Nabil A. Schear

Nabil Schear, Patrick T. Cable II, Thomas Moyer, Bryan Richard, and Robert Rudd, Bootstrapping and Maintaining Trust in the Cloud, 32nd Annual Computer Security Applications Conference, ACSAC 2016, New York, NY, USA, December 2016.
(Full Paper)

Thomas Moyer, Patrick Cable, Karishma Chada, Robert Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank Capobianco, and Trent Jaeger, Leveraging Data Provenance to Enhance Cyber Resilience, 1st IEEE Cybersecurity Development Conference (SecDev'16). Boston, MA, USA, November 2016.
(Full Paper)

Nabil Schear, Patrick T. Cable II, Thomas Moyer, Bryan Richard, and Robert Rudd, Bootstrapping and Maintaining Trust in the Cloud, 32nd Annual Computer Security Applications Conference, ACSAC 2015, pp. 1–10, New York, NY, USA, 2016.
(Full Paper)

Hamlin, A., Schear, N., Shen, E., Varia, M., Yakoubov, S., Yerukhimovich, A., Cryptography for Big Data Security, Chapter in Big Data: Storage, Sharing, and Security, Fei Hu (editor), Auerbach Publications, May 3, 2016.
(Book Chapter)

Cable, P., Schear, N., Spyglass: Demand-Provisioned Linux Containers for Private Network Access, Proceedings of the 29th Large Installation System Administration conference (LISA15), Washington DC, 8-13 November 2015.
(Full Paper)

S. Yakoubov, V. Gadepally, N. Schear, E. Shen and A. Yerukhimovich, A survey of cryptographic approaches to securing big-data analytics in the cloud, High Performance Extreme Computing Conference (HPEC), 2014 IEEE, 1-6, Sept 2014.
(Full Paper)

Kepner, J., Gadepally, V., Michaleas, P., Schear, N., Varia, M., Yerukhimovich, A., Computing on masked data: a high performance method for improving big data veracity, High Performance Extreme Computing Conference (HPEC), p. 1-6, 2014.
(Full Paper)

Simpson, A., Schear, N., and Moyer, T., Runtime Integrity Measurement and Enforcement with Automated Whitelist Generation, ACSAC, 2014.
(Abstract)

Gong, X., Borisov, N., Kiyavash, N., Schear, N., Website Detection Using Remote Traffic Analysis, PETS, 2012.

Schear, N., Preventing Encrypted Traffic Analysis, Ph.D. Dissertation, University of Illinois, 2011.

Zhang, Q., McCullough, J., Ma, J., Schear, N., Vrable, M., Vahdat, A., Snoren, A., Voelker, G., Savage, S., Neon: System Support for Derivated Data Management, ACM VEE, 2010.

Nguyen, A., Schear, N., Jung, H., Godiyal, A., King, S., Nguyen, H., MAVMM: Lightweight and Purpose Built VMM for Malware Analysis, ACSAC, 2009.

Schear, N., Borisov, N., Preventing SSL Traffic Analysis with Realistic Cover Traffic, ACM CCS, 2009.

Nicol, D., Schear, N., Models of Privacy Preserving Traffic Tunneling, SIMULATION: Transactions of The Society for Modeling and Simulation International, 2009.

Schear, N., Albrecht, D., Borisov, N., High-Speed Matching of Vulnerability Signatures, RAID, 2008.

Schear, N., Nicol, D., Performance Analysis of Real Traffic Carried with Encrypted Cover Flows, ACM/IEEE/SCS PADS, 2008.

Schear, N., The Design and Implementation of Glavlit: A Transparent Data Confinement System, M.S. Thesis, University of California at San Diego, 2007.

Schear, N., Kintana, C., Zhang, Q., Vahdat, A., Glavlit: Preventing Exfiltration at Wire Speed, ACM HotNets, 2006.

 

top of page