Sadegh Momeni Milajerdi

Department of Computer Science · University of Illinois at Chicago · IL 60607 ·

I am actively engaged in doing research on Computer Systems Security. As a security researcher, my goal is to design and improve security techniques to provide a more secure digital environment for everyone. In this era, security research plays a crucial role in preserving privacy and protecting the sensitive information of computer users against malicious hackers. Since 2014, I have joined Systems and Security Lab (SISL) at the University of Illinois at Chicago (UIC) as a Ph.D. candidate to pursue my ambitions.


University of Illinois at Chicago

Philosophy of Doctrine
Computer Science Department
Under Supervision of Prof. V.N. Venkatakrishnan
Aug 2014 - Aug 2019

Sharif University of Technology

Master of Science
Computer Engineering Department
Under Supervision of Prof. Mehdi Kharrazi
Sep 2010 - Oct 2012

Shiraz University of Technology

Bachelor of Science
Information Technology Department
Under Supervision of Prof. Omid Bushehrian
Sep 2006 - Sep 2010


  • Milajerdi SM, Gjomemo R, Eshete B, Sekar R, Venkatakrishnan VN. “HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows”. To appear in the Proceedings of the IEEE Symposium on Security and Privacy (S&P). IEEE, May 2019. [PDF]
  • Milajerdi SM, Eshete B, Gjomemo R, Venkatakrishnan VN. “ProPatrol: Attack Investigation via Extracted High-Level Tasks”. International Conference on Information Systems Security (ICISS). Lecture Notes in Computer Science, vol 11281. Springer, Dec 2018. [PDF]
  • Hossain MN, Milajerdi SM, Wang J, Eshete B, Gjomemo R, Sekar R, Stoller S, Venkatakrishnan VN. “SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data”. Proceedings of the 26th USENIX Security Symposium. USENIX Security, 2017. [PDF]
  • Manzoor E, Milajerdi SM, Akoglu L. “Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs”. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2016. [PDF]
  • Eshete B, Gjomemo R, Hossain MN, Milajerdi SM, Sekar R, Stoller S, Venkatakrishnan VN, Wang J. “Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program”. ArXiv preprint arXiv:1610.06936. 2016. [PDF]
  • Milajerdi SM, Kharrazi M. “A Composite-Metric Path Selection Technique for the Tor Anonymity Network”. Journal of Systems and Software. 2015. [PDF]
  • Milajerdi SM, Ahmadi M, Boushehrian O. “Automatic Optimization of objects deployment in a distributed e-banking system”. Proceedings of the 5th Conference on Information and Knowledge Technology. IEEE IKT, 2013. [PDF]


Programming Languages & Tools
  • Intrusion Detection and Prevention
  • Cyber Security Forensics and Investigations
  • Privacy and Information Flow
  • Malware Analysis
  • Anonymous Networks (Tor Project)
  • System Security
  • Web/Network Security
  • Machine Learning

Awards & Certifications

  • Cisco Global Cyber Ops Scholarship, 2017.
  • Cisco Certified Network Associate Routing and Switching (CCNA Routing and Switching), Verification No. 430464168872CRBF, 2017-2020.
  • Cisco Certified Entry Networking Technician (CCENT), Verification No. 419524171375CKUL, 2014- 2017.
  • Peter and Deborah Wexler Graduate Student Scholarship, 2014.
  • 5th Place - National Iran's University Entrance Exam, 2010.
  • 3rd Place - National Robocup Khwarizmi festival in Soccer 2D Simulation, 2009.
  • 4th Place - RoboCup IranOpen Competition in Soccer 2D Simulation, 2009.
  • 2nd Place - Amirkabir University of Technology International Robotic Competition (AUTCup) in Soccer 2D Simulation, 2009.
  • 2nd Place - RoboCup GuilanOpen Competition in Soccer 2D Simulation, 2008.