ติดตาม
Xueyuan Han
Xueyuan Han
Assistant Professor of Computer Science
ยืนยันอีเมลแล้วที่ wfu.edu - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Unicorn: Runtime provenance-based detector for advanced persistent threats
X Han, T Pasquier, A Bates, J Mickens, M Seltzer
Network and Distributed System Security Symposium, 2020
3622020
Practical whole-system provenance capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
Proceedings of the 2017 Symposium on Cloud Computing, 405-418, 2017
2082017
Runtime analysis of whole-system provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1102018
{FRAPpuccino}: Fault-detection through Runtime Analysis of Provenance
X Han, T Pasquier, T Ranjan, M Goldstein, M Seltzer
9th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 17), 2017
652017
Provenance-based intrusion detection: opportunities and challenges
X Han, T Pasquier, M Seltzer
10th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2018), 2018
632018
{SIGL}: Securing software installations through deep graph learning
X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, H Chen
30th USENIX Security Symposium (USENIX Security 21), 2345-2362, 2021
602021
Kairos: Practical intrusion detection and investigation using whole-system provenance
Z Cheng, Q Lv, J Liang, Y Wang, D Sun, T Pasquier, X Han
2024 IEEE Symposium on Security and Privacy (SP), 3533-3551, 2024
492024
Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
A Goyal, X Han, G Wang, A Bates
Network and Distributed System Security Symposium, 2023
382023
Automated debugging in data-intensive scalable computing
MA Gulzar, M Interlandi, X Han, M Li, T Condie, M Kim
Proceedings of the 2017 Symposium on Cloud Computing, 520-534, 2017
352017
Secure namespaced kernel audit for containers
SY Lim, B Stelea, X Han, T Pasquier
Proceedings of the ACM Symposium on Cloud Computing, 518-532, 2021
232021
Sharing and preserving computational analyses for posterity with encapsulator
T Pasquier, MK Lau, X Han, E Fong, BS Lerner, ER Boose, M Crosas, ...
Computing in Science & Engineering 20 (4), 111-124, 2018
192018
Unleashing unprivileged ebpf potential with dynamic sandboxing
SY Lim, X Han, T Pasquier
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 42-48, 2023
112023
Interactive debugging for big data analytics
MA Gulzar, X Han, M Interlandi, S Mardani, SD Tetali, T Millstein, M Kim
8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16), 2016
112016
Xanthus: Push-button orchestration of host provenance data collection
X Han, J Mickens, A Gehani, M Seltzer, T Pasquier
Proceedings of the 3rd International Workshop on Practical Reproducible …, 2020
82020
Securing software installation through deep graph learning
X Yu, X Han, D Li, J Rhee, H Chen
US Patent 11,321,066, 2022
32022
{FetchBPF}: Customizable Prefetching Policies in Linux with {eBPF}
X Cao, S Patel, SY Lim, X Han, T Pasquier
2024 USENIX Annual Technical Conference (USENIX ATC 24), 369-378, 2024
22024
Safebpf: Hardware-assisted defense-in-depth for ebpf kernel extensions
SY Lim, T Prasad, X Han, T Pasquier
Proceedings of the 2024 on Cloud Computing Security Workshop, 80-94, 2024
12024
Securing Monolithic Kernels using Compartmentalization
SY Lim, S Agrawal, X Han, D Eyers, D O'Keeffe, T Pasquier
arXiv preprint arXiv:2404.08716, 2024
12024
Using Provenance for Security and Interpretability
X Han
1
Splice: Efficiently Removing a User's Data from In-memory Application State
X Han, J Mickens, S Sen
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20