Birhanu Eshete, Ph.D.

Assistant Professor, Computer and Information Science
Birhanu Eshete
College of Engineering and Computer Science
Computer and Information Science
DAIR
313-583-6669
229 Computer and Information Science Building | 4901 Evergreen Road | Dearborn, MI 48128
CIS 482/582: Monday: 4pm - 5:30pm or by appointment. CIS 474/574: Tuesday: 4pm - 5: 30pm or by appointment.

Teaching Areas:

Computer and Information Science, Cybersecurity and Information Assurance

Research Areas:

Computing and Networks, Cybersecurity

Biography and Education

Education

  • Ph.D., University of Trento
  • M.Sc., Addis Ababa University
  • B.S., Addis Ababa University

Teaching and Research

Courses Taught

Selected Publications

  1. Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang. DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship. Proceedings of the 32nd USENIX Security Symposium (SEC’23), 2023.
  2. Ismat Jarin, Birhanu Eshete. MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members. Proceedings of the 23rd Privacy Enhancing Technologies Symposium (PETS'23), 2023.
  3. Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran. Adversarial Detection of Censorship Measurements. Proceedings of the 21st ACM Workshop on Privacy in the Electronic Society (WPES’22), co-located with the 29th ACM Conference on Computer and Communications Security (CCS'22), 202
  4. Ismat Jarin, Birhanu Eshete. DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning. Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2022.
  5. Abderrahmen Amich, Birhanu Eshete. EG-Booster: Explanation-Guided Booster of ML Evasion Attacks. Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2022.
  6. Abderrahmen Amich, Birhanu Eshete. Morphence: Moving Target Defense Against Adversarial Examples. Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC), 2021.
  7. Abderrahmen Amich, Birhanu Eshete. Explanation-Guided Diagnosis of Machine Learning Evasion Attacks. In Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2021.
  8. Abdullah Ali, Birhanu Eshete. Best-Effort Adversarial Approximation of Black-Box Malware Classifiers. In Proceedings of the 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2020.
  9. Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V.N. Venkatakrishnan. Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. In Proceedings of the 26th ACM Conference on Computer and Communications Security (ACM CCS), 2019.
  10. Sadegh M. Milajerdi, Rigel Gjomemo, Birhanu Eshete, R. Sekar, V.N. Venkatakrishnan. HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows. In Proceedings of the 40th IEEE Security and Privacy Symposium (S&P), 2019.
  11. Abeer Alhuzali,  Rigel Gjomemo, Birhanu Eshete, Venkat Venkatakrishnan. NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications. In Proceedings of the USENIX Security Symposium (USENIX SEC), 2018.
  12. Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller, Venkat Venkatakrishnan. SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. In Proceedings of the USENIX Security Symposium (USENIX SEC), 2017.
  13. Birhanu Eshete, Venkat Venkatakrishnan. DynaMiner: Leveraging Infection Dynamics Analytics for On-the-Wire Malware Detection. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017.
  14. Abeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, Venkat Venkatakrishnan. Chainsaw: Chained Automated Workflow-based Exploit Generation. In Proceedings of Computer and Communications Security (ACM CCS), 2016.
  15. Birhanu Eshete, Venkat Venkatakrishnan. WebWinnow: Leveraging Exploit Kit Workflows to Detect Malicious URLs. In Proceedings of Conference on Data and Application Security and Privacy (ACM CODASPY), 2014.

Awards and Recognition

  • 2023 NSF CAREER Award (Award #2238084)
  • 2021 NSF Research Grant (Award #2103596)
  • 2020 U.S. Patent (0059481)
  • 2019 Research Grant, NSF/UIC
  • 2019  Ford Summer Sabbatical Program
  • 2018  Applied Research Competition Finalist (US-Canada), CSAW'18
  • 2018  Distinguished Paper Award, USENIX Security'18
  • 2013  USENIX Travel Grant, USENIX Association
  • 2010  Best Paper Award, ICDS 2010