Ten Most Significant Publications

 

Here we list the highest impact 10 publications, with some attention to spread across the years. After each entry, we give a brief statement of each publication’s key contribution and impact.

  1. Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, and Eugene Spafford, “Adepts: Adaptive Intrusion Response using Attack Graphs in an E-Commerce Environment,” In the International Conference on Dependable Systems and Networks (DSN), pp. 508-517, Yokohama, Japan, June 28 - July 1, 2005. (Acceptance rate: 54/204 = 26.8%)

  2. Distributed systems with multiple interacting services, especially e-commerce systems, were (and are) ripe targets for malicious attacks because of the potential financial impact. This paper was the first to present the design of automated response mechanisms in an intrusion tolerant system called ADEPTS. This paper started prolific activity in the research community in intrusion tolerant systems (including a series of workshops WRAITS that Prof. Saurabh Bagchi initiated in 2007 and which then ran till 2012) and the architecture showed up in many commercial systems.

  3. Rajesh Krishna Panta, Issa Khalil, and Saurabh Bagchi, “Stream: Low Overhead Wireless Reprogramming for Sensor Networks,” At the 26th Annual IEEE Conference on Computer Communications (INFOCOM), pp. 928-936, May 6-12 2007, Anchorage, Alaska, USA. (Acceptance rate: 252/~1400 = 18%)

  4. Wireless reprogramming of a sensor network is useful for uploading new code or for changing the functionality of existing code. This paper introduced a fundamentally different method of wireless reprogramming that could transfer only the increments in the code. It showed an order of magnitude reduction in energy and reprogramming time compared to the industry standard, Deluge. USPTO granted a patent on this innovation and it still remains the fastest way to reprogram any multi-hop wireless network.

  5. Sarah Sellke, Ness B. Shroff, and Saurabh Bagchi, “Modeling and Automated Containment of Worms,” IEEE Transactions on Dependable and Secure Computing (TDSC), volume 5, issue 2, pp. 71-86, April-June 2008.

  6. Self-propagating codes, called worms, had drawn significant attention due to their enormously adverse impact on the Internet. This paper was the first to model both uniform scanning worms and preference scanning worms, extending a stochastic branching process model. Further, it showed how to contain such worms by limiting the number of scans to dark-address space. The containment mechanism became the de facto way to deal with worms, both in academic and industrial tools.

  7. Amiya K. Maji, Fahad A. Arshad, Saurabh Bagchi, and Jan S. Rellermeyer (IBM), “An Empirical Study of the Robustness of Inter-component Communication in Android,” At the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 1-12, June 25-28, 2012, Boston, MA. (Acceptance rate: 51/236 = 21.6%) (Test-of-Time Award Winner in DSN 2022)

  8. This paper for the first time (in open literature) investigated the reliability of mobile Operating Systems, specifically Android and Symbian OS. This paper spawned off the active area of research on reliability of mobile OSes, in three distinct communities — reliability, software engineering, and security. The paper had an almost immediate impact on practice through a release of the Android OS, which hardened the Inter Process Communication (IPC) mechanism, Android 4.2 Jelly Bean API Level 17, released in October 2012.

  9. Wilke, Andreas, Jared Bischof, Wolfgang Gerlach, Elizabeth Glass, Travis Harrison, Kevin P. Keegan, Tobias Paczian, William L Trimble (Argonne National Lab); Saurabh Bagchi, Ananth Grama, Somali Chaterji; and Folker Meyer (Argonne National Lab), "The MG-RAST metagenomics database and portal in 2015." Nucleic Acids Research 44, no. D1 (2016): D590-D594.

  10. MG-RAST (http://metagenomics.anl.gov) is an open-submission data portal for processing, analyzing, sharing and disseminating metagenomic datasets. This was, at the time, the largest such public resource hosting over 200,000 datasets. Saurabh’s work, funded by the National Institutes of Health, enabled it to scale up by handling larger amounts of data. This paper reported on the novel NoSQL database design and implementation for the production system, without causing a single outage.

  11. Subrata Mitra, Rajesh Krishna Panta (AT&T Labs), Moo-Ryong Ra (AT&T Labs), Saurabh Bagchi, "Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage," At the European Conference on Computer Systems (EuroSys), pp. 1-16, April 18-21, 2016, London, UK. (Acceptance rate: 38/180 = 21.1%)

  12. With the tremendous amount of data being stored in datacenters, there was the imperative to store them in a failure-proof manner. Erasure codes (EC) had gained favor and increasing adoption as an alternative to data replication because they incur significantly less storage overhead, while maintaining equal (or better) reliability. However, it suffered from a severe serial bottleneck while recovering from concurrent failures. This paper came up with a distributed algorithm to relieve this bottleneck. Done jointly with AT&T, the work was patented and adopted by AT&T and then in an open source storage software called Ceph.

  13. Abraham A Clements, Naif Saleh Almakhdhub, Khaled Saab, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, and Mathias Payer, “Protecting Bare-metal Embedded Systems with Privilege Overlays,” In Proceedings of the IEEE International Symposium on Security and Privacy (S&P/Oakland), pp. 289-303, May 22-26, 2017, San Jose, California. (Acceptance rate: 60/450 = 13.3%)

  14. There was a rising crisis in embedded system software, the ones that ran on hardware without an intervening operating system (called bare-metal systems). The crisis was caused by the fact that such software ran with all privileges at all times and there was no operating system protection to safeguard such systems if any part of the software was attacked. This paper showed how to achieve that through a software interposition layer and one that could be inserted without needing any application modification. This has gone on to define how such software systems are protected today with uptake by ARM and numerous other vendors.

  15. Shreyas Sen, Jinkyu Koo, and Saurabh Bagchi, “TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices,” in IEEE Internet Computing, vol. 22, no. 1, pp. 74-81, Jan/Feb 2018.

  16. The widespread proliferation of sensor nodes in the era of the Internet of Things (IoT) has been ongoing for more than 8 years now. There is a tradeoff in wireless devices between what kinds of communication capability they have, how much and how quickly do they consume energy, and how easy it is to secure such devices from external attacks. This paper first laid out this three dimensional landscape in a systematic way and then profiled 6 prominent classes of wireless devices to show where they fit in this three-dimensional landscape.

  17. Saurabh Bagchi, Muhammad-Bilal Siddiqui, Paul Wood, and Heng Zhang. “Dependability in edge computing,” Communications of the ACM (CACM), vol. 63, no. 1, pp. 58-66, January 2020.

  18. Edge computing is the practice of placing computing resources at the edges of the Internet in close proximity to devices and information sources. While the community had been embracing it for various practical use cases (like Industrial Internet of Things or IIoT), the dependability of such systems had never been discussed. This paper extrapolated from the known metrics of the components to the dependability of an overall edge system. It also looked forward and laid out a roadmap for what needed to happen for us to rely on edge systems for critical use cases.

  19. Ashraf Mahgoub, Edgardo Barsallo Yi, Karthick Shankar (Carnegie Mellon University), Eshaan Minocha, Somali Chaterji, Sameh Elnikety (Microsoft Research), and Saurabh Bagchi, “WISEFUSE: Workload Characterization and Optimized Execution Plans for Serverless DAG Workflows,” At the 2022 ACM SIGMETRICS conference, pp. 1–28, June 2022. (Acceptance rate: 59/303 = 19.5%) (Best paper award)

  20. Serverless computing has become a very popular model for the public cloud. Increasingly we have been running complex workloads on serverless platforms, with products from all the leading cloud vendors in this space. However, there was no way to provide any performance guarantees for such executions. This paper, working with Microsoft Azure and releasing the public traces, unveiled a method to provide probabilistic guarantees to serverless DAG executions.