A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
Sok: History is a vast early warning system: Auditing the provenance of system intrusions
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …
an active area of public research. This resurgent interest is due in large part to the notion of …
A literature review and existing challenges on software logging practices: From the creation to the analysis of software logs
Software logging is the practice of recording different events and activities that occur within a
software system, which are useful for different activities such as failure prediction and …
software system, which are useful for different activities such as failure prediction and …
Poison forensics: Traceback of data poisoning attacks in neural networks
In adversarial machine learning, new defenses against attacks on deep learning systems
are routinely broken soon after their release by more powerful attacks. In this context …
are routinely broken soon after their release by more powerful attacks. In this context …
Deep learning or classical machine learning? an empirical study on log-based anomaly detection
While deep learning (DL) has emerged as a powerful technique, its benefits must be
carefully considered in relation to computational costs. Specifically, although DL methods …
carefully considered in relation to computational costs. Specifically, although DL methods …
Evading {Provenance-Based}{ML} detectors with adversarial system actions
We present PROVNINJA, a framework designed to generate adversarial attacks that aim to
elude provenance-based Machine Learning (ML) security detectors. PROVNINJA is …
elude provenance-based Machine Learning (ML) security detectors. PROVNINJA is …
Provg-searcher: a graph representation learning approach for efficient provenance graph search
We present ProvG-Searcher, a novel approach for detecting known APT behaviors within
system security logs. Our approach leverages provenance graphs, a comprehensive graph …
system security logs. Our approach leverages provenance graphs, a comprehensive graph …
On the opportunities of green computing: A survey
Artificial Intelligence (AI) has achieved significant advancements in technology and research
with the development over several decades, and is widely used in many areas including …
with the development over several decades, and is widely used in many areas including …
Nodlink: An online system for fine-grained apt attack detection and investigation
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing
significant financial losses. To counter these attacks, researchers propose techniques that …
significant financial losses. To counter these attacks, researchers propose techniques that …