[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.

Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee… - NDSS, 2020 - kangkookjee.io
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …

ProvAudit: Enhance High-Level Privacy Inference Through System Provenance Data

D Li, J **ao, P Jiang, J Gui, D Song… - … on Dependable and …, 2024 - ieeexplore.ieee.org
Companies such as CrowdStrike now offer cloudbased services for provenance analysis,
which collects low-level system events from a customer's device and compiles them onto a …

Visualizing the provenance of personal data using comics

A Schreiber, R Struminksi - Computers, 2018 - mdpi.com
Personal health data is acquired, processed, stored, and accessed using a variety of
different devices, applications, and services. These are often complex and highly connected …

Securing emerging IoT systems through systematic analysis and design

Q Wang - 2020 - ideals.illinois.edu
Abstract The Internet of Things (IoT) is growing very rapidly. A variety of IoT systems have
been developed and employed in many domains such as smart home, smart city and …