Teryl Taylor  Teryl Taylor photo         

contact information

Research Staff Member - Security Services
Thomas J. Watson Research Center, Yorktown Heights, NY USA



Detecting Adversarial Attacks through Decoy Training
Zhang Jialong, Araujo Frederico, Taylor Teryl, Stoecklin Marc Philippe
Abstract   machine learning, decoy, computer science, artificial neural network, artificial intelligence, adversarial system


Cross-Stack Threat Sensing for Cyber Security and Resilience
Frederico Araujo, Teryl Taylor, Jialong Zhang, Marc Ph. Stoecklin
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception
Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2018

Dressed Up: Baiting Attackers through Endpoint Service Projection
Marc Ph. Stoecklin, Jialong Zhang, Frederico Araujo and Teryl Taylor
SDN-NFV Security '18: Proceedings of the ACM Workshop on Security in Software Defined Networks & Network Function Virtualization (in conjunction with CODASPY '18), 2018


POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality
Anne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2523-2525
Abstract   sight, ransomware, intrusion detection and prevention, deception, data theft, data integrity, confidentiality, computer security, computer science


Using Context to Improve Network-based Exploit Kit Detection
Teryl Taylor
exploit kit, computer science, computer architecture

Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire
Teryl Taylor, Kevin Z. Snow, Nathan Otterness, Fabian Monrose
Network and Distributed System Security Symposium, 2016
embedded system, computer science, cache

BotMeter: Charting DGA-Botnet Landscapes in Large Networks
Ting Wang, Xin Hu, Jiyong Jang, Shouling Shi, Marc Ph. Stoecklin, and Teryl Taylor
Distributed Computing Systems (ICDCS), 2016 IEEE 36th International Conference on, pp. 334--343

Detecting Malicious Exploit Kits using Tree-based Similarity Searches
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, and Reiner Sailer
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016