Are we there yet? an industrial viewpoint on provenance-based endpoint detection and response tools

F Dong, S Li, P Jiang, D Li, H Wang, L Huang… - Proceedings of the …, 2023 - dl.acm.org
Provenance-Based Endpoint Detection and Response (P-EDR) systems are deemed crucial
for future Advanced Persistent Threats (APT) defenses. Despite the fact that numerous new …

Kairos: Practical intrusion detection and investigation using whole-system provenance

Z Cheng, Q Lv, J Liang, Y Wang, D Sun… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Provenance graphs are structured audit logs that describe the history of a system's
execution. Recent studies have explored a variety of techniques to analyze provenance …

A survey on the evolution of fileless attacks and detection techniques

S Liu, G Peng, H Zeng, J Fu - Computers & Security, 2024 - Elsevier
Fileless attacks have gained significant prominence and have become the prevailing type of
attack in recent years. The exceptional level of stealthiness and difficulty in detection …

Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

Sok: History is a vast early warning system: Auditing the provenance of system intrusions

MA Inam, Y Chen, A Goyal, J Liu, J Mink… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …

Depcomm: Graph summarization on system audit logs for attack investigation

Z Xu, P Fang, C Liu, X **ao, Y Wen… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Causality analysis generates a dependency graph from system audit logs, which has
emerged as an important solution for attack investigation. In the dependency graph, nodes …

eAudit: A Fast, Scalable and Deployable Audit Data Collection System*

R Sekar, H Kimm, R Aich - 2024 IEEE Symposium on Security …, 2024 - ieeexplore.ieee.org
Today's advanced cyber attack campaigns can often bypass all existing protections. The
primary defense against them is after-the-fact detection, followed by a forensic analysis to …

{ALASTOR}: Reconstructing the provenance of serverless intrusions

P Datta, I Polinsky, MA Inam, A Bates… - 31st USENIX Security …, 2022 - usenix.org
Serverless computing has freed developers from the burden of managing their own platform
and infrastructure, allowing them to rapidly prototype and deploy applications. Despite its …

Hardlog: Practical tamper-proof system auditing using a novel audit device

A Ahmad, S Lee, M Peinado - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Audit systems maintain detailed logs of security-related events on enterprise machines to
forensically analyze potential incidents. In principle, these logs should be safely stored in a …

On the forensic validity of approximated audit logs

N Michael, J Mink, J Liu, S Gaur, WU Hassan… - Proceedings of the 36th …, 2020 - dl.acm.org
Auditing is an increasingly essential tool for the defense of computing systems, but the
unwieldy nature of log data imposes significant burdens on administrators and analysts. To …