I'm currently working on extending
an anti-phishing browser extension, by combining local phish detection
with data sharing between peers to improve our collective immunity
I'm also working on a framework for sharing network security data
between multiple organizations for faster and more comprehensive
incident response, with a goal of automation and future incident
forecasting. This is a collaborative effort with USC/ISI, Los Alamos
National Laboratory, and Colorado State U.
Prior work entailed developing and evaluating content reuse
detection techniques on web-scale datasets, evaluating availability of
cloud services and systems, and securing personal cloud
Prior to prior work, I worked on delay-tolerant networks; I continue
to keep as updated as I can (and maybe write some code).
Interests include network protocols and analysis, data
visualization, information security and privacy, social networks.
C. Ardi, J. Heidemann. Precise Detection of Content Reuse in the Web. ACM SIGCOMM Computer Communication Review. Volume 49, Issue 2 (April 2019), p. 9-24. [doi, pdf]
C. Ardi, J. Heidemann. Leveraging Controlled Information Sharing for Botnet Activity Detection. Proceedings of the ACM SIGCOMM Workshop on Traffic Measurements for Cybersecurity (WTMC '18), p. 14-20. Budapest, Hungary. August 2018. [doi, pdf]
C. Ardi, J. Heidemann. AuntieTuna: Personalized Content-based Phishing Detection. Proceedings of the NDSS Workshop on Usable Security (USEC '16). San Diego, California, USA. February 2016. [doi, pdf]
C. Ardi, J. Heidemann. Poster: Lightweight Content-based Phishing Detection. Technical Report ISI-TR-2015-698, USC/Information Sciences Institute, May 2015. Presented at poster session of IEEE Security and Privacy Symposium 2015. [pdf]
G. Fisk, C. Ardi, N. Pickett, J. Heidemann, M. Fisk, C. Papadopoulos. Privacy Principles for Sharing Cyber Security Data. Proceedings of the IEEE International Workshop on Privacy Engineering (IWPE '15). San Jose, California, USA. May 2015. [doi, pdf]
C. Ardi, J. Heidemann. Web-scale Content Reuse Detection (extended). Technical Report ISI-TR-2014-692, USC/Information Sciences Institute, June 2014. [pdf]
Z. Hu, L. Zhu, C. Ardi, E. Katz-Bassett, H. V. Madhyastha, J. Heidemann, M. Yu. The Need for End-to-End Evaluation of Cloud Availability. Proceedings of the Passive and Active Measurement Workshop (PAM '14), p. 119-130. Marina del Rey, California, USA. March 2014. [doi, pdf]