Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Adam Doupé is active.

Publication


Featured researches published by Adam Doupé.


computer and communications security | 2011

Fear the EAR: discovering and mitigating execution after redirect vulnerabilities

Adam Doupé; Bryce Boe; Christopher Kruegel; Giovanni Vigna

The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security vulnerabilities to gain unauthorized access to the web application environment. Previous research into web application vulnerabilities has mostly focused on input validation flaws, such as cross site scripting and SQL injection, while logic flaws have received comparably less attention. In this paper, we present a comprehensive study of a relatively unknown logic flaw in web applications, which we call Execution After Redirect, or EAR. A web application developer can introduce an EAR by calling a redirect method under the assumption that execution will halt. A vulnerability occurs when server-side execution continues after the developers intended halting point, which can lead to broken/insufficient access controls and information leakage. We start with an analysis of how susceptible applications written in nine web frameworks are to EAR vulnerabilities. We then discuss the results from the EAR challenge contained within the 2010 International Capture the Flag Competition. Finally, we present an open-source, white-box, static analysis tool to detect EARs in Ruby on Rails web applications. This tool found 3,944 EAR instances in 18,127 open-source applications. Finally, we describe an approach to prevent EARs in web frameworks.


annual computer security applications conference | 2011

Hit 'em where it hurts: a live security exercise on cyber situational awareness

Adam Doupé; Manuel Egele; Benjamin Caillat; Gianluca Stringhini; Gorkem Yakin; Ali Zand; Ludovico Cavedon; Giovanni Vigna

Live security exercises are a powerful educational tool to motivate students to excel and foster research and development of novel security solutions. Our insight is to design a live security exercise to provide interesting datasets in a specific area of security research. In this paper we validated this insight, and we present the design of a novel kind of live security competition centered on the concept of Cyber Situational Awareness. The competition was carried out in December 2010, and involved 72 teams (900 students) spread across 16 countries, making it the largest educational live security exercise ever performed. We present both the innovative design of this competition and the novel dataset we collected. In addition, we define Cyber Situational Awareness metrics to characterize the toxicity and effectiveness of the attacks performed by the participants with respect to the missions carried out by the targets of the attack.


2016 APWG Symposium on Electronic Crime Research (eCrime) | 2016

Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin

Kevin Liao; Ziming Zhao; Adam Doupé; Gail Joon Ahn

Bitcoin, a decentralized cryptographic currency that has experienced proliferating popularity over the past few years, is the common denominator in a wide variety of cybercrime. We perform a measurement analysis of CryptoLocker, a family of ransomware that encrypts a victims files until a ransom is paid, within the Bitcoin ecosystem from September 5, 2013 through January 31, 2014. Using information collected from online fora, such as reddit and BitcoinTalk, as an initial starting point, we generate a cluster of 968 Bitcoin addresses belonging to CryptoLocker. We provide a lower bound for CryptoLockers economy in Bitcoin and identify 795 ransom payments totalling 1,128.40 BTC (


ieee symposium on security and privacy | 2016

SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam

Huahong Tu; Adam Doupé; Ziming Zhao; Gail Joon Ahn

310,472.38), but show that the proceeds could have been worth upwards of


conference on data and application security and privacy | 2017

Deep Android Malware Detection

Niall McLaughlin; Jesus Martinez del Rincon; BooJoong Kang; Suleiman Y. Yerima; Paul C. Miller; Sakir Sezer; Yeganeh Safaei; Erik Trickel; Ziming Zhao; Adam Doupé; Gail Joon Ahn

1.1 million at peak valuation. By analyzing ransom payment timestamps both longitudinally across CryptoLockers operating period and transversely across times of day, we detect changes in distributions and form conjectures on CryptoLocker that corroborate information from previous efforts. Additionally, we construct a network topology to detail CryptoLockers financial infrastructure and obtain auxiliary information on the CryptoLocker operation. Most notably, we find evidence that suggests connections to popular Bitcoin services, such as Bitcoin Fog and BTC-e, and subtle links to other cybercrimes surrounding Bitcoin, such as the Sheep Marketplace scam of 2013. We use our study to underscore the value of measurement analyses and threat intelligence in understanding the erratic cybercrime landscape.


computer and communications security | 2016

Checking Intent-based Communication in Android with Intent Space Analysis

Yiming Jing; Gail Joon Ahn; Adam Doupé; Jeong Hyun Yi

Telephone spam costs United States consumers


acm symposium on applied computing | 2013

EARs in the wild: large-scale analysis of execution after redirect vulnerabilities

Pierre Payet; Adam Doupé; Christopher Kruegel; Giovanni Vigna

8.6 billion annually. In 2014, the Federal Trade Commission has received over 22 million complaints of illegal and wanted calls. Telephone spammers today are leveraging recent technical advances in the telephony ecosystem to distribute massive automated spam calls known as robocalls. Given that anti-spam techniques and approaches are effective in the email domain, the question we address is: what are the effective defenses against spam calls? In this paper, we first describe the telephone spam ecosystem, specifically focusing on the differences between email and telephone spam. Then, we survey the existing telephone spam solutions and, by analyzing the failings of the current techniques, derive evaluation criteria that are critical to an acceptable solution. We believe that this work will help guide the development of effective telephone spam defenses, as well as provide a framework to evaluate future defenses.


2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT) | 2016

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation

Huahong Tu; Adam Doupé; Ziming Zhao; Gail Joon Ahn

In this paper, we propose a novel android malware detection system that uses a deep convolutional neural network (CNN). Malware classification is performed based on static analysis of the raw opcode sequence from a disassembled program. Features indicative of malware are automatically learned by the network from the raw opcode sequence thus removing the need for hand-engineered malware features. The training pipeline of our proposed system is much simpler than existing n-gram based malware detection methods, as the network is trained end-to-end to jointly learn appropriate features and to perform classification, thus removing the need to explicitly enumerate millions of n-grams during training. The network design also allows the use of long n-gram like features, not computationally feasible with existing methods. Once trained, the network can be efficiently executed on a GPU, allowing a very large number of files to be scanned quickly.


acm symposium on applied computing | 2014

Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security

Yan Shoshitaishvili; Luca Invernizzi; Adam Doupé; Giovanni Vigna

Intent-based communication is an inter-application communication mechanism in Android. While its importance has been proven by plenty of security extensions that protect it with policy-driven mandatory access control, an overlooked problem is the verification of the security policies. Checking one security extensions policy is indeed complex. Furthermore, intent-based communication introduces even more complexities because it is mediated by multiple security extensions that respectively enforce their own incompatible, distributed, and dynamic policies. This paper seeks a systematic approach to address the complexities involved in checking intent-based communication. To this end, we propose intent space analysis. Intent space analysis formulates the intent forwarding functionalities of security extensions as transformations on a geometric intent space. We further introduce a policy checking framework called IntentScope that proactively and automatically aggregates distributed policies into a holistic and verifiable view. We evaluate our approach against customized Android OSs and commodity Android devices. In addition, we further conduct experiments with four security extensions to demonstrate how our approach helps identify potential vulnerabilities in each extension.


color imaging conference | 2016

Towards Automated Threat Intelligence Fusion

Ajay Modi; Zhibo Sun; Anupam Panwar; Tejas Khairnar; Ziming Zhao; Adam Doupé; Gail Joon Ahn; Paul Black

Execution After Redirect vulnerabilities---logic flaws in web applications where unintended code is executed after a redirect---have received little attention from the research community. In fact, we found a research paper that incorrectly modeled the redirect semantics, causing their static analysis to miss EAR vulnerabilities. To understand the breadth and scope of EARs in the real world, we performed a large-scale analysis to determine the prevalence of EARs on the Internet. We crawled 8,097,283 URLs from 255,957 domains. We employ a black-box approach that finds EARs which manifest themselves by information leakage in the HTTP redirect response. For this type of EAR, we developed a classification system that discovered 2,173 security-critical EARs among 416 domains. This result shows that EARs are a serious and prevalent problem on the Internet today and deserve future research attention.

Collaboration


Dive into the Adam Doupé's collaboration.

Top Co-Authors

Avatar

Gail Joon Ahn

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Ziming Zhao

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Giovanni Vigna

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Huahong Tu

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Mike Mabey

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge