Teryl Taylor
contact information
Research Staff Member - Security ServicesThomas J. Watson Research Center, Yorktown Heights, NY USA +1
914
945
1838



links
2020
Detecting Adversarial Attacks through Decoy Training
Zhang Jialong, Araujo Frederico, Taylor Teryl, Stoecklin Marc Philippe
2020
Abstract machine learning, decoy, computer science, artificial neural network, artificial intelligence, adversarial system
Zhang Jialong, Araujo Frederico, Taylor Teryl, Stoecklin Marc Philippe
2020
Abstract machine learning, decoy, computer science, artificial neural network, artificial intelligence, adversarial system
2018
Cross-Stack Threat Sensing for Cyber Security and Resilience
Frederico Araujo, Teryl Taylor, Jialong Zhang, Marc Ph. Stoecklin
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Frederico Araujo, Teryl Taylor, Jialong Zhang, Marc Ph. Stoecklin
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception
Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2018
Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2018
Dressed Up: Baiting Attackers through Endpoint Service Projection
Marc Ph. Stoecklin, Jialong Zhang, Frederico Araujo and Teryl Taylor
SDN-NFV Security '18: Proceedings of the ACM Workshop on Security in Software Defined Networks & Network Function Virtualization (in conjunction with CODASPY '18), 2018
Marc Ph. Stoecklin, Jialong Zhang, Frederico Araujo and Teryl Taylor
SDN-NFV Security '18: Proceedings of the ACM Workshop on Security in Software Defined Networks & Network Function Virtualization (in conjunction with CODASPY '18), 2018
2017
POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality
Anne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2523-2525
Abstract sight, ransomware, intrusion detection and prevention, deception, data theft, data integrity, confidentiality, computer security, computer science
Anne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2523-2525
Abstract sight, ransomware, intrusion detection and prevention, deception, data theft, data integrity, confidentiality, computer security, computer science
2016
Using Context to Improve Network-based Exploit Kit Detection
Teryl Taylor
2016
exploit kit, computer science, computer architecture
Teryl Taylor
2016
exploit kit, computer science, computer architecture
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire
Teryl Taylor, Kevin Z. Snow, Nathan Otterness, Fabian Monrose
Network and Distributed System Security Symposium, 2016
embedded system, computer science, cache
Teryl Taylor, Kevin Z. Snow, Nathan Otterness, Fabian Monrose
Network and Distributed System Security Symposium, 2016
embedded system, computer science, cache
BotMeter: Charting DGA-Botnet Landscapes in Large Networks
Ting Wang, Xin Hu, Jiyong Jang, Shouling Shi, Marc Ph. Stoecklin, and Teryl Taylor
Distributed Computing Systems (ICDCS), 2016 IEEE 36th International Conference on, pp. 334--343
Abstract
Ting Wang, Xin Hu, Jiyong Jang, Shouling Shi, Marc Ph. Stoecklin, and Teryl Taylor
Distributed Computing Systems (ICDCS), 2016 IEEE 36th International Conference on, pp. 334--343
Abstract
Detecting Malicious Exploit Kits using Tree-based Similarity Searches
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, and Reiner Sailer
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, and Reiner Sailer
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016