Thesis

  1. “Detection and Classification of Malicious Processes Using System Call Analysis,” Raymond Canzanese, 2015. [pdf] [bib]

Conference Papers

  1. “The Future of Cyber Attacks and Defense is in the Cloud,” in 14th International Conference on Malicious and Unwanted Software (MALWARE), Erick Galinkin, Jenko Hwong, Abhinav Singh, Colin Estep, Ashwin Vamshi, and Raymond Canzanese, 2019. [pdf] [bib]
  2. “Run-time classification of malicious processes using system call analysis,” in 10th International Conference on Malicious and Unwanted Software (MALWARE), Raymond Canzanese, Spiros Mancoridis, and Moshe Kam, 2015. [pdf] [slides] [pub] [bib]
  3. “System Call-based Detection of Malicious Processes,” in International conference on quality, reliability, and security, Raymond Canzanese, Spiros Mancoridis, and Moshe Kam, 2015. [pdf] [bib]
  4. “Multi-channel Change-Point Malware Detection,” in International Conference on Software Security and Reliability, Raymond Canzanese, Moshe Kam, and Spiros Mancoridis, 2013. [pdf] [pub] [bib]
  5. “Toward an Automatic, Online Behavioral Malware Classification System,” in International Conference on Self-Adaptive and Self-Organizing Systems, Raymond Canzanese, Moshe Kam, and Spiros Mancoridis, 2013. [pdf] [pub] [bib]
  6. “Inoculation against malware infection using kernel-level software sensors,” in International conference on autonomic computing, New York, NY, USA, Raymond Canzanese, Moshe Kam, and Spiros Mancoridis, 2011. [pdf] [pub] [bib]

Patents

  1. “Systems and methods to show detailed structure in a security events graph,” Nigel Brown and Raymond Canzanese, 02-Nov-2021. [pdf] [pub] [bib]
  2. “Multi-channel Change-point Malware Detection,” Raymond Canzanese, Spiros Mancoridis, and Moshe Kam, 26-Dec-2017. [pdf] [pub] [bib]
  3. “Protection Of Code Or Data From Exposure By Use Of Code Injection Service,” Raymond Canzanese and John D. Halpin, 07-Feb-2012. [pdf] [pub] [bib]

Conferences

  • “Clound-native security for cloud-native threats,”“ The SASE Conference 2021.
  • “Cloud as an Attack Vector,” AVAR 2020. [blog]
  • “COVID and the Cloud,” CORN CON 2020. [video]
  • “The Cloud is for Launching Cyberattacks,” BSides Philadelphia. [video]

Blog Posts

  • “What Happens When Facebook Goes Down?,” Netskope, 8 Oct 2021. [link]
  • “July 2021 Netskope Cloud and Threat Report,” Netskope, 20 Jul 2021. [link]
  • “Cloud and Threat Report: Gone Phishing,” Netskope, 26 May 2021. [link]
  • “Netskope Threat Coverage: DarkSide,” Netskope, 11 May 2021. [link]
  • “Cloud and Threat Report: Cloudy with a Chance of Malware,” Netskope, 28 Apr 2021. [link]
  • “Cloud and Threat Report: Let’s Get Personal (Instances),” Netskope, 7 Apr 2021. [link].
  • “Cloud and Threat Report: Was 2020 the Year of the Malicious Office Document?,” Netskope, 16 May 2021. [link]
  • “Netskope Threat Coverage: DearCry Ransomware,” Netskope, 15 Mar 2021. [link]
  • “How Has Remote Work Changed After 1 Year of the COVID-19 Pandemic?,” Netskope, 11 Mar 2021. [link]
  • “Cloud and Threat Report: Shadow IT in the Cloud,” Netskope, 24 Feb 2021. [link]
  • “Understanding Cloud as an Attack Vector,” Netskope, 19 Feb 2021. [link]
  • “Beware of Google Docs Spam,” Netskope, 30 Oct 2020. [link]
  • “Dangerous Docs: Surge in Cloud-delivered Malicious Office Documents,” Netskope, 30 Sep 2020. [link]
  • “Risky Business: How COVID-19 changed user behavior,” Netskope, 10 Sep 2020. [link]
  • “Tracking COVID-19’s Effect on Remote Working by Industry and Geography,” Netskope, 19 Aug 2020. [link]
  • “Netskope Threat Coverage: GuLoader,” Netskope, 10 Aug 2020. [link]
  • “Remote Work Increasing Exponentially Due to COVID-19,” Netskope, 16 Mar 2020. [link]
  • ” Cloud Threats on the Rise, Cloud Data on the Move,” Netskope, 19 Feb 2020. [link]

Webinars

  • “Ransomware in K12: Your Resources For Prevention,” BrightTalk, 2021. [link]
  • “Threat Reports Undone,” ISSA, 2020. [link]
  • “State of Cloud and Threats,” SANS, 2020. [link]
  • “Anatomy of a Cloud Data Breach,” SANS 2020. [link]

Others

  1. “A survey of reverse engineering tools for the 32-bit Microsoft Windows environment,” Raymond Canzanese, Matthew Oyer, Moshe Kam, and Spiros Mancoridis, 2005. [pdf] [bib]