Fred Araujo

Overview

Fred Araujo

Title

Senior Research Scientist

Location

IBM Research - Yorktown Heights Yorktown Heights, NY USA

Bio

I am a Senior Research Scientist at IBM Research, where I lead the team's efforts on cloud-native security and endpoint security. I am an active contributor to open source and a maintainer of the SysFlow and CNCF's Falco projects.

My research seeks ways to make software systems more secure and resilient against cyber threats, with a focus on leveraging language-based techniques to en­force soft­ware se­cu­ri­ty. Technical interests include operating system security, cloud/web security, cyber deception, malware defense, access control, compilers, programming languages, and program analysis. I have contributed to several IBM products, including IBM Security's ReaQta and QRadar.

My work has been featured in top academic and industry security conferences and won several best paper awards, including the Best Applied Security Research Award at CSAW. I have over 15 years of professional experience and completed my Ph.D. under the supervision of Dr. Kevin Hamlen at the University of Texas at Dallas, where I was awarded the Best Dissertation Award for my research on language-based cyber deception.

I serve as a conference champion at the Security & Privacy Professional Interest Community (PIC) at IBM Research. I'm honored to serve (or have served) on the following program committees:

  • Usenix Security Symposium Program Committee 2023
  • ACM CCS Program Committee 2021
  • IEEE BigData Program Committee 2019, 2020, 2021, 2022
  • HICSS reviewer 2019, 2020, 2021, 2022
  • IEEE TDSC Journal 2018, 2019, 2021, 2022
  • IEEE TII Journal 2020
  • NYU CSAW Applied Research Program Committee 2017, 2018, 2019, 2020, 2021
  • WWW external reviewer 2018

My Google Scholar page is here.

Publications

Patents

Projects

default_blue.png

SysFlow

A cloud-native system telemetry framework that enables the creation of security analytics on a scalable, pluggable open-source platform.
  • Cloud Security
  • Security Analysis
  • Threat Management

Blog posts

Top collaborators