Publications
Master’s Thesis
Advisors: Prof. Steven Weber and Ben Goodman
Dagmawi Mulugeta, "Security Posture Based Incident Forecasting," 2019 [pdf] [slides]
Topic: Correlation between external internet presence and likelihood of reporting a security incident
Patents
Security systems and methods for detecting malleable command and control ; August 20, 2024; Netskope, Inc.; Dagmawi Mulugeta, Wu-Sheng Lin, Colin Davidson Estep, Raymond Jospeh Canzanese, Jr., Yong Zheng, Haoxin Hu, Yongxing Wang, Siying Yang
ML-based encrypted file classification for identifying encrypted data movement ; April 2, 2024; Netskope, Inc.; Yi Zhang, Siying Yang, Yihua Liao, Dagmawi Mulugeta, Raymond Joseph Canzanese, Jr., Ari Azarafrooz
Trained model to detect malicious command and control traffic ; December 12, 2023; Netskope, Inc.; Colin Estep, Siying Yang, Jenko Hwong, Gustavo Palazolo Eiras, Yongxing Wang, Dagmawi Mulugeta, Raymond Joseph Canzanese, Jr.
Detecting malicious command and control cloud traffic ; August 22, 2023; Netskope, Inc.; Dagmawi Mulugeta, Raymond Joseph Canzanese, Jr., Colin Estep, Siying Yang, Jenko Hwong, Gustavo Palazolo Eiras, Yongxing Wang
Training a model to detect malicious command and control cloud ; March 28, 2023; Netskope, Inc.; Raymond Joseph Canzanese, Jr., Colin Estep, Siying Yang, Jenko Hwong, Gustavo Palazolo Eiras, Yongxing Wang, Dagmawi Mulugeta
Papers
Dagmawi Mulugeta, Ben Goodman, and Steven Weber."Security posture-based incident forecasting." Variance Journal 15.1 (2022) [pdf]
Select Talks & Conferences
11/05/23, MySecTV "Insider Threats and Corporate Data exfiltration" [interview]
11/05/23, Blackhat Asia 2023 "Insider Threats Packing Their Bags With Corporate Data" [recording] [slides]
10/12/22, BSides London "Cloud Chatter: Defending Against Cloud C2" [recording]
25/10/22, Swiss CyberStorm "Detecting cloud command and control" [recording] [slides]
17/06/22, Area41 by DEFCON Switzerland "Command & Control Freak: Cloud Edition" [recording] [webpage]
10/06/22, OWASP AppSec EU "Abusing cloud apps 101: Command and Control" [recording]
28/05/21, HITBSecConf COMMSEC "JARM Randomizer: Evading JARM Fingerprinting" [recording] [slides] [webpage]
Research Groups
Netskope Threat Labs, 2020
-
Identify, profile, and hunt the latest trends in cloud-enabled threats
-
Design and implement advanced heuristic and ML-based detections to detect malicious activity
-
Publish academic (e.g., conference and journal papers) and non-academic documents(e.g., blogs, webinars, etc.) to aid in keeping the cyberspace secure
Cloud Threat Team at Sift Security (Acquired by Netskope), 2018
-
Member of the backend engineering, data science and threat research groups
-
Gained material understanding in securing cloud providers (GCP & AWS) and how to detect malicious activity in company’s cloud infrastructure
-
Independently and collaboratively solved complex issues in the products’ detection components
Students Tackling Advanced Research (S.T.A.R) Scholar at Drexel University, 2015
-
Participated in faculty-mentored research under the supervision of Dr. Mathew Prockup (now at Pandora) and Prof. Youngmoo Kim for a period of three months
-
The capstone projects were two mobile applications (Museum Finder and Shuttle Tracker) for Prof. Neville Vakharia
-
Here is a Recommendation Letter written for my efforts