AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports Z Li, J Zeng, Y Chen, Z Liang European Symposium on Research in Computer Security, 589-609, 2022 | 123 | 2022 |
Threat detection and investigation with system-level provenance graphs: A survey Z Li, QA Chen, R Yang, Y Chen, W Ruan Computers & Security 106, 102282, 2021 | 93 | 2021 |
Effective and light-weight deobfuscation and semantic-aware attack detection for powershell scripts Z Li, QA Chen, C Xiong, Y Chen, T Zhu, H Yang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 50 | 2019 |
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows R Yang, X Chen, H Xu, Y Cheng, C Xiong, L Ruan, M Kavousi, Z Li, L Xu, ... IEEE Transactions on Dependable and Secure Computing 19 (3), 1621-1638, 2020 | 19 | 2020 |
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts C Xiong, Z Li, Y Chen, T Zhu, J Wang, H Yang, W Ruan Frontiers of Information Technology & Electronic Engineering 23 (3), 361-381, 2022 | 8 | 2022 |
From sands to mansions: Enabling automatic full-life-cycle cyberattack construction with llm L Wang, J Wang, K Jung, K Thiagarajan, E Wei, X Shen, Y Chen, Z Li arXiv preprint arXiv:2407.16928, 2024 | 5 | 2024 |
Decoding the mitre engenuity att&ck enterprise evaluation: An analysis of edr performance in real-world environments X Shen, Z Li, G Burleigh, L Wang, Y Chen Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | 4 | 2024 |
An automated alert cross-verification system with graph neural networks for ids events L Li, Y He, F Huang, Z Zhao, Z Song, T Zhou, Z Li, F Zhang 2024 27th International Conference on Computer Supported Cooperative Work in …, 2024 | 2 | 2024 |
Incorporating gradients to rules: Towards lightweight, adaptive provenance-based intrusion detection L Wang, X Shen, W Li, Z Li, R Sekar, H Liu, Y Chen arXiv preprint arXiv:2404.14720, 2024 | 2 | 2024 |
Poster: Towards automated and large-scale cyber attack reconstruction with apt reports Z Li, A Soltani, A Yusof, AC Risdianto, K Huang, J Zeng, Z Liang, Y Chen NDSS, 0 | 1 | |
PentestAgent: Incorporating LLM Agents to Automated Penetration Testing X Shen, L Wang, Z Li, Y Chen, W Zhao, D Sun, J Wang, W Ruan arXiv preprint arXiv:2411.05185, 2024 | | 2024 |
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events Z Li, Y Wei, X Shen, L Wang, Y Chen, H Xu, S Ji, F Zhang arXiv e-prints, arXiv: 2403.12541, 2024 | | 2024 |
A First Look at Evasion against Provenance Graph-based Threat Detection Z Li, R Yang, QA Chen, Y Chen | | |