Dr. Ting-Fang Yen
11 Cambridge Center
Cambridge, MA 02142 USA
Ting-Fang Yen is a research scientist at RSA Laboratories, the security division of EMC. Ting-Fang's research interests include network security and data analysis for security applications. Ting-Fang received a B.S. degree in Computer Science and Information Engineering from National Chiao Tung University, Taiwan, and M.S. and Ph.D. degrees in Electrical and Computer Engineering from Carnegie Mellon University.
Detecting Stealthy malware Using Behavioral Features in Network Traffic, Ph.D. Thesis, Carnegie Mellon University, 2011.
Sherlock Holmes and the Case of the Advanced Persistent Threat, Ari Juels and Ting-Fang Yen, in 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), April 2012
Revisiting Botnet Models and Their Implications for Takedown Strategies, Ting-Fang Yen, Michael K. Reiter, in First Conference on Principles of Security and Trust (POST), March 2012.
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications, Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, and Martin Abadi, in 19th Annual Network and Distributed System Security Symposium (NDSS), February 2012.Understanding Domain Registration Abuses, Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, and Michael K. Reiter, in Security and Privacy - Silver Linings in the Cloud, 25th IFIP TC-11 International Information Security Conference (SEC), September 2010.
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart, Ting-Fang Yen and Michael K. Reiter, in 30th International Conference on Distributed Computing Systems (ICDCS), June 2010.
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications, Ting-Fang Yen, Xin Huang, Fabian Monrose, and Michael K. Reiter, in 6th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), July 2009.
Traffic Aggregation for Malware Detection, Ting-Fang Yen and Michael K. Reiter, in 5th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), July 2008.
Fast and Versatile Algorithm for Nearest Neighbor Search Based on a Lower Bound Tree, Yong-Sheng Chen, Yi-Ping Hung, Ting-Fang Yen, Chiou-Shann Fuh, Pattern Recognition 40(2):360-375, February 2007.