[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …
developed and employed various attack vectors to make a malware much stealthier than …
ProvAudit: Enhance High-Level Privacy Inference Through System Provenance Data
Companies such as CrowdStrike now offer cloudbased services for provenance analysis,
which collects low-level system events from a customer's device and compiles them onto a …
which collects low-level system events from a customer's device and compiles them onto a …
Visualizing the provenance of personal data using comics
A Schreiber, R Struminksi - Computers, 2018 - mdpi.com
Personal health data is acquired, processed, stored, and accessed using a variety of
different devices, applications, and services. These are often complex and highly connected …
different devices, applications, and services. These are often complex and highly connected …
Securing emerging IoT systems through systematic analysis and design
Q Wang - 2020 - ideals.illinois.edu
Abstract The Internet of Things (IoT) is growing very rapidly. A variety of IoT systems have
been developed and employed in many domains such as smart home, smart city and …
been developed and employed in many domains such as smart home, smart city and …