Patents
- Method, System, and Computer Program Product for Creating Collages that Visually Resemble a Particular Shape or Group of Shapes, US Patent pending.
- Method, System, and Computer Program Product for Comparing or Measuring Information Content in at Least One Data Stream, US Patent pending.
- Method and System for Identifying at Least One of Undesirable Network Traffic, Computer Programs, and Computer Files, US Patent pending.
- Method, System, and Computer Program Product for Detecting Security Threats in a Computer Network, U.S. Patent 8,079,090.
Publications
- Kevin Borders, Jonathan Springer, Matthew Burnside, Chimera: A Declarative Language for Streaming Network Traffic Analysis. Proceedings of the 21st USENIX Security Symposium, Aug. 2012. [video] [pdf]
- Kevin Borders, Protecting Confidential Information from Malicious Software. Ph. D. Thesis, May 2009. [pdf]
- Kevin Borders, Eric Vander Weele, Billy Lau, and Atul Prakash, Protecting Confidential Data on Personal Computers with Storage Capsules. Proceedings of the 18th USENIX Security Symposium, Aug. 2009. [pdf]
- Kevin Borders and Atul Prakash, Quantifying Information Leaks in Outbound Web Traffic. Proceedings of the IEEE Symposium on Security and Privacy, May 2009. [pdf]
- Xin Zhao, Kevin Borders, and Atul Prakash, Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers. Proceedings of the AVM/IFIP/USENIX 9th International Middleware Conference, Dec. 2008. [pdf]
- Garett Brown, Travis Howe, Micheal Ihbe, Atul Prakash, and Kevin Borders, Social Networks and Context-Aware Spam. Proceedings of the ACM 2008 Conference on Computer Supported Cooperative Work, Nov. 2008. [pdf]
- Kevin Borders and Atul Prakash, Towards Quantification of Network-Based Information Leaks via HTTP. Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HOTSEC '08), Jul. 2008. [pdf]
- Laura Falk, Atul Prakash, and Kevin Borders, Analyzing Websites for User-Visible Security Design Flaws. Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Jul. 2008. [pdf]
- Kevin Borders, Atul Prakash, and Mark Zielinski, Spector: Automatically Analyzing Shell Code. Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC '07), Dec. 2007. [pdf]
- Kevin Borders and Atul Prakash, Securing Network Input via a Trusted Input Proxy. Proceedings of the 2nd USENIX Workshop on Hot Topics in Security (HOTSEC '07), Aug. 2007. [pdf]
- Kevin Borders, Xin Zhao, and Atul Prakash, Securing Sensitive Content in a View-Only File System. Proceedings of the 6th ACM Workshop on Digital Rights Management, Oct. 2006. [pdf]
- Kevin Borders, Xin Zhao, and Atul Prakash, Virtual Machine Security Systems. Book Chapter To Appear in Advances in Computer Science and Engineering.
- Patrick Traynor, Kevin Butler, William Enck, Kevin Borders, and Patrick McDaniel, Malnets: Large-Scale Malicious Networks via Compromised Wireless Access Points. Technical Report NAS-TR-0048-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, Sept. 2006.
- Xin Zhao, Atul Prakash, Brian Noble, and Kevin Borders, Improving Distributed File System Performance in Virtual Machine Environments. University of Michigan Technical Report CSE-TR-526-06, Sept. 2006.
[pdf]
- Kevin Borders, Laura Falk, Atul Prakash, OpenFire: Opening Networks to Reduce Network Attacks on Legitimate Services. University of Michigan Technical Report CSE-TR-517-06, May 2006. [pdf]
- Kevin Borders, Xin Zhao, and Atul Prakash, Siren: Catching Evasive
Malware (Short Paper). Proceedings of the IEEE Symposium on Security
and Privacy, May 2006. [pdf]
- Xin Zhao, Kevin Borders, and Atul Prakash, Towards protecting sensitive Files in a compromised system. Proceedings of 3rd International IEEE Security in Storage Workshop, Dec. 2005. [pdf]
- Xin Zhao, Kevin Borders, and Atul Prakash, Svgrid: A secure virtual environment for untrusted grid applications. Proceedings of the 6th International ACM/IFIP/USENIX Middleware Conference, Dec. 2005. [pdf]
- Kevin Borders, Xin Zhao, and Atul Prakash, CPOL: High-Performance
Policy Evaluation. Proceedings of the 12th ACM Conference on Computer
and Communications Security (CCS), Nov. 2005.
[pdf]
- Kevin Borders and Atul Prakash, Web Tap: Detecting Covert Web Traffic.
Proceedings of the 11th ACM Conference on Computer and Communications
Security (CCS), Oct. 2004. [pdf]