A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

Sok: History is a vast early warning system: Auditing the provenance of system intrusions

MA Inam, Y Chen, A Goyal, J Liu, J Mink… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …

A literature review and existing challenges on software logging practices: From the creation to the analysis of software logs

MA Batoun, M Sayagh, R Aghili, A Ouni, H Li - Empirical Software …, 2024 - Springer
Software logging is the practice of recording different events and activities that occur within a
software system, which are useful for different activities such as failure prediction and …

Poison forensics: Traceback of data poisoning attacks in neural networks

S Shan, AN Bhagoji, H Zheng, BY Zhao - 31st USENIX Security …, 2022 - usenix.org
In adversarial machine learning, new defenses against attacks on deep learning systems
are routinely broken soon after their release by more powerful attacks. In this context …

Deep learning or classical machine learning? an empirical study on log-based anomaly detection

B Yu, J Yao, Q Fu, Z Zhong, H **e, Y Wu… - Proceedings of the 46th …, 2024 - dl.acm.org
While deep learning (DL) has emerged as a powerful technique, its benefits must be
carefully considered in relation to computational costs. Specifically, although DL methods …

Evading {Provenance-Based}{ML} detectors with adversarial system actions

K Mukherjee, J Wiedemeier, T Wang, J Wei… - 32nd USENIX Security …, 2023 - usenix.org
We present PROVNINJA, a framework designed to generate adversarial attacks that aim to
elude provenance-based Machine Learning (ML) security detectors. PROVNINJA is …

Provg-searcher: a graph representation learning approach for efficient provenance graph search

E Altinisik, F Deniz, HT Sencar - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
We present ProvG-Searcher, a novel approach for detecting known APT behaviors within
system security logs. Our approach leverages provenance graphs, a comprehensive graph …

On the opportunities of green computing: A survey

Y Zhou, X Lin, X Zhang, M Wang, G Jiang, H Lu… - arxiv preprint arxiv …, 2023 - arxiv.org
Artificial Intelligence (AI) has achieved significant advancements in technology and research
with the development over several decades, and is widely used in many areas including …

Nodlink: An online system for fine-grained apt attack detection and investigation

S Li, F Dong, X **ao, H Wang, F Shao, J Chen… - arxiv preprint arxiv …, 2023 - arxiv.org
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing
significant financial losses. To counter these attacks, researchers propose techniques that …