Selected Publications

Most publications listed have an alphabetical listing of authors or alpha with students listed first (organizational policy).

Undergraduate student authors are indicated by *.

Journal Articles

  1. Benjamin A. Kuperman and Eugene H. Spafford. Audlib: a configurable, high-fidelity application audit mechanism. Software: Practice and Experience, 40(11):989-1005, 2010. [ bib | SP&E DOI ]
  2. Nathaniel W. Gephart* and Benjamin A. Kuperman. Design of a Virtual Computer Lab Environment for hands-on Information Security Exercises. The Journal of Computing Sciences in Colleges 26(1):32-39, 2010. [ PDF | bib | ACM Library ]
  3. Hilmi Ozdoganoglu, T.N. Vijaykumar, Carla E. Brodley, and Benjamin A. Kuperman. SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address. IEEE Transactions on Computers, 55(10):1271-1285, October 2006. [ PDF | bib | IEEE DOI ]

Magazine Articles

  1. Benjamin A. Kuperman, Carla Brodley, Hilmi Ozdoganoglu, T. N. Vijaykumar, and Ankit Jalote. Detection and prevention of stack buffer overflow attacks. Communications of the ACM, 48(11):50-56, November 2005. [ PDF | bib | ACM DOI ]

PhD Dissertation

  1. Benjamin A. Kuperman. A Categorization of Computer Security Monitoring Systems and the Impact on the Design of Audit Sources. PhD thesis, Purdue University, West Lafayette, IN 47907-1398, August 2004. [ PDF | bib ]

Refereed Conference proceedings and presentations

  1. Jason D. Haugen, Michael Everdell*, and Benjamin A. Kuperman. 2015. "A new approach to Uto-Aztecan lexicostatistics" At the 18th Annual Workshop on American Indigenous Languages (WAIL 18), held at the University of California, Santa Barbara. May 8, 2015.
  2. Jason D. Haugen, Michael Everdell*, and Benjamin A. Kuperman. 2015. "Lexicostatistics, Tubar, and 'Sonoran'". At the joint LSA-SSILA Symposium: Uto-Aztecan Historical Linguistics at the Centennial. Held at the Linguistic Society of America (LSA) and Society for the Study of the Indigenous Languages of the Americas (SSILA) Annual Meeting, Portland, OR; January 9, 2015.
  3. Nicholas Hatt*, Axis Sivitz*, and Benjamin A. Kuperman. Benchmarking operating systems. In Midstates Conference for Undergraduate Research in Computer Science and Mathematics, pages 63-68, November 2007. [ PDF | bib ]
  4. Daniel S. Crosta*, Matthew J. Singleton*, and Benjamin A. Kuperman. Fighting Institutional Memory Loss: The Trackle Integrated Issue and Solution Tracking System. In Proceedings of LISA '06: 20th Large Installation System Administration Conference, pages 287-298, Washington, DC, December 2006. USENIX Association. [ PDF | bib | LISA '06 ]
  5. The CERIAS Intrusion Detection Research Group. Digging for worms, fishing for answers. In Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC'02), pages 219-226, December 2002. [ PDF | bib | ACSAC '02 ]
  6. Mark J. Crosbie and Benjamin A. Kuperman. A Building Block Approach to Intrusion Detection. Short paper presented at RAID 2001, September 2001. [ PDF | slides | bib | RAID 2001 ]
  7. Mark Crosbie and Benjamin Kuperman. Experiences in Specifications: Learning to Live With Ambiguity. In Proceedings of the 1st Symposium on Requirements Engineering for Information Security (SREIS 2001), 2001. CERIAS TR 2001-18. [ PDF | bib | SREIS 2001 ]
  8. Thomas E. Daniels, Benjamin A. Kuperman, and Eugene H. Spafford. Penetration Analysis of a XEROX Docucenter DC230ST: Assessing the Security of a Multi-purpose Office Machine. In Proceedings of the 23rd National Information Systems Security Conference, pages 167-178. October 2000. CERIAS TR 99-09. [ PDF | bib | 23rd NISSC ]

Technical Reports

  1. Owen Bell, Mark Allman, and Benjamin Kuperman. On Browser-Level Event Logging. Technical Report TR-12-001, International Computer Science Institute, Berkeley, CA, January 2012. [ PDF | bib | WWW ]
  2. Hilmi Ozdoganoglu, T. N. Vijaykumar, Carla E. Brodley, Ankit Jalote, and Benjamin A. Kuperman. SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address. Technical Report TR-ECE 03-13, Purdue University School of Electrical and Computer Engineering, West Lafayette, IN, November 2003. [ PDF | bib ]
  3. Hilmi Ozdoganoglu, Carla E. Brodley, T.N. Vijaykumar, and Benjamin A. Kuperman. SmashGuard: A Hardware Solution to Prevent Attacks on the Function Return Address. Technical Report TR-ECE 02-08, Purdue University School of Electrical and Computer Engineering, West Lafayette, IN, December 2002. [ PDF | bib ]
  4. Florian Buchholz, Thomas E. Daniels, Benjamin Kuperman, and Clay Shields. Packet Tracker Final Report. Technical Report CERIAS TR 2000-23, CERIAS, Purdue University, West Lafayette, IN 47907-1398, 2000. Results presented at Purdue Network Attack Traceback Workshop. [ PDF | bib ]
  5. Florian Buchholz, Thomas E. Daniels, and Clay Shields. Packet Tracker Technical Report 2. Technical Report CERIAS TR 2000-24, CERIAS, Purdue University, 2000. [ PDF | bib ]
  6. Thomas E. Daniels, Benjamin Kuperman, and Clay Shields. Packet Tracker Technical Report 1. Technical Report CERIAS TR 2000-22, CERIAS, Purdue University, 1999. [ PDF | bib ]
  7. Benjamin A. Kuperman and Eugene Spafford. Generation of Application Level Data via Library Interposition. Technical Report CERIAS TR 1999-11, COAST Laboratory, Purdue University, West Lafayette, IN, October 1999. [ PDF | bib ]

Patents Awarded

  1. U.S. Patent Number 7,577,998 B1 - "Method of detecting critical file changes" - Mark Crosbie, Benjamin Kuperman, August, 2009. [ PDF | bib | USPTO.gov ]
  2. U.S. Patent Number 7,134,141 B2 - "System and Method for Host and Network Based Intrusion Detection and Response" - Mark Crosbie, Benjamin Kuperman, Rosemarie Shepley, Leonard L. Frayman, November, 2006. [ PDF | bib | USPTO.gov ]
  3. U.S. Patent Number 7,007,301 B2 - "Computer Architecture for an Intrusion Detection System" - Mark Crosbie, Benjamin Kuperman, Rosemarie Shepley, Leonard L. Frayman, February, 2006. [ PDF | bib | USPTO.gov ]

Patent Applications

  1. Application Number 20040168078 "Apparatus, system and method for protecting function return address" - Carla Brodley, T N Vijaykumar, Hilmi Ozdoganoglu, Benjamin Kuperman, December, 2003.
  2. "Hardware support for protecting the function return address" - Carla Brodley, T N Vijaykumar, Benjamin Kuperman, Hilmi Ozdoganoglu, December, 2002.
  3. Application Number 10/298,219 "Method of and Apparatus for Detecting Creation of Set User Identification (setuid) Files" - Mark Crosbie, Benjamin Kuperman, November, 2002.
  4. "Method for Detecting Unexpected Privilege Escalations" - Mark Crosbie, Benjamin Kuperman, November, 2001.
  5. "Method for the Detection of UNIX Race Conditions Exploits" - Mark Crosbie, Benjamin Kuperman, November, 2001.