Birhanu Eshete, Ph.D.

Assistant Professor, Computer and Information Science
Birhanu Eshete
College of Engineering and Computer Science
Computer and Information Science
313-583-6669
242 Computer and Information Science Building | 4901 Evergreen Road | Dearborn, MI 48128
Not Teaching

Teaching Areas:

Computer and Information Science, Cybersecurity and Information Assurance

Research Areas:

Computing and Networks, Cybersecurity

Biography and Education

Education

  • Ph.D., University of Trento
  • M.Sc., Addis Ababa University
  • B.S., Addis Ababa University

Teaching and Research

Courses Taught

Selected Publications

  1. Ismat Jarin, Birhanu Eshete. DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning. Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2022.
  2. Abderrahmen Amich, Birhanu Eshete. EG-Booster: Explanation-Guided Booster of ML Evasion Attacks. Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2022.
  3. Abderrahmen Amich, Birhanu Eshete. Morphence: Moving Target Defense Against Adversarial Examples. Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC), 2021.
  4. Birhanu Eshete. Making Machine Learning Trustworthy. Science, Vol. 373, Issue 6556, pp. 743-744, American Association for the Advancement of Science, 2021.
  5. Abderrahmen Amich, Birhanu Eshete. Explanation-Guided Diagnosis of Machine Learning Evasion Attacks. In Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2021.
  6. Abdullah Ali, Birhanu Eshete. Best-Effort Adversarial Approximation of Black-Box Malware Classifiers. In Proceedings of the 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2020.
  7. Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V.N. Venkatakrishnan. Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. In Proceedings of the 26th ACM Conference on Computer and Communications Security (ACM CCS), 2019.
  8. Sadegh M. Milajerdi, Rigel Gjomemo, Birhanu Eshete, R. Sekar, V.N. Venkatakrishnan. HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows. In Proceedings of the 40th IEEE Security and Privacy Symposium (S&P), 2019.
  9. Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V.N. Venkatakrishnan. ProPatrol: Attack Investigation via Extracted High-Level Tasks. In Proceedings of the 14th International Conference on Information Systems Security (ICISS), 2018.
  10. Abeer Alhuzali,  Rigel Gjomemo, Birhanu Eshete, Venkat Venkatakrishnan. NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications. In Proceedings of the USENIX Security Symposium (USENIX SEC), 2018.
  11. Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller, Venkat Venkatakrishnan. SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. In Proceedings of the USENIX Security Symposium (USENIX SEC), 2017.
  12. Birhanu Eshete, Venkat Venkatakrishnan. DynaMiner: Leveraging Infection Dynamics Analytics for On-the-Wire Malware Detection. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017.
  13. Abeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, Venkat Venkatakrishnan. Chainsaw: Chained Automated Workflow-based Exploit Generation. In Proceedings of Computer and Communications Security (ACM CCS), 2016.
  14. Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip Porras, Venkat Venkatakrishnan, Vinod Yegneswaran. EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration. In Proceedings of Network and Distributed Systems Security Symposium (ISOC NDSS), 2015.
  15. Birhanu Eshete, Venkat Venkatakrishnan. WebWinnow: Leveraging Exploit Kit Workflows to Detect Malicious URLs. In Proceedings of Conference on Data and Application Security and Privacy (ACM CODASPY), 2014.

Awards and Recognition

  • 2021 NSF Research Grant (Award #2103596)
  • 2020 U.S. Patent (0059481)
  • 2019 Research Grant, NSF/UIC
  • 2019  Ford Summer Sabbatical Program
  • 2018  Applied Research Competition Finalist (US-Canada), CSAW'18
  • 2018  Distinguished Paper Award, USENIX Security'18
  • 2013  USENIX Travel Grant, USENIX Association
  • 2010  Best Paper Award, ICDS 2010