Follow
Xueyuan Han
Xueyuan Han
Assistant Professor of Computer Science
Verified email at wfu.edu - Homepage
Title
Cited by
Cited by
Year
Unicorn: Runtime provenance-based detector for advanced persistent threats
X Han, T Pasquier, A Bates, J Mickens, M Seltzer
Network and Distributed System Security Symposium, 2020
3502020
Practical whole-system provenance capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
Proceedings of the 2017 Symposium on Cloud Computing, 405-418, 2017
2052017
Runtime analysis of whole-system provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1112018
{FRAPpuccino}: Fault-detection through Runtime Analysis of Provenance
X Han, T Pasquier, T Ranjan, M Goldstein, M Seltzer
9th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 17), 2017
622017
Provenance-based intrusion detection: opportunities and challenges
X Han, T Pasquier, M Seltzer
10th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2018), 2018
602018
{SIGL}: Securing software installations through deep graph learning
X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, H Chen
30th USENIX Security Symposium (USENIX Security 21), 2345-2362, 2021
572021
Kairos: Practical intrusion detection and investigation using whole-system provenance
Z Cheng, Q Lv, J Liang, Y Wang, D Sun, T Pasquier, X Han
2024 IEEE Symposium on Security and Privacy (SP), 3533-3551, 2024
452024
Automated debugging in data-intensive scalable computing
MA Gulzar, M Interlandi, X Han, M Li, T Condie, M Kim
Proceedings of the 2017 Symposium on Cloud Computing, 520-534, 2017
362017
Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
A Goyal, X Han, G Wang, A Bates
Network and Distributed System Security Symposium, 2023
342023
Secure namespaced kernel audit for containers
SY Lim, B Stelea, X Han, T Pasquier
Proceedings of the ACM Symposium on Cloud Computing, 518-532, 2021
232021
Sharing and preserving computational analyses for posterity with encapsulator
T Pasquier, MK Lau, X Han, E Fong, BS Lerner, ER Boose, M Crosas, ...
Computing in Science & Engineering 20 (4), 111-124, 2018
192018
Unleashing unprivileged ebpf potential with dynamic sandboxing
SY Lim, X Han, T Pasquier
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 42-48, 2023
112023
Interactive debugging for big data analytics
MA Gulzar, X Han, M Interlandi, S Mardani, SD Tetali, T Millstein, M Kim
8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16), 2016
112016
Xanthus: Push-button orchestration of host provenance data collection
X Han, J Mickens, A Gehani, M Seltzer, T Pasquier
Proceedings of the 3rd International Workshop on Practical Reproducible …, 2020
82020
Securing software installation through deep graph learning
X Yu, X Han, D Li, J Rhee, H Chen
US Patent 11,321,066, 2022
32022
Safebpf: Hardware-assisted defense-in-depth for ebpf kernel extensions
SY Lim, T Prasad, X Han, T Pasquier
Proceedings of the 2024 on Cloud Computing Security Workshop, 80-94, 2024
12024
Securing Monolithic Kernels using Compartmentalization
SY Lim, S Agrawal, X Han, D Eyers, D O'Keeffe, T Pasquier
arXiv preprint arXiv:2404.08716, 2024
12024
{FetchBPF}: Customizable Prefetching Policies in Linux with {eBPF}
X Cao, S Patel, SY Lim, X Han, T Pasquier
2024 USENIX Annual Technical Conference (USENIX ATC 24), 369-378, 2024
12024
Splice: Efficiently Removing a User's Data from In-memory Application State
X Han, J Mickens, S Sen
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems
B Jiang, T Bilot234, N El Madhoun, K Al Agha, A Zouaoui, S Iqbal, X Han, ...
The system can't perform the operation now. Try again later.
Articles 1–20