidelity emulation models, demonstrated on SCinet with 5 routers and 10,000 endpoints.

March 24, 2020 · 1 min · Jonathan Crussell

Quantifying Uncertainty in Emulations: LDRD Report

Sandia LDRD report summarizing a three-year project to quantify behavioral (not performance) differences between emulations and real-world systems by running representative workloads on both and comparing collected metrics.

September 22, 2019 · 2 min · Jonathan Crussell

QUE LDRD Tools

Research infrastructure that executed over 10,000 experiments processing half a petabyte of data to quantify behavioral differences between virtual and physical testbeds for cyber security research validation.

September 1, 2019 · 1 min · Jonathan Crussell

Lessons learned from 10k experiments to compare virtual and physical testbeds

Documents lessons learned from running over 10,000 experiments and processing half a petabyte of data to quantify behavioral (not just performance) differences between virtual and physical testbeds for cyber security research.

August 12, 2019 · 2 min · Jonathan Crussell

Virtually the same: Comparing physical and virtual testbeds

Comparative analysis quantifying behavioral differences between physical and virtual testbeds for cyber security research to assess the fidelity of virtualized environments for experimentation.

February 18, 2019 · 2 min · Jonathan Crussell

discovery toolset

Automated toolset that transforms network and host discovery data into high-fidelity emulation models, demonstrated by modeling SCinet’s 10,000 endpoints and enabling rapid Emulytics experimentation.

November 10, 2018 · 1 min · Jonathan Crussell

minimega toolset

Fast, lightweight distributed VM orchestration platform that scales from laptops to massive clusters with virtually no setup, enabling large-scale cyber security experiments and emulation testbeds.

November 10, 2018 · 1 min · Jonathan Crussell

On the Origin of Mobile Apps: Network Provenance for Android Applications

Proposes Mobile Trusted-Origin Policy to authenticate mobile apps accessing network APIs by annotating HTTP requests with app provenance, preventing click fraud and API abuse through code isolation and origin verification.

March 9, 2016 · 2 min · Jonathan Crussell

Attacking DBSCAN for Fun and Profit

Demonstrates how adversaries can subvert DBSCAN clustering by injecting bridge points to merge arbitrary clusters, degrading system performance, and proposes machine learning-based remediation using outlier detection.

April 30, 2015 · 2 min · Jonathan Crussell

Scalable Semantics-Based Detection of Similar Android Apps: Design, Implementation, and Applications

PhD dissertation presenting scalable semantics-based approaches for detecting similar Android applications, with applications to clone detection, malware analysis, and security assessment.

December 31, 2014 · 2 min · Jonathan Crussell